WorldWideScience

Sample records for scheme enabling identification

  1. An enzymatic deglycosylation scheme enabling identification of core fucosylated N-glycans and O-glycosylation site mapping of human plasma proteins

    DEFF Research Database (Denmark)

    Hägglund, Per; Matthiesen, R.; Elortza, F.

    2007-01-01

    and N-acetyl-β-glucosaminidase) are also included. The two strategies were here applied to identify 103 N-glycosylation sites in the Cohn IV fraction of human plasma. In addition, Endo D/H digestion uniquely enabled identification of 23 fucosylated N-glycosylation sites. Several O-glycosylated peptides......, thereby reducing the complexity and facilitating glycosylation site determinations. Here, we have used two different enzymatic deglycosylation strategies for N-glycosylation site analysis. (1) Removal of entire N-glycan chains by peptide- N-glycosidase (PNGase) digestion, with concomitant deamidation...... of the released asparagine residue. The reaction is carried out in H218O to facilitate identification of the formerly glycosylated peptide by incorporatation of 18O into the formed aspartic acid residue. (2) Digestion with two endo-β- N-acetylglucosaminidases (Endo D and Endo H) that cleave the glycosidic bond...

  2. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  3. Resource Optimization Scheme for Multimedia-Enabled Wireless Mesh Networks

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md. Jalil; Suh, Doug Young

    2014-01-01

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment. PMID:25111241

  4. Resource optimization scheme for multimedia-enabled wireless mesh networks.

    Science.gov (United States)

    Ali, Amjad; Ahmed, Muhammad Ejaz; Piran, Md Jalil; Suh, Doug Young

    2014-08-08

    Wireless mesh networking is a promising technology that can support numerous multimedia applications. Multimedia applications have stringent quality of service (QoS) requirements, i.e., bandwidth, delay, jitter, and packet loss ratio. Enabling such QoS-demanding applications over wireless mesh networks (WMNs) require QoS provisioning routing protocols that lead to the network resource underutilization problem. Moreover, random topology deployment leads to have some unused network resources. Therefore, resource optimization is one of the most critical design issues in multi-hop, multi-radio WMNs enabled with multimedia applications. Resource optimization has been studied extensively in the literature for wireless Ad Hoc and sensor networks, but existing studies have not considered resource underutilization issues caused by QoS provisioning routing and random topology deployment. Finding a QoS-provisioned path in wireless mesh networks is an NP complete problem. In this paper, we propose a novel Integer Linear Programming (ILP) optimization model to reconstruct the optimal connected mesh backbone topology with a minimum number of links and relay nodes which satisfies the given end-to-end QoS demands for multimedia traffic and identification of extra resources, while maintaining redundancy. We further propose a polynomial time heuristic algorithm called Link and Node Removal Considering Residual Capacity and Traffic Demands (LNR-RCTD). Simulation studies prove that our heuristic algorithm provides near-optimal results and saves about 20% of resources from being wasted by QoS provisioning routing and random topology deployment.

  5. Enabling an Integrated Rate-temporal Learning Scheme on Memristor

    Science.gov (United States)

    He, Wei; Huang, Kejie; Ning, Ning; Ramanathan, Kiruthika; Li, Guoqi; Jiang, Yu; Sze, Jiayin; Shi, Luping; Zhao, Rong; Pei, Jing

    2014-04-01

    Learning scheme is the key to the utilization of spike-based computation and the emulation of neural/synaptic behaviors toward realization of cognition. The biological observations reveal an integrated spike time- and spike rate-dependent plasticity as a function of presynaptic firing frequency. However, this integrated rate-temporal learning scheme has not been realized on any nano devices. In this paper, such scheme is successfully demonstrated on a memristor. Great robustness against the spiking rate fluctuation is achieved by waveform engineering with the aid of good analog properties exhibited by the iron oxide-based memristor. The spike-time-dependence plasticity (STDP) occurs at moderate presynaptic firing frequencies and spike-rate-dependence plasticity (SRDP) dominates other regions. This demonstration provides a novel approach in neural coding implementation, which facilitates the development of bio-inspired computing systems.

  6. MPNACK: an optical switching scheme enabling the buffer-less reliable transmission

    Science.gov (United States)

    Yu, Xiaoshan; Gu, Huaxi; Wang, Kun; Xu, Meng; Guo, Yantao

    2016-01-01

    Optical data center networks are becoming an increasingly promising solution to solve the bottlenecks faced by electrical networks, such as low transmission bandwidth, high wiring complexity, and unaffordable power consumption. However, the optical circuit switching (OCS) network is not flexible enough to carry the traffic burst while the optical packet switching (OPS) network cannot solve the packet contention in an efficient way. To this end, an improved switching strategy named OPS with multi-hop Negative Acknowledgement (MPNACK) is proposed. This scheme uses a feedback mechanism, rather than the buffering structure, to handle the optical packet contention. The collided packet is treated as a NACK packet and sent back to the source server. When the sender receives this NACK packet, it knows a collision happens in the transmission path and a retransmission procedure is triggered. Overall, the OPS-NACK scheme enables a reliable transmission in the buffer-less optical network. Furthermore, with this scheme, the expensive and energy-hungry elements, optical or electrical buffers, can be removed from the optical interconnects, thus a more scalable and cost-efficient network can be constructed for cloud computing data centers.

  7. Guidance Scheme for Modulation of Drag Devices to Enable Return from Low Earth Orbit

    Science.gov (United States)

    Dutta, Soumyo; Bowes, Angela L.; Cianciolo, Alicia D.; Glass, Christopher E.; Powell, Richard W.

    2017-01-01

    Passive drag devices provide opportunities to return payloads from low Earth orbits quickly without using onboard propulsive systems to de-orbit the spacecraft. However, one potential disadvantage of such systems has been the lack of landing accuracy. Drag modulation or changing the shape of the drag device during flight offer a way to control the de-orbit trajectory and target a specific landing location. This paper discusses a candidate passive drag based system, called Exo-brake, as well as efforts to model the dynamics of the vehicle as it de-orbits and guidance schemes used to control the trajectory. Such systems can enable quick return of payloads from low Earth orbit assets like the International Space Station without the use of large re-entry cargo capsules or propulsive systems.

  8. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  9. A color and texture based multi-level fusion scheme for ethnicity identification

    Science.gov (United States)

    Du, Hongbo; Salah, Sheerko Hma; Ahmed, Hawkar O.

    2014-05-01

    Ethnicity identification of face images is of interest in many areas of application. Different from face recognition of individuals, ethnicity identification classifies faces according to the common features of a specific ethnic group. This paper presents a multi-level fusion scheme for ethnicity identification that combines texture features of local areas of a face using local binary patterns with color features using HSV binning. The scheme fuses the decisions from a k-nearest neighbor classifier and a support vector machine classifier into a final identification decision. We have tested the scheme on a collection of face images from a number of publicly available databases. The results demonstrate the effectiveness of the combined features and improvements on accuracy of identification by the fusion scheme over the identification using individual features and other state-of-art techniques.

  10. Numerical Investigation of a Novel Wiring Scheme Enabling Simple and Accurate Impedance Cytometry

    Directory of Open Access Journals (Sweden)

    Federica Caselli

    2017-09-01

    Full Text Available Microfluidic impedance cytometry is a label-free approach for high-throughput analysis of particles and cells. It is based on the characterization of the dielectric properties of single particles as they flow through a microchannel with integrated electrodes. However, the measured signal depends not only on the intrinsic particle properties, but also on the particle trajectory through the measuring region, thus challenging the resolution and accuracy of the technique. In this work we show via simulation that this issue can be overcome without resorting to particle focusing, by means of a straightforward modification of the wiring scheme for the most typical and widely used microfluidic impedance chip.

  11. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...... classical forwarding when both systems implement the improved MAC. However, our measurement results show an even larger gain for network coding, namely, up to 65 % over forwarding, as it copes better with channel losses under high load scenarios....

  12. GPU-enabled particle-particle particle-tree scheme for simulating dense stellar cluster system

    Science.gov (United States)

    Iwasawa, Masaki; Portegies Zwart, Simon; Makino, Junichiro

    2015-07-01

    We describe the implementation and performance of the (Particle-Particle Particle-Tree) scheme for simulating dense stellar systems. In , the force experienced by a particle is split into short-range and long-range contributions. Short-range forces are evaluated by direct summation and integrated with the fourth order Hermite predictor-corrector method with the block timesteps. For long-range forces, we use a combination of the Barnes-Hut tree code and the leapfrog integrator. The tree part of our simulation environment is accelerated using graphical processing units (GPU), whereas the direct summation is carried out on the host CPU. Our code gives excellent performance and accuracy for star cluster simulations with a large number of particles even when the core size of the star cluster is small.

  13. Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2015-01-01

    Full Text Available Most identity-based identification (IBI schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes.

  14. W-Band Millimeter-Wave Vector Signal Generation Based on Precoding-Assisted Random Photonic Frequency Tripling Scheme Enabled by Phase Modulator

    National Research Council Canada - National Science Library

    Li, Xinying; Xu, Yuming; Xiao, Jiangnan; Yu, Jianjun

    2016-01-01

    We propose W-band photonic millimeter-wave (mm-wave) vector signal generation employing a precoding-assisted random frequency tripling scheme enabled by a single phase modulator cascaded with a wavelength selective switch (WSS...

  15. Provably secure identity-based identification and signature schemes from code assumptions

    Science.gov (United States)

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  16. Provably secure identity-based identification and signature schemes from code assumptions.

    Directory of Open Access Journals (Sweden)

    Bo Song

    Full Text Available Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature, and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  17. An LMS Programming Scheme and Floating-Gate Technology Enabled Trimmer-Less and Low Voltage Flame Detection Sensor

    Science.gov (United States)

    Iglesias-Rojas, Juan Carlos; Gomez-Castañeda, Felipe; Moreno-Cadenas, Jose Antonio

    2017-01-01

    In this paper, a Least Mean Square (LMS) programming scheme is used to set the offset voltage of two operational amplifiers that were built using floating-gate transistors, enabling a 0.95 VRMS trimmer-less flame detection sensor. The programming scheme is capable of setting the offset voltage over a wide range of values by means of electron injection. The flame detection sensor consists of two programmable offset operational amplifiers; the first amplifier serves as a 26 μV offset voltage follower, whereas the second amplifier acts as a programmable trimmer-less voltage comparator. Both amplifiers form the proposed sensor, whose principle of functionality is based on the detection of the electrical changes produced by the flame ionization. The experimental results show that it is possible to measure the presence of a flame accurately after programming the amplifiers with a maximum of 35 LMS-algorithm iterations. Current commercial flame detectors are mainly used in absorption refrigerators and large industrial gas heaters, where a high voltage AC source and several mechanical trimmings are used in order to accurately measure the presence of the flame. PMID:28613250

  18. An LMS Programming Scheme and Floating-Gate Technology Enabled Trimmer-Less and Low Voltage Flame Detection Sensor.

    Science.gov (United States)

    Iglesias-Rojas, Juan Carlos; Gomez-Castañeda, Felipe; Moreno-Cadenas, Jose Antonio

    2017-06-14

    In this paper, a Least Mean Square (LMS) programming scheme is used to set the offset voltage of two operational amplifiers that were built using floating-gate transistors, enabling a 0.95 VRMS trimmer-less flame detection sensor. The programming scheme is capable of setting the offset voltage over a wide range of values by means of electron injection. The flame detection sensor consists of two programmable offset operational amplifiers; the first amplifier serves as a 26 μV offset voltage follower, whereas the second amplifier acts as a programmable trimmer-less voltage comparator. Both amplifiers form the proposed sensor, whose principle of functionality is based on the detection of the electrical changes produced by the flame ionization. The experimental results show that it is possible to measure the presence of a flame accurately after programming the amplifiers with a maximum of 35 LMS-algorithm iterations. Current commercial flame detectors are mainly used in absorption refrigerators and large industrial gas heaters, where a high voltage AC source and several mechanical trimmings are used in order to accurately measure the presence of the flame.

  19. Use of a Generic Identification Scheme Connecting Events and Detector Description in the ATLAS Experiment

    CERN Document Server

    Arnault, C.

    2003-01-01

    High energy physics detectors can be described hierarchically from the different subsystems to their divisions in r, phi, theta and to the individual readout channels. An identification schema that follows the logical decomposition of the ATLAS detector has been introduced allowing identification of individual readout channels as well as other parts of the detector, in particular detector elements. These identifiers provide a sort of ?glue? allowing, for example, the connection of raw event data to their detector description for position calculation or alignment corrections, as well as fast access to subsets of the event data for event trigger selection. There are two important requirements on the software to support such an identification scheme. First is the possibility to formally specify these identifiers in terms of their structure and allowed values. And second is to generate different forms of the identifiers optimised in terms of access efficiency to information content, compactness or search key effi...

  20. Multi-stage identification scheme for detecting damage in structures under ambient excitations

    Science.gov (United States)

    Bao, Chunxiao; Hao, Hong; Li, Zhong-Xian

    2013-04-01

    Structural damage identification methods are critical to the successful application of structural health monitoring (SHM) systems to civil engineering structures. The dynamic response of civil engineering structures is usually characterized by high nonlinearity and non-stationarity. Accordingly, an improved Hilbert-Huang transform (HHT) method which is adaptive, output-only and applicable to system identification of in-service structures under ambient excitations is developed in this study. Based on this method, a multi-stage damage detection scheme including the detection of damage occurrence, damage existence, damage location and the estimation of damage severity is developed. In this scheme, the improved HHT method is used to analyse the structural acceleration response, the obtained instantaneous frequency detects the instant of damage occurrence, the instantaneous phase is sensitive to minor damage and provides reliable damage indication, and the damage indicator developed based on statistical analysis of the Hilbert marginal spectrum detects damage locations. Finally, the response sampled at the detected damage location is continuously analysed to estimate the damage severity. Numerical and experimental studies of frame structures under ambient excitations are performed. The results demonstrate that this scheme accomplishes the above damage detection functions within one flow. It is robust, time efficient, simply implemented and applicable to the real-time SHM of in-service structures.

  1. Elucidation of molecular kinetic schemes from macroscopic traces using system identification.

    Directory of Open Access Journals (Sweden)

    Miguel Fribourg

    2017-02-01

    Full Text Available Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic processes from the overall (macroscopic response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE. SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology

  2. Artificial neural network based fault identification scheme implementation for a three-phase induction motor.

    Science.gov (United States)

    Kolla, Sri R; Altman, Shawn D

    2007-04-01

    This paper presents results from the implementation and testing of a PC based monitoring and fault identification scheme for a three-phase induction motor using artificial neural networks (ANNs). To accomplish the task, a hardware system is designed and built to acquire three-phase voltages and currents from a 1/3 HP squirrel-cage, three-phase induction motor. A software program is written to read the voltages and currents, which are first used to train a feed-forward neural network structure using the JavaNNS program. The trained network is placed in a LabVIEW based program formula node that monitors the voltages and currents online and displays the fault conditions and turns the motor off. The complete system is successfully tested in real time by creating different faults on the motor.

  3. Parameter Identification and Control Scheme for Monitoring Automatic Thickness Control System with Measurement Delay

    Directory of Open Access Journals (Sweden)

    Xu Yang

    2017-01-01

    Full Text Available The thickness of the steel strip is an important indicator of the overall strip quality. Deviations in thickness are primarily controlled using the automatic gauge control (AGC system of each rolling stand. At the last stand, the monitoring AGC system is usually used, where the deviations in thickness can be directly measured by the X-ray thickness gauge device and used as the input to the AGC system. However, due to the physical distance between the thickness detection device and the rolling stand, time delay is unavoidably present in the thickness control loop, which can affect control performance and lead to system oscillations. Furthermore, the parameters of the system can change due to perturbations from external disturbances. Therefore, this paper proposes an identification and control scheme for monitoring AGC system that can handle time delay and parameter uncertainty. The cross-correlation function is used to estimate the time delay of the system, while the system parameters are identified using a recursive least squares method. The time delay and parameter estimates are then further refined using the Levenberg-Marquardt algorithm, so as to provide the most accurate parameter estimates for the complete system. Simulation results show that, compared with the standard Proportion Integration Differentiation (PID controller approach, the proposed approach is not affected by changes in the time delay and parameter uncertainties.

  4. Non-intrusive schemes for speed and axle identification in bridge-weigh-in-motion systems

    Science.gov (United States)

    Kalhori, Hamed; Makki Alamdari, Mehrisadat; Zhu, Xinqun; Samali, Bijan; Mustapha, Samir

    2017-02-01

    Bridge weigh-in-motion (BWIM) is an approach through which the axle and gross weight of trucks travelling at normal highway speed are identified using the response of an instrumented bridge. The vehicle speed, the number of axles, and the axle spacing are crucial parameters, and are required to be determined in the majority of BWIM algorithms. Nothing-on-the-road (NOR) strategy suggests using the strain signals measured at some particular positions underneath the deck or girders of a bridge to obtain this information. The objective of this research is to present a concise overview of the challenges of the current non-intrusive schemes for speed and axle determination through bending-strain and shear-strain based approaches. The problem associated with the global bending-strain responses measured at quarter points of span is discussed and a new sensor arrangement is proposed as an alternative. As for measurement of local responses rather than the global responses, the advantage of shear strains over bending strains is presented. However, it is illustrated that shear strains at quarter points of span can only provide accurate speed estimation but fail to detect the correct number of axles. As a remedy, it is demonstrated that, even for closely-spaced axles, the shear strain at the beginning of the bridge is capable of reliably identifying the number of axles. In order to provide a fully automated speed and axle identification system, appropriate signal processing including low-pass filtering and wavelet transforms are applied to the raw time signals. As case studies, the results of experimental testing in laboratory and on a real bridge are presented.

  5. A Novel, Simplified Scheme for Plastics Identification: "JCE" Classroom Activity 104

    Science.gov (United States)

    Harris, Mary E.; Walker, Barbara

    2010-01-01

    In this Activity, students identify samples of seven types of recyclable plastic by using a flowchart scheme. The flowchart procedure includes making density comparisons of the plastic samples in water and alcohol and observing physical changes of plastic samples subjected to boiling water temperatures and exposure to acetone. This scheme is…

  6. An on-line equivalent system identification scheme for adaptive control. Ph.D. Thesis - Stanford Univ.

    Science.gov (United States)

    Sliwa, S. M.

    1984-01-01

    A prime obstacle to the widespread use of adaptive control is the degradation of performance and possible instability resulting from the presence of unmodeled dynamics. The approach taken is to explicitly include the unstructured model uncertainty in the output error identification algorithm. The order of the compensator is successively increased by including identified modes. During this model building stage, heuristic rules are used to test for convergence prior to designing compensators. Additionally, the recursive identification algorithm as extended to multi-input, multi-output systems. Enhancements were also made to reduce the computational burden of an algorithm for obtaining minimal state space realizations from the inexact, multivariate transfer functions which result from the identification process. A number of potential adaptive control applications for this approach are illustrated using computer simulations. Results indicated that when speed of adaptation and plant stability are not critical, the proposed schemes converge to enhance system performance.

  7. Radio frequency identification-enabled capabilities in a healthcare context: An exploratory study.

    Science.gov (United States)

    Hornyak, Rob; Lewis, Mark; Sankaranarayan, Balaji

    2016-09-01

    Increasingly, the adoption and use of radio frequency identification systems in hospital settings is gaining prominence. However, despite the transformative impact that radio frequency identification has in healthcare settings, few studies have examined how and why this change may occur. The purpose of this study is to systematically understand how radio frequency identification can transform work practices in an operational process that directly impacts cost and operational efficiency and indirectly contributes to impacting patient safety and quality of care. We leverage an interdisciplinary framework to explore the contextual characteristics that shape the assimilation of radio frequency identification in healthcare settings. By linking the use of radio frequency identification with specific contextual dimensions in healthcare settings, we provide a data-driven account of how and why radio frequency identification can be useful in inventory management in this setting. In doing so, we also contribute to recent work by information systems scholars who argue for a reconfiguration of conventional assumptions regarding the role of technology in contemporary organizations. © The Author(s) 2015.

  8. Dynamical recurrent neuro-fuzzy identification schemes employing switching parameter hopping.

    Science.gov (United States)

    Theodoridis, Dimitrios; Boutalis, Yiannis; Christodoulou, Manolis

    2012-04-01

    In this paper we analyze the identification problem which consists of choosing an appropriate identification model and adjusting its parameters according to some adaptive law, such that the response of the model to an input signal (or a class of input signals), approximates the response of the real system for the same input. For identification models we use fuzzy-recurrent high order neural networks. High order networks are expansions of the first-order Hopfield and Cohen-Grossberg models that allow higher order interactions between neurons. The underlying fuzzy model is of Mamdani type assuming a standard defuzzification procedure such as the weighted average. Learning laws are proposed which ensure that the identification error converges to zero exponentially fast or to a residual set when a modeling error is applied. There are two core ideas in the proposed method: (1) Several high order neural networks are specialized to work around fuzzy centers, separating in this way the system into neuro-fuzzy subsystems, and (2) the use of a novel method called switching parameter hopping against the commonly used projection in order to restrict the weights and avoid drifting to infinity.

  9. An MLSA-based online scheme for the rapid identification of Stenotrophomonas isolates

    Directory of Open Access Journals (Sweden)

    Patrícia Locosque Ramos

    2011-06-01

    Full Text Available An online scheme to assign Stenotrophomonas isolates to genomic groups was developed using the multilocus sequence analysis (MLSA, which is based on the DNA sequencing of selected fragments of the housekeeping genes ATP synthase alpha subunit (atpA, the recombination repair protein (recA, the RNA polymerase alpha subunit (rpoA and the excision repair beta subunit (uvrB. This MLSA-based scheme was validated using eight of the 10 Stenotrophomonas species that have been previously described. The environmental and nosocomial Stenotrophomonas strains were characterised using MLSA, 16S rRNA sequencing and DNA-DNA hybridisation (DDH analyses. Strains of the same species were found to have greater than 95% concatenated sequence similarity and specific strains formed cohesive readily recognisable phylogenetic groups. Therefore, MLSA appeared to be an effective alternative methodology to amplified fragment length polymorphism fingerprint and DDH techniques. Strains of Stenotrophomonas can be readily assigned through the open database resource that was developed in the current study (www.steno.lncc.br/.

  10. Some Numerical Methods for Exponential Analysis with Connection to a General Identification Scheme for Linear Processes

    Science.gov (United States)

    1980-11-01

    identify by block number) System- identification, Prony , exponential analysis, Singularity Expansion Method, transient 20 BTAT(Continue o...produces a "best fit " to the wave- form under analysis in the mean-square 3ense, that is, it minimizes the mean-square error. Some other methods that have...herein to describe the Prony procedure (24], the so-called least squares Prony procedure [9], and the pencil-of-functions method of Jain [191. The

  11. Small Molecule Microarrays Enable the Identification of a Selective, Quadruplex-Binding Inhibitor of MYC Expression.

    Science.gov (United States)

    Felsenstein, Kenneth M; Saunders, Lindsey B; Simmons, John K; Leon, Elena; Calabrese, David R; Zhang, Shuling; Michalowski, Aleksandra; Gareiss, Peter; Mock, Beverly A; Schneekloth, John S

    2016-01-15

    The transcription factor MYC plays a pivotal role in cancer initiation, progression, and maintenance. However, it has proven difficult to develop small molecule inhibitors of MYC. One attractive route to pharmacological inhibition of MYC has been the prevention of its expression through small molecule-mediated stabilization of the G-quadruplex (G4) present in its promoter. Although molecules that bind globally to quadruplex DNA and influence gene expression are well-known, the identification of new chemical scaffolds that selectively modulate G4-driven genes remains a challenge. Here, we report an approach for the identification of G4-binding small molecules using small molecule microarrays (SMMs). We use the SMM screening platform to identify a novel G4-binding small molecule that inhibits MYC expression in cell models, with minimal impact on the expression of other G4-associated genes. Surface plasmon resonance (SPR) and thermal melt assays demonstrated that this molecule binds reversibly to the MYC G4 with single digit micromolar affinity, and with weaker or no measurable binding to other G4s. Biochemical and cell-based assays demonstrated that the compound effectively silenced MYC transcription and translation via a G4-dependent mechanism of action. The compound induced G1 arrest and was selectively toxic to MYC-driven cancer cell lines containing the G4 in the promoter but had minimal effects in peripheral blood mononucleocytes or a cell line lacking the G4 in its MYC promoter. As a measure of selectivity, gene expression analysis and qPCR experiments demonstrated that MYC and several MYC target genes were downregulated upon treatment with this compound, while the expression of several other G4-driven genes was not affected. In addition to providing a novel chemical scaffold that modulates MYC expression through G4 binding, this work suggests that the SMM screening approach may be broadly useful as an approach for the identification of new G4-binding small

  12. A Pre-Detection Based Anti-Collision Algorithm with Adjustable Slot Size Scheme for Tag Identification

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo LIANG

    2015-06-01

    Full Text Available One of the research areas in RFID systems is a tag anti-collision protocol; how to reduce identification time with a given number of tags in the field of an RFID reader. There are two types of tag anti-collision protocols for RFID systems: tree based algorithms and slotted aloha based algorithms. Many anti-collision algorithms have been proposed in recent years, especially in tree based protocols. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. Particularly, the tree based protocols had faced the long identification delay. Recently, a Hybrid Hyper Query Tree (H2QT protocol, which is a tree based approach, was proposed and aiming to speedup tag identification in large scale RFID systems. The main idea of H2QT is to track the tag response and try to predict the distribution of tag IDs in order to reduce collisions. In this paper, we propose a pre-detection tree based algorithm, called the Adaptive Pre-Detection Broadcasting Query Tree algorithm (APDBQT, to avoid those unnecessary queries. Our proposed APDBQT protocol can reduce not only the collisions but the idle cycles as well by using pre-detection scheme and adjustable slot size mechanism. The simulation results show that our proposed technique provides superior performance in high density environments. It is shown that the APDBQT is effective in terms of increasing system throughput and minimizing identification delay.

  13. A PSO Driven Intelligent Model Updating and Parameter Identification Scheme for Cable-Damper System

    Directory of Open Access Journals (Sweden)

    Danhui Dan

    2015-01-01

    Full Text Available The precise measurement of the cable force is very important for monitoring and evaluating the operation status of cable structures such as cable-stayed bridges. The cable system should be installed with lateral dampers to reduce the vibration, which affects the precise measurement of the cable force and other cable parameters. This paper suggests a cable model updating calculation scheme driven by the particle swarm optimization (PSO algorithm. By establishing a finite element model considering the static geometric nonlinearity and stress-stiffening effect firstly, an automatically finite element method model updating powered by PSO algorithm is proposed, with the aims to identify the cable force and relevant parameters of cable-damper system precisely. Both numerical case studies and full-scale cable tests indicated that, after two rounds of updating process, the algorithm can accurately identify the cable force, moment of inertia, and damping coefficient of the cable-damper system.

  14. A peptide-retrieval strategy enables significant improvement of quantitative performance without compromising confidence of identification.

    Science.gov (United States)

    Tu, Chengjian; Shen, Shichen; Sheng, Quanhu; Shyr, Yu; Qu, Jun

    2017-01-30

    Reliable quantification of low-abundance proteins in complex proteomes is challenging largely owing to the limited number of spectra/peptides identified. In this study we developed a straightforward method to improve the quantitative accuracy and precision of proteins by strategically retrieving the less confident peptides that were previously filtered out using the standard target-decoy search strategy. The filtered-out MS/MS spectra matched to confidently-identified proteins were recovered, and the peptide-spectrum-match FDR were re-calculated and controlled at a confident level of FDR≤1%, while protein FDR maintained at ~1%. We evaluated the performance of this strategy in both spectral count- and ion current-based methods. >60% increase of total quantified spectra/peptides was respectively achieved for analyzing a spike-in sample set and a public dataset from CPTAC. Incorporating the peptide retrieval strategy significantly improved the quantitative accuracy and precision, especially for low-abundance proteins (e.g. one-hit proteins). Moreover, the capacity of confidently discovering significantly-altered proteins was also enhanced substantially, as demonstrated with two spike-in datasets. In summary, improved quantitative performance was achieved by this peptide recovery strategy without compromising confidence of protein identification, which can be readily implemented in a broad range of quantitative proteomics techniques including label-free or labeling approaches. We hypothesize that more quantifiable spectra and peptides in a protein, even including less confident peptides, could help reduce variations and improve protein quantification. Hence the peptide retrieval strategy was developed and evaluated in two spike-in sample sets with different LC-MS/MS variations using both MS1- and MS2-based quantitative approach. The list of confidently identified proteins using the standard target-decoy search strategy was fixed and more spectra/peptides with less

  15. An automatic microseismic or acoustic emission arrival identification scheme with deep recurrent neural networks

    Science.gov (United States)

    Zheng, Jing; Lu, Jiren; Peng, Suping; Jiang, Tianqi

    2018-02-01

    The conventional arrival pick-up algorithms cannot avoid the manual modification of the parameters for the simultaneous identification of multiple events under different signal-to-noise ratios (SNRs). Therefore, in order to automatically obtain the arrivals of multiple events with high precision under different SNRs, in this study an algorithm was proposed which had the ability to pick up the arrival of microseismic or acoustic emission events based on deep recurrent neural networks. The arrival identification was performed using two important steps, which included a training phase and a testing phase. The training process was mathematically modelled by deep recurrent neural networks using Long Short-Term Memory architecture. During the testing phase, the learned weights were utilized to identify the arrivals through the microseismic/acoustic emission data sets. The data sets were obtained by rock physics experiments of the acoustic emission. In order to obtain the data sets under different SNRs, this study added random noise to the raw experiments' data sets. The results showed that the outcome of the proposed method was able to attain an above 80 per cent hit-rate at SNR 0 dB, and an approximately 70 per cent hit-rate at SNR -5 dB, with an absolute error in 10 sampling points. These results indicated that the proposed method had high selection precision and robustness.

  16. Study of manufacturing resource perception and process control of a radio-frequency-identification-enabled decentralized flexible manufacturing system

    Directory of Open Access Journals (Sweden)

    Zengqiang Jiang

    2017-01-01

    Full Text Available The fusion of mechatronics, communication, control, and information technologies has introduced new automation paradigms into the production environment. Plug-and-play flexible manufacturing systems will become suitable approaches in the future for the development of modular, flexible, and reconfigurable manufacturing systems, addressing the requirements of global markets. This article introduces a Petri Net model-driven methodology for the development, validation, and operation of a radio-frequency identification-enabled decentralized flexible manufacturing system. After analyzing the manufacturing processes and resources of a flexible manufacturing system, the manufacturing resources are classified into active and passive resources. Each active resource is equipped with a radio-frequency identification reader and each passive resource is banded with a radio-frequency identification tag. Real-time state and behavior logic models are built for manufacturing resources based on extended Petri Nets; the models are translated into XML and integrated with the manufacturing resources. In this fashion, each manufacturing resource becomes an autonomous agent, and it can make self-decisions and update its status through the twinned models. In this manner, automatic perception and process control are realized. Finally, the effectiveness and feasibility of the method are verified in an experimental system.

  17. A Very Low-Speed Sensorless Induction Motor Drive with Online Stator Resistance identification scheme

    Directory of Open Access Journals (Sweden)

    M. Zaky

    2008-03-01

    Full Text Available Recently, speed sensorless control of induction motor drives received great attention to avoid the different problems associated with direct speed sensors. However, low speed operation with robustness against parameter variations remains an area of research for sensorless systems. Stator resistance is of greatest importance for good operation of speed sensorless systems in low speed region. In this paper, a sliding mode current observer for an induction motor is presented. An estimation algorithm based on this observer in conjunction with Popov's hyper-stability theory is proposed to calculate the speed and stator resistance independently. The proposed speed observer with parallel stator resistance identification is firstly verified by simulation. Experimental results are included as well to demonstrate the good performance of the proposed observer and estimation algorithms at low speed.

  18. Stability improvement of induction motor based on stator parameter identification scheme

    Science.gov (United States)

    Kang, Shanlin; Kang, Yuzhe; Chen, Jingwei

    2008-10-01

    A new method for stator resistance identification based on wavelet network is presented to improve the operating performance of induction motor. The ripple of the torque is kept constant, resulting in a variable switching frequency, which depends on the tolerance band of the control. Due to wavelet transform behaving good localization property in both time and frequency space and multi-scale property, the wavelet function is adopted as the basic function of neural network. The current error and the change in the current error are the inputs of the wavelet network and the stator resistance error is the output of the wavelet network. The network parameters are initialized by the improved least squares algorithm. The parameters of wavelet network are tuned online to approximate the unknown nonlinear model with an appropriately chosen adaptive mechanism. The proposed method is proved to be efficient to reduce the torque ripple and current ripple by detailed comparison simulation results.

  19. Identification of human telomerase assembly inhibitors enabled by a novel method to produce hTERT

    Science.gov (United States)

    Kellermann, Guillaume; Kaiser, Markus; Dingli, Florent; Lahuna, Olivier; Naud-Martin, Delphine; Mahuteau-Betzer, Florence; Loew, Damarys; Ségal-Bendirdjian, Evelyne; Teulade-Fichou, Marie-Paule; Bombard, Sophie

    2015-01-01

    Telomerase is the enzyme that maintains the length of telomeres. It is minimally constituted of two components: a core reverse transcriptase protein (hTERT) and an RNA (hTR). Despite its significance as an almost universal cancer target, the understanding of the structure of telomerase and the optimization of specific inhibitors have been hampered by the limited amount of enzyme available. Here, we present a breakthrough method to produce unprecedented amounts of recombinant hTERT and to reconstitute human telomerase with purified components. This system provides a decisive tool to identify regulators of the assembly of this ribonucleoprotein complex. It also enables the large-scale screening of small-molecules capable to interfere with telomerase assembly. Indeed, it has allowed us to identify a compound that inhibits telomerase activity when added prior to the assembly of the enzyme, while it has no effect on an already assembled telomerase. Therefore, the novel system presented here may accelerate the understanding of human telomerase assembly and facilitate the discovery of potent and mechanistically unique inhibitors. PMID:25958399

  20. Homogeneous datasets of triple negative breast cancers enable the identification of novel prognostic and predictive signatures.

    Directory of Open Access Journals (Sweden)

    Thomas Karn

    Full Text Available BACKGROUND: Current prognostic gene signatures for breast cancer mainly reflect proliferation status and have limited value in triple-negative (TNBC cancers. The identification of prognostic signatures from TNBC cohorts was limited in the past due to small sample sizes. METHODOLOGY/PRINCIPAL FINDINGS: We assembled all currently publically available TNBC gene expression datasets generated on Affymetrix gene chips. Inter-laboratory variation was minimized by filtering methods for both samples and genes. Supervised analysis was performed to identify prognostic signatures from 394 cases which were subsequently tested on an independent validation cohort (n = 261 cases. CONCLUSIONS/SIGNIFICANCE: Using two distinct false discovery rate thresholds, 25% and <3.5%, a larger (n = 264 probesets and a smaller (n = 26 probesets prognostic gene sets were identified and used as prognostic predictors. Most of these genes were positively associated with poor prognosis and correlated to metagenes for inflammation and angiogenesis. No correlation to other previously published prognostic signatures (recurrence score, genomic grade index, 70-gene signature, wound response signature, 7-gene immune response module, stroma derived prognostic predictor, and a medullary like signature was observed. In multivariate analyses in the validation cohort the two signatures showed hazard ratios of 4.03 (95% confidence interval [CI] 1.71-9.48; P = 0.001 and 4.08 (95% CI 1.79-9.28; P = 0.001, respectively. The 10-year event-free survival was 70% for the good risk and 20% for the high risk group. The 26-gene signatures had modest predictive value (AUC = 0.588 to predict response to neoadjuvant chemotherapy, however, the combination of a B-cell metagene with the prognostic signatures increased its response predictive value. We identified a 264-gene prognostic signature for TNBC which is unrelated to previously known prognostic signatures.

  1. Bioactive nanofibers enable the identification of thrombospondin 2 as a key player in enamel regeneration.

    Science.gov (United States)

    Huang, Zhan; Newcomb, Christina J; Lei, Yaping; Zhou, Yan; Bornstein, Paul; Amendt, Brad A; Stupp, Samuel I; Snead, Malcolm L

    2015-08-01

    Tissue regeneration and development involves highly synchronized signals both between cells and with the extracellular environment. Biomaterials can be tuned to mimic specific biological signals and control cell response(s). As a result, these materials can be used as tools to elucidate cell signaling pathways and candidate molecules involved with cellular processes. In this work, we explore enamel-forming cells, ameloblasts, which have a limited regenerative capacity. By exposing undifferentiated cells to a self-assembling matrix bearing RGDS epitopes, we elicited a regenerative signal at will that subsequently led to the identification of thrombospondin 2 (TSP2), an extracellular matrix protein that has not been previously recognized as a key player in enamel development and regeneration. Targeted disruption of the thrombospondin 2 gene (Thbs2) resulted in enamel formation with a disordered architecture that was highly susceptible to wear compared to their wild-type counterparts. To test the regenerative capacity, we injected the bioactive matrix into the enamel organ and discovered that the enamel organic epithelial cells in TSP-null mice failed to polarize on the surface of the artificial matrix, greatly reducing integrin β1 and Notch1 expression levels, which represent signaling pathways known to be associated with TSP2. These results suggest TSP2 plays an important role in regulating cell-matrix interactions during enamel formation. Exploiting the signaling pathways activated by biomaterials can provide insight into native signaling mechanisms crucial for tooth development and cell-based strategies for enamel regeneration. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. An Ultrafast Maximum Power Point Setting Scheme for Photovoltaic Arrays Using Model Parameter Identification

    Directory of Open Access Journals (Sweden)

    Zhaohui Cen

    2015-01-01

    Full Text Available Maximum power point tracking (MPPT for photovoltaic (PV arrays is essential to optimize conversion efficiency under variable and nonuniform irradiance conditions. Unfortunately, conventional MPPT algorithms such as perturb and observe (P&O, incremental conductance, and current sweep method need to iterate command current or voltage and frequently operate power converters with associated losses. Under partial overcast conditions, tracking the real MPP in multipeak P-I or P-V curve model becomes highly challenging, with associated increase in search time and converter operation, leading to unnecessary power being lost in the MPP tracking process. In this paper, the noted drawbacks in MPPT-controlled converters are addressed. In order to separate the search algorithms from converter operation, a model parameter identification approach is presented to estimate insolation conditions of each PV panel and build a real-time overall P-I curve of PV arrays. Subsequently a simple but effective global MPPT algorithm is proposed to track the MPP in the overall P-I curve obtained from the identified PV array model, ensuring that the converter works at the MPP. The novel MPPT is ultrafast, resulting in conserved power in the tracking process. Finally, simulations in different scenarios are executed to validate the novel scheme’s effectiveness and advantages.

  3. Simple and robust referencing system enables identification of dissolved-phase xenon spectral frequencies.

    Science.gov (United States)

    Antonacci, Michael A; Zhang, Le; Burant, Alex; McCallister, Drew; Branca, Rosa T

    2017-12-19

    To assess the effect of macroscopic susceptibility gradients on the gas-phase referenced dissolved-phase 129 Xe (DPXe) chemical shift (CS) and to establish the robustness of a water-based referencing system for in vivo DPXe spectra. Frequency shifts induced by spatially varying magnetic susceptibility are calculated by finite-element analysis for the human head and chest. Their effect on traditional gas-phase referenced DPXe CS is then assessed theoretically and experimentally. A water-based referencing system for the DPXe resonances that uses the local water protons as reference is proposed and demonstrated in vivo in rats. Across the human brain, macroscopic susceptibility gradients can induce an apparent variation in the DPXe CS of up to 2.5 ppm. An additional frequency shift as large as 6.5 ppm can exist between DPXe and gas-phase resonances. By using nearby water protons as reference for the DPXe CS, the effect of macroscopic susceptibility gradients is eliminated and consistent CS values are obtained in vivo, regardless of shimming conditions, region of interest analyzed, animal orientation, or lung inflation. Combining in vitro and in vivo spectroscopic measurements finally enables confident assignment of some of the DPXe peaks observed in vivo. To use hyperpolarized xenon as a biological probe in tissues, the DPXe CS in specific organs/tissues must be reliably measured. When the gas-phase is used as reference, variable CS values are obtained for DPXe resonances. Reliable peak assignments in DPXe spectra can be obtained by using local water protons as reference. Magn Reson Med, 2017. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  4. Enabling the identification, quantification, and characterization of organics in complex mixtures to understand atmospheric aerosols

    Science.gov (United States)

    Isaacman, Gabriel Avram

    Particles in the atmosphere are known to have negative health effects and important but highly uncertain impacts on global and regional climate. A majority of this particulate matter is formed through atmospheric oxidation of naturally and anthropogenically emitted gases to yield highly oxygenated secondary organic aerosol (SOA), an amalgamation of thousands of individual chemical compounds. However, comprehensive analysis of SOA composition has been stymied by its complexity and lack of available measurement techniques. In this work, novel instrumentation, analysis methods, and conceptual frameworks are introduced for chemically characterizing atmospherically relevant mixtures and ambient aerosols, providing a fundamentally new level of detailed knowledge on their structures, chemical properties, and identification of their components. This chemical information is used to gain insights into the formation, transformation and oxidation of organic aerosols. Biogenic and anthropogenic mixtures are observed in this work to yield incredible complexity upon oxidation, producing over 100 separable compounds from a single precursor. As a first step toward unraveling this complexity, a method was developed for measuring the polarity and volatility of individual compounds in a complex mixture using two-dimensional gas chromatography, which is demonstrated in Chapter 2 for describing the oxidation of SOA formed from a biogenic compound (longifolene: C15H24). Several major products and tens of substantial minor products were produced, but none could be identified by traditional methods or have ever been isolated and studied in the laboratory. A major realization of this work was that soft ionization mass spectrometry could be used to identify the molecular mass and formula of these unidentified compounds, a major step toward a comprehensive description of complex mixtures. This was achieved by coupling gas chromatography to high resolution time-of-flight mass spectrometry with

  5. Combination of Chemical Genetics and Phosphoproteomics for Kinase Signaling Analysis Enables Confident Identification of Cellular Downstream Targets*

    Science.gov (United States)

    Oppermann, Felix S.; Grundner-Culemann, Kathrin; Kumar, Chanchal; Gruss, Oliver J.; Jallepalli, Prasad V.; Daub, Henrik

    2012-01-01

    Delineation of phosphorylation-based signaling networks requires reliable data about the underlying cellular kinase-substrate interactions. We report a chemical genetics and quantitative phosphoproteomics approach that encompasses cellular kinase activation in combination with comparative replicate mass spectrometry analyses of cells expressing either inhibitor-sensitive or resistant kinase variant. We applied this workflow to Plk1 (Polo-like kinase 1) in mitotic cells and induced cellular Plk1 activity by wash-out of the bulky kinase inhibitor 3-MB-PP1, which targets a mutant kinase version with an enlarged catalytic pocket while not interfering with wild-type Plk1. We quantified more than 20,000 distinct phosphorylation sites by SILAC, approximately half of which were measured in at least two independent experiments in cells expressing mutant and wild-type Plk1. Based on replicate phosphorylation site quantifications in both mutant and wild-type Plk1 cells, our chemical genetic proteomics concept enabled stringent comparative statistics by significance analysis of microarrays, which unveiled more than 350 cellular downstream targets of Plk1 validated by full concordance of both statistical and experimental data. Our data point to hitherto poorly characterized aspects in Plk1-controlled mitotic progression and provide a largely extended resource for functional studies. We anticipate the described strategies to be of general utility for systematic and confident identification of cellular protein kinase substrates. PMID:22199227

  6. Combination of chemical genetics and phosphoproteomics for kinase signaling analysis enables confident identification of cellular downstream targets.

    Science.gov (United States)

    Oppermann, Felix S; Grundner-Culemann, Kathrin; Kumar, Chanchal; Gruss, Oliver J; Jallepalli, Prasad V; Daub, Henrik

    2012-04-01

    Delineation of phosphorylation-based signaling networks requires reliable data about the underlying cellular kinase-substrate interactions. We report a chemical genetics and quantitative phosphoproteomics approach that encompasses cellular kinase activation in combination with comparative replicate mass spectrometry analyses of cells expressing either inhibitor-sensitive or resistant kinase variant. We applied this workflow to Plk1 (Polo-like kinase 1) in mitotic cells and induced cellular Plk1 activity by wash-out of the bulky kinase inhibitor 3-MB-PP1, which targets a mutant kinase version with an enlarged catalytic pocket while not interfering with wild-type Plk1. We quantified more than 20,000 distinct phosphorylation sites by SILAC, approximately half of which were measured in at least two independent experiments in cells expressing mutant and wild-type Plk1. Based on replicate phosphorylation site quantifications in both mutant and wild-type Plk1 cells, our chemical genetic proteomics concept enabled stringent comparative statistics by significance analysis of microarrays, which unveiled more than 350 cellular downstream targets of Plk1 validated by full concordance of both statistical and experimental data. Our data point to hitherto poorly characterized aspects in Plk1-controlled mitotic progression and provide a largely extended resource for functional studies. We anticipate the described strategies to be of general utility for systematic and confident identification of cellular protein kinase substrates.

  7. BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service

    Directory of Open Access Journals (Sweden)

    Han Zou

    2016-02-01

    Full Text Available The location and contextual status (indoor or outdoor is fundamental and critical information for upper-layer applications, such as activity recognition and location-based services (LBS for individuals. In addition, optimizations of building management systems (BMS, such as the pre-cooling or heating process of the air-conditioning system according to the human traffic entering or exiting a building, can utilize the information, as well. The emerging mobile devices, which are equipped with various sensors, become a feasible and flexible platform to perform indoor-outdoor (IO detection. However, power-hungry sensors, such as GPS and WiFi, should be used with caution due to the constrained battery storage on mobile device. We propose BlueDetect: an accurate, fast response and energy-efficient scheme for IO detection and seamless LBS running on the mobile device based on the emerging low-power iBeacon technology. By leveraging the on-broad Bluetooth module and our proposed algorithms, BlueDetect provides a precise IO detection service that can turn on/off on-board power-hungry sensors smartly and automatically, optimize their performances and reduce the power consumption of mobile devices simultaneously. Moreover, seamless positioning and navigation services can be realized by it, especially in a semi-outdoor environment, which cannot be achieved by GPS or an indoor positioning system (IPS easily. We prototype BlueDetect on Android mobile devices and evaluate its performance comprehensively. The experimental results have validated the superiority of BlueDetect in terms of IO detection accuracy, localization accuracy and energy consumption.

  8. A robust haze-removal scheme in polarimetric dehazing imaging based on automatic identification of sky region

    Science.gov (United States)

    Zhang, Wenfei; Liang, Jian; Ju, Haijuan; Ren, Liyong; Qu, Enshi; Wu, Zhaoxin

    2016-12-01

    Quality enhancement of images acquired in hazy conditions is a significant research area in civil and military applications. The polarimetric dehazing methods have been exploited to dehaze hazy images and have proven to be effective in enhancing their quality. In this paper, by combining the polarimetric imaging technique and the dark channel prior technique, a robust haze-removal scheme is presented for the first time. On the one hand, the polarimetric imaging technique has advantages in recovering detailed information well, especially in dense hazy conditions; on the other hand, the dark channel prior technique provides a much more precise and convenient way to estimate the airlight radiance through extracting the sky region automatically. The experiments verify the practicability and effectiveness of the proposed dehazing scheme in quality enhancement of hazy images. Furthermore, comparison study demonstrates that the proposed scheme is superior to some sophisticated methods in terms of the visibility and contrast. We believe this scheme is beneficial in the image dehazing applications, especially for real-time applications.

  9. A proteogenomics approach integrating proteomics and ribosome profiling increases the efficiency of protein identification and enables the discovery of alternative translation start sites.

    Science.gov (United States)

    Koch, Alexander; Gawron, Daria; Steyaert, Sandra; Ndah, Elvis; Crappé, Jeroen; De Keulenaer, Sarah; De Meester, Ellen; Ma, Ming; Shen, Ben; Gevaert, Kris; Van Criekinge, Wim; Van Damme, Petra; Menschaert, Gerben

    2014-12-01

    Next-generation transcriptome sequencing is increasingly integrated with MS to enhance MS-based protein and peptide identification. Recently, a breakthrough in transcriptome analysis was achieved with the development of ribosome profiling (ribo-seq). This technology is based on the deep sequencing of ribosome-protected mRNA fragments, thereby enabling the direct observation of in vivo protein synthesis at the transcript level. In order to explore the impact of a ribo-seq-derived protein sequence search space on MS/MS spectrum identification, we performed a comprehensive proteome study on a human cancer cell line, using both shotgun and N-terminal proteomics, next to ribosome profiling, which was used to delineate (alternative) translational reading frames. By including protein-level evidence of sample-specific genetic variation and alternative translation, this strategy improved the identification score of 69 proteins and identified 22 new proteins in the shotgun experiment. Furthermore, we discovered 18 new alternative translation start sites in the N-terminal proteomics data and observed a correlation between the quantitative measures of ribo-seq and shotgun proteomics with a Pearson correlation coefficient ranging from 0.483 to 0.664. Overall, this study demonstrated the benefits of ribosome profiling for MS-based protein and peptide identification and we believe this approach could develop into a common practice for next-generation proteomics. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. In-house construction of a UHPLC system enabling the identification of over 4000 protein groups in a single analysis.

    Science.gov (United States)

    Cristobal, Alba; Hennrich, Marco L; Giansanti, Piero; Goerdayal, Soenita S; Heck, Albert J R; Mohammed, Shabaz

    2012-08-07

    Here, we describe an in-house built ultra-high pressure liquid chromatography (UHPLC) system, with little complexity in design and high separation power combined with convenience in operation. This system enables the use of long columns of 40 cm packed with 1.8 μm particles generating pressures below 1000 bar. Furthermore, the system could be operated at flow rates between 50 and 200 nL min(-1) while maintaining its separation power. Several gradients were optimized ranging from 23 to 458 minutes. With the longest gradient we identified over 4500 protein groups and more than 26,000 unique peptides from 1 μg of a human cancer cell lysate in a single run using an Orbitrap Velos - a level of performance often seen solely using multidimensional separation strategies. Further experiments using a mass spectrometer with faster sequencing speeds, like the TripleTOF 5600, enabled us to identify over 1400 protein groups in a 23 min gradient. The TripleTOF 5600 performed especially well, compared to the Orbitrap Velos, for the shorter gradients used. Our data demonstrate that the combination of UHPLC with high resolution mass spectrometry at increased sequencing speeds enables extensive proteome analysis in single runs.

  11. Calibrating snakehead diversity with DNA barcodes: expanding taxonomic coverage to enable identification of potential and established invasive species.

    Science.gov (United States)

    Serrao, Natasha R; Steinke, Dirk; Hanner, Robert H

    2014-01-01

    Detecting and documenting the occurrence of invasive species outside their native range requires tools to support their identification. This can be challenging for taxa with diverse life stages and/or problematic or unresolved morphological taxonomies. DNA barcoding provides a potent method for identifying invasive species, as it allows for species identification at all life stages, including fragmentary remains. It also provides an efficient interim taxonomic framework for quantifying cryptic genetic diversity by parsing barcode sequences into discontinuous haplogroup clusters (typical of reproductively isolated species) and labelling them with unique alphanumeric identifiers. Snakehead fishes are a diverse group of opportunistic predators endemic to Asia and Africa that may potentially pose significant threats as aquatic invasive species. At least three snakehead species (Channa argus, C. maculata, and C. marulius) are thought to have entered North America through the aquarium and live-food fish markets, and have established populations, yet their origins remain unclear. The objectives of this study were to assemble a library of DNA barcode sequences derived from expert identified reference specimens in order to determine the identity and aid invasion pathway analysis of the non-indigenous species found in North America using DNA barcodes. Sequences were obtained from 121 tissue samples representing 25 species and combined with public records from GenBank for a total of 36 putative species, which then partitioned into 49 discrete haplogroups. Multiple divergent clusters were observed within C. gachua, C. marulius, C. punctata and C. striata suggesting the potential presence of cryptic species diversity within these lineages. Our findings demonstrate that DNA barcoding is a valuable tool for species identification in challenging and under-studied taxonomic groups such as snakeheads, and provides a useful framework for inferring invasion pathway analysis.

  12. Calibrating snakehead diversity with DNA barcodes: expanding taxonomic coverage to enable identification of potential and established invasive species.

    Directory of Open Access Journals (Sweden)

    Natasha R Serrao

    Full Text Available Detecting and documenting the occurrence of invasive species outside their native range requires tools to support their identification. This can be challenging for taxa with diverse life stages and/or problematic or unresolved morphological taxonomies. DNA barcoding provides a potent method for identifying invasive species, as it allows for species identification at all life stages, including fragmentary remains. It also provides an efficient interim taxonomic framework for quantifying cryptic genetic diversity by parsing barcode sequences into discontinuous haplogroup clusters (typical of reproductively isolated species and labelling them with unique alphanumeric identifiers. Snakehead fishes are a diverse group of opportunistic predators endemic to Asia and Africa that may potentially pose significant threats as aquatic invasive species. At least three snakehead species (Channa argus, C. maculata, and C. marulius are thought to have entered North America through the aquarium and live-food fish markets, and have established populations, yet their origins remain unclear. The objectives of this study were to assemble a library of DNA barcode sequences derived from expert identified reference specimens in order to determine the identity and aid invasion pathway analysis of the non-indigenous species found in North America using DNA barcodes. Sequences were obtained from 121 tissue samples representing 25 species and combined with public records from GenBank for a total of 36 putative species, which then partitioned into 49 discrete haplogroups. Multiple divergent clusters were observed within C. gachua, C. marulius, C. punctata and C. striata suggesting the potential presence of cryptic species diversity within these lineages. Our findings demonstrate that DNA barcoding is a valuable tool for species identification in challenging and under-studied taxonomic groups such as snakeheads, and provides a useful framework for inferring invasion pathway

  13. Tip-tilt disturbance model identification for Kalman-based control scheme: application to XAO and ELT systems.

    Science.gov (United States)

    Meimon, Serge; Petit, Cyril; Fusco, Thierry; Kulcsar, Caroline

    2010-11-01

    Adaptive optics (AO) systems have to correct tip-tilt (TT) disturbances down to a fraction of the diffraction-limited spot. This becomes a key issue for very or extremely large telescopes affected by mechanical vibration peaks or wind shake effects. Linear quadratic Gaussian (LQG) control achieves optimal TT correction when provided with the temporal model of the disturbance. We propose a nonsupervised identification procedure that does not require any auxiliary system or loop opening and validate it on synthetic profile as well as on experimental data.

  14. High-throughput sequencing enhanced phage display enables the identification of patient-specific epitope motifs in serum

    DEFF Research Database (Denmark)

    Christiansen, Anders; Kringelum, Jens Vindahl; Hansen, Christian Skjødt

    2015-01-01

    Phage display is a prominent screening technique with a multitude of applications including therapeutic antibody development and mapping of antigen epitopes. In this study, phages were selected based on their interaction with patient serum and exhaustively characterised by high-throughput sequenc......Phage display is a prominent screening technique with a multitude of applications including therapeutic antibody development and mapping of antigen epitopes. In this study, phages were selected based on their interaction with patient serum and exhaustively characterised by high......-throughput sequencing. A bioinformatics approach was developed in order to identify peptide motifs of interest based on clustering and contrasting to control samples. Comparison of patient and control samples confirmed a major issue in phage display, namely the selection of unspecific peptides. The potential...... display by (i) enabling the analysis of complex biological samples, (ii) circumventing the traditional laborious picking and functional testing of individual phage clones and (iii) reducing the number of selection rounds....

  15. Identification and characterization of hierarchical structures in dog breeding schemes, a novel method applied to the Norfolk Terrier.

    Science.gov (United States)

    Wellmann, R; Bennewitz, J

    2011-12-01

    Popular sires, a limited population size, and the founder event are widely considered the main reasons for the low genetic diversity observed in many dog breeds. However, these factors have had only a small role in the historic decrease in diversity observed in the Norfolk Terrier breed. We show that the decrease in this breed has been mainly due to large, popular kennels. Dogs from these kennels have, on average, larger genetic contributions to subsequent generations than others. A test for the presence of a popular kennel effect is proposed and applied (P dog breeding schemes, with an asymmetric gene flow predominantly from the nuclei toward the main population. Possible reasons for this structure and implications for future population management are discussed. The main reason is probably that the breed type was established by large, popular kennels and that small kennel breeders used their stud dogs to benefit from the achievements of the popular kennels. Many kennels, however, were unable to make their own substantial genetic contributions to the breed.

  16. Multivalent peptidic linker enables identification of preferred sites of conjugation for a potent thialanstatin antibody drug conjugate.

    Directory of Open Access Journals (Sweden)

    Sujiet Puthenveetil

    Full Text Available Antibody drug conjugates (ADCs are no longer an unknown entity in the field of cancer therapy with the success of marketed ADCs like ADCETRIS and KADCYLA and numerous others advancing through clinical trials. The pursuit of novel cytotoxic payloads beyond the mictotubule inhibitors and DNA damaging agents has led us to the recent discovery of an mRNA splicing inhibitor, thailanstatin, as a potent ADC payload. In our previous work, we observed that the potency of this payload was uniquely tied to the method of conjugation, with lysine conjugates showing much superior potency as compared to cysteine conjugates. However, the ADC field is rapidly shifting towards site-specific ADCs due to their advantages in manufacturability, characterization and safety. In this work we report the identification of a highly efficacious site-specific thailanstatin ADC. The site of conjugation played a critical role on both the in vitro and in vivo potency of these ADCs. During the course of this study, we developed a novel methodology of loading a single site with multiple payloads using an in situ generated multi-drug carrying peptidic linker that allowed us to rapidly screen for optimal conjugation sites. Using this methodology, we were able to identify a double-cysteine mutant ADC delivering four-loaded thailanstatin that was very efficacious in a gastric cancer xenograft model at 3mg/kg and was also shown to be efficacious against T-DM1 resistant and MDR1 overexpressing tumor cell lines.

  17. Multivalent peptidic linker enables identification of preferred sites of conjugation for a potent thialanstatin antibody drug conjugate.

    Science.gov (United States)

    Puthenveetil, Sujiet; He, Haiyin; Loganzo, Frank; Musto, Sylvia; Teske, Jesse; Green, Michael; Tan, Xingzhi; Hosselet, Christine; Lucas, Judy; Tumey, L Nathan; Sapra, Puja; Subramanyam, Chakrapani; O'Donnell, Christopher J; Graziani, Edmund I

    2017-01-01

    Antibody drug conjugates (ADCs) are no longer an unknown entity in the field of cancer therapy with the success of marketed ADCs like ADCETRIS and KADCYLA and numerous others advancing through clinical trials. The pursuit of novel cytotoxic payloads beyond the mictotubule inhibitors and DNA damaging agents has led us to the recent discovery of an mRNA splicing inhibitor, thailanstatin, as a potent ADC payload. In our previous work, we observed that the potency of this payload was uniquely tied to the method of conjugation, with lysine conjugates showing much superior potency as compared to cysteine conjugates. However, the ADC field is rapidly shifting towards site-specific ADCs due to their advantages in manufacturability, characterization and safety. In this work we report the identification of a highly efficacious site-specific thailanstatin ADC. The site of conjugation played a critical role on both the in vitro and in vivo potency of these ADCs. During the course of this study, we developed a novel methodology of loading a single site with multiple payloads using an in situ generated multi-drug carrying peptidic linker that allowed us to rapidly screen for optimal conjugation sites. Using this methodology, we were able to identify a double-cysteine mutant ADC delivering four-loaded thailanstatin that was very efficacious in a gastric cancer xenograft model at 3mg/kg and was also shown to be efficacious against T-DM1 resistant and MDR1 overexpressing tumor cell lines.

  18. Identification of Value Proposition and Development of Innovative Business Models for Demand Response Products and Services Enabled by the DR-BOB Solution

    Directory of Open Access Journals (Sweden)

    Mario Sisinni

    2017-10-01

    Full Text Available The work presented is the result of an ongoing European H2020 project entitled DR-BOB Demand Response in Blocks of Buildings (DR-BOB that seeks to integrate existing technologies to create a scalable solution for Demand Response (DR in blocks of buildings. In most EU countries, DR programs are currently limited to the industrial sector and to direct asset control. The DR-BOB solution extends applicability to the building sector, providing predictive building management in blocks of buildings, enabling facilities managers to respond to implicit and explicit DR schemes, and enabling the aggregation of the DR potential of many blocks of buildings for use in demand response markets. The solution consists of three main components: the Local Energy Manager (LEM, which adds intelligence and provides the capacity for predictive building management in blocks of buildings, a Consumer Portal (CP to enable building managers and building occupants to interact with the system and be engaged in demand response operations, and a Decentralized Energy Management System (DEMS®, Siemens plc, Nottingham, England, UK, which enables the aggregation of the DR potential of many blocks of buildings, thus allowing participation in incentive-based demand response with or without an aggregator. The paper reports the key results around Business Modelling development for demand response products and services enabled by the DR-BOB solution. The scope is threefold: (1 illustrate how the functionality of the demand response solution can provide value proposition to underpin its exploitation by four specific customer segments, namely aggregators and three types of Owners of Blocks of Buildings in different market conditions, (2 explore key aspects of the Business Model from the point of view of a demand response solution provider, in particular around most the suitable revenue stream and key partnership, and (3 assess the importance of key variables such as market maturity, user

  19. A novel rapid DNA microarray assay enables identification of 37 Mycoplasma species and highlights multiple Mycoplasma infections.

    Directory of Open Access Journals (Sweden)

    Christiane Schnee

    Full Text Available Mycoplasmas comprise a conglomerate of pathogens and commensals occurring in humans and animals. The genus Mycoplasma alone contains more than 120 species at present, and new members are continuously being discovered. Therefore, it seems promising to use a single highly parallel detection assay rather than develop separate tests for each individual species. In this study, we have designed a DNA microarray carrying 70 oligonucleotide probes derived from the 23S rRNA gene and 86 probes from the tuf gene target regions. Following a PCR amplification and biotinylation step, hybridization on the array was shown to specifically identify 31 Mycoplasma spp., as well as 3 Acholeplasma spp. and 3 Ureaplasma spp. Members of the Mycoplasma mycoides cluster can be recognized at subgroup level. This procedure enables parallel detection of Mollicutes spp. occurring in humans, animals or cell culture, from mono- and multiple infections, in a single run. The main advantages of the microarray assay include ease of operation, rapidity, high information content, and affordability. The new test's analytical sensitivity is equivalent to that of real-time PCR and allows examination of field samples without the need for culture. When 60 field samples from ruminants and birds previously analyzed by denaturing-gradient gel electrophoresis (DGGE were tested by the microarray assay both tests identified the same agent in 98.3% of the cases. Notably, microarray testing revealed an unexpectedly high proportion (35% of multiple mycoplasma infections, i.e., substantially more than DGGE (15%. Two of the samples were found to contain four different Mycoplasma spp. This phenomenon deserves more attention, particularly its implications for epidemiology and treatment.

  20. Cross-species mapping of bidirectional promoters enables prediction of unannotated 5' UTRs and identification of species-specific transcripts

    Directory of Open Access Journals (Sweden)

    Lewin Harris A

    2009-04-01

    Full Text Available Abstract Background Bidirectional promoters are shared regulatory regions that influence the expression of two oppositely oriented genes. This type of regulatory architecture is found more frequently than expected by chance in the human genome, yet many specifics underlying the regulatory design are unknown. Given that the function of most orthologous genes is similar across species, we hypothesized that the architecture and regulation of bidirectional promoters might also be similar across species, representing a core regulatory structure and enabling annotation of these regions in additional mammalian genomes. Results By mapping the intergenic distances of genes in human, chimpanzee, bovine, murine, and rat, we show an enrichment for pairs of genes equal to or less than 1,000 bp between their adjacent 5' ends ("head-to-head" compared to pairs of genes that fall in the same orientation ("head-to-tail" or whose 3' ends are side-by-side ("tail-to-tail". A representative set of 1,369 human bidirectional promoters was mapped to orthologous sequences in other mammals. We confirmed predictions for 5' UTRs in nine of ten manual picks in bovine based on comparison to the orthologous human promoter set and in six of seven predictions in human based on comparison to the bovine dataset. The two predictions that did not have orthology as bidirectional promoters in the other species resulted from unique events that initiated transcription in the opposite direction in only those species. We found evidence supporting the independent emergence of bidirectional promoters from the family of five RecQ helicase genes, which gained their bidirectional promoters and partner genes independently rather than through a duplication process. Furthermore, by expanding our comparisons from pairwise to multispecies analyses we developed a map representing a core set of bidirectional promoters in mammals. Conclusion We show that the orthologous positions of bidirectional

  1. An Inducible Lentiviral Guide RNA Platform Enables the Identification of Tumor-Essential Genes and Tumor-Promoting Mutations In Vivo

    Directory of Open Access Journals (Sweden)

    Brandon J. Aubrey

    2015-03-01

    Full Text Available The CRISPR/Cas9 technology enables the introduction of genomic alterations into almost any organism; however, systems for efficient and inducible gene modification have been lacking, especially for deletion of essential genes. Here, we describe a drug-inducible small guide RNA (sgRNA vector system allowing for ubiquitous and efficient gene deletion in murine and human cells. This system mediates the efficient, temporally controlled deletion of MCL-1, both in vitro and in vivo, in human Burkitt lymphoma cell lines that require this anti-apoptotic BCL-2 protein for sustained survival and growth. Unexpectedly, repeated induction of the same sgRNA generated similar inactivating mutations in the human Mcl-1 gene due to low mutation variability exerted by the accompanying non-homologous end-joining (NHEJ process. Finally, we were able to generate hematopoietic cell compartment-restricted Trp53-knockout mice, leading to the identification of cancer-promoting mutants of this critical tumor suppressor.

  2. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  3. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements classificat....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources.......Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements....... While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...

  4. Supporting Argumentation Schemes in Argumentative Dialogue Games

    Directory of Open Access Journals (Sweden)

    Wells Simon

    2014-03-01

    Full Text Available This paper reports preliminary work into the exploitation of argumentation schemes within dialogue games. We identify a property of dialogue games that we call “scheme awareness” that captures the relationship between dialogue game systems and argumentation schemes. Scheme awareness is used to examine the ways in which existing dialogue games utilise argumentation schemes and consequently the degree with which a dialogue game can be used to construct argument structures. The aim is to develop a set of guidelines for dialogue game design, which feed into a set of Dialogue Game Description Language (DGDL extensions in turn enabling dialogue games to better exploit argumentation schemes.

  5. Novel toggle-rate based energy-efficient scheme for heavy load real-time IM-DD OFDM-PON with ONU LLID identification in time-domain using amplitude decision.

    Science.gov (United States)

    Qin, Youxiang; Zhang, Junjie

    2017-07-10

    A novel low complexity and energy-efficient scheme by controlling the toggle-rate of ONU with time-domain amplitude identification is proposed for a heavy load downlink in an intensity-modulation and direct-detection orthogonal frequency division multiplexing passive optical network (IM-DD OFDM-PON). In a conventional OFDM-PON downlink, all ONUs have to perform demodulation for all the OFDM frames in a broadcast way no matter whether the frames are targeted to or not, which causes a huge energy waste. However, in our scheme, the optical network unit (ONU) logical link identifications (LLIDs) are inserted into each downlink OFDM frame in time-domain at the optical line terminal (OLT) side. At the ONU side, the LLID is obtained with a low complexity and high precision amplitude identification method. The ONU sets the toggle-rate of demodulation module to zero when the frames are not targeted to, which avoids unnecessary digital signal processing (DSP) energy consumption. Compared with the sleep-mode methods consisting of clock recovery and synchronization, toggle-rate shows its advantage in fast changing, which is more suitable for the heavy load scenarios. Moreover, for the first time to our knowledge, the characteristics of the proposed scheme are investigated in a real-time IM-DD OFDM system, which performs well at the received optical power as low as -21dBm. The experimental results show that 25.1% energy consumption can be saved in the receiver compared to the conventional configurations.

  6. Limited copy number-high resolution melting (LCN-HRM) enables the detection and identification by sequencing of low level mutations in cancer biopsies

    National Research Council Canada - National Science Library

    Do, Hongdo; Dobrovic, Alexander

    2009-01-01

    .... High resolution melting (HRM) is more sensitive than sequencing but identification of the mutation is desirable, particularly when it is important to discriminate false positives due to PCR errors or template degradation from true...

  7. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    Science.gov (United States)

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  8. Development of a stiffness-based chemistry load balancing scheme, and optimization of I/O and communication, to enable massively parallel high-fidelity internal combustion engine simulations

    Energy Technology Data Exchange (ETDEWEB)

    Kodavasal, Janardhan; Harms, Kevin; Srivastava, Priyesh; Som, Sibendu; Quan, Shaoping; Richards, Keith; Garcia, Marta

    2016-09-01

    A closed-cycle gasoline compression ignition engine simulation near top dead center (TDC) was used to profile the performance of a parallel commercial engine computational fluid dynamics code, as it was scaled on up to 4096 cores of an IBM Blue Gene/Q supercomputer. The test case has 9 million cells near TDC, with a fixed mesh size of 0.15 mm, and was run on configurations ranging from 128 to 4096 cores. Profiling was done for a small duration of 0.11 crank angle degrees near TDC during ignition. Optimization of input/output performance resulted in a significant speedup in reading restart files, and in an over 100-times speedup in writing restart files and files for post-processing. Improvements to communication resulted in a 1400-times speedup in the mesh load balancing operation during initialization, on 4096 cores. An improved, “stiffness-based” algorithm for load balancing chemical kinetics calculations was developed, which results in an over 3-times faster run-time near ignition on 4096 cores relative to the original load balancing scheme. With this improvement to load balancing, the code achieves over 78% scaling efficiency on 2048 cores, and over 65% scaling efficiency on 4096 cores, relative to 256 cores.

  9. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  10. Surrogate Model Application to the Identification of Optimal Groundwater Exploitation Scheme Based on Regression Kriging Method-A Case Study of Western Jilin Province.

    Science.gov (United States)

    An, Yongkai; Lu, Wenxi; Cheng, Weiguo

    2015-07-30

    This paper introduces a surrogate model to identify an optimal exploitation scheme, while the western Jilin province was selected as the study area. A numerical simulation model of groundwater flow was established first, and four exploitation wells were set in the Tongyu county and Qian Gorlos county respectively so as to supply water to Daan county. Second, the Latin Hypercube Sampling (LHS) method was used to collect data in the feasible region for input variables. A surrogate model of the numerical simulation model of groundwater flow was developed using the regression kriging method. An optimization model was established to search an optimal groundwater exploitation scheme using the minimum average drawdown of groundwater table and the minimum cost of groundwater exploitation as multi-objective functions. Finally, the surrogate model was invoked by the optimization model in the process of solving the optimization problem. Results show that the relative error and root mean square error of the groundwater table drawdown between the simulation model and the surrogate model for 10 validation samples are both lower than 5%, which is a high approximation accuracy. The contrast between the surrogate-based simulation optimization model and the conventional simulation optimization model for solving the same optimization problem, shows the former only needs 5.5 hours, and the latter needs 25 days. The above results indicate that the surrogate model developed in this study could not only considerably reduce the computational burden of the simulation optimization process, but also maintain high computational accuracy. This can thus provide an effective method for identifying an optimal groundwater exploitation scheme quickly and accurately.

  11. MALDI-TOF MS enables the rapid identification of the major molecular types within the Cryptococcus neoformans/C. gattii species complex.

    Directory of Open Access Journals (Sweden)

    Carolina Firacative

    Full Text Available BACKGROUND: The Cryptococcus neoformans/C. gattii species complex comprises two sibling species that are divided into eight major molecular types, C. neoformans VNI to VNIV and C. gattii VGI to VGIV. These genotypes differ in host range, epidemiology, virulence, antifungal susceptibility and geographic distribution. The currently used phenotypic and molecular identification methods for the species/molecular types are time consuming and expensive. As Matrix-Assisted Laser Desorption Ionization-Time-of-Flight Mass Spectrometry (MALDI-TOF MS offers an effective alternative for the rapid identification of microorganisms, the objective of this study was to examine its potential for the identification of C. neoformans and C. gattii strains at the intra- and inter-species level. METHODOLOGY: Protein extracts obtained via the formic acid extraction method of 164 C. neoformans/C. gattii isolates, including four inter-species hybrids, were studied. RESULTS: The obtained mass spectra correctly identified 100% of all studied isolates, grouped each isolate according to the currently recognized species, C. neoformans and C. gattii, and detected potential hybrids. In addition, all isolates were clearly separated according to their major molecular type, generating greater spectral differences among the C. neoformans molecular types than the C. gattii molecular types, most likely reflecting a closer phylogenetic relationship between the latter. The number of colonies used and the incubation length did not affect the results. No spectra were obtained from intact yeast cells. An extended validated spectral library containing spectra of all eight major molecular types was established. CONCLUSIONS: MALDI-TOF MS is a rapid identification tool for the correct recognition of the two currently recognized human pathogenic Cryptococcus species and offers a simple method for the separation of the eight major molecular types and the detection of hybrid strains within this

  12. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  13. A Fully Non-Metallic Gas Turbine Engine Enabled by Additive Manufacturing Part I: System Analysis, Component Identification, Additive Manufacturing, and Testing of Polymer Composites

    Science.gov (United States)

    Grady, Joseph E.; Haller, William J.; Poinsatte, Philip E.; Halbig, Michael C.; Schnulo, Sydney L.; Singh, Mrityunjay; Weir, Don; Wali, Natalie; Vinup, Michael; Jones, Michael G.; hide

    2015-01-01

    The research and development activities reported in this publication were carried out under NASA Aeronautics Research Institute (NARI) funded project entitled "A Fully Nonmetallic Gas Turbine Engine Enabled by Additive Manufacturing." The objective of the project was to conduct evaluation of emerging materials and manufacturing technologies that will enable fully nonmetallic gas turbine engines. The results of the activities are described in three part report. The first part of the report contains the data and analysis of engine system trade studies, which were carried out to estimate reduction in engine emissions and fuel burn enabled due to advanced materials and manufacturing processes. A number of key engine components were identified in which advanced materials and additive manufacturing processes would provide the most significant benefits to engine operation. The technical scope of activities included an assessment of the feasibility of using additive manufacturing technologies to fabricate gas turbine engine components from polymer and ceramic matrix composites, which were accomplished by fabricating prototype engine components and testing them in simulated engine operating conditions. The manufacturing process parameters were developed and optimized for polymer and ceramic composites (described in detail in the second and third part of the report). A number of prototype components (inlet guide vane (IGV), acoustic liners, engine access door) were additively manufactured using high temperature polymer materials. Ceramic matrix composite components included turbine nozzle components. In addition, IGVs and acoustic liners were tested in simulated engine conditions in test rigs. The test results are reported and discussed in detail.

  14. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  15. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...

  16. "Eurocode International Blood Labeling System" enables unique identification of all biological products from human origin in accordance with the European Directive 2004/23/EC.

    Science.gov (United States)

    Knels, Ralf; Mönig, Hans-Joachim; Wittmann, Georg; von Versen, Rüdiger; Pruss, Axel

    2010-11-01

    Due to their limited availability and compatibility, biological products must be exchanged between medical institutions. In addition to a number of national systems and agreements which strive to implement a unique identification and classification of blood products, the ISBT 128 was developed in 1994, followed by the Eurocode in 1998. In contrast to other coding systems, these both make use of primary identifiers as stipulated by the document ISO/IEC 15418 of the International Organization for Standardization (ISO), and thus provide a unique international code. Due to their flexible data structures, which make use of secondary identifiers, both systems are able to integrate additional biological products and their producers. Tissue and cells also constitute a comparable risk to the recipient as that of blood products in terms of false labeling and the danger of infection. However, in contrast to blood products, the exchange of tissue and cells is much more intensively pursued at the international level. This fact is recognised by Directives 2004/23/EC and 2006/86/EC of the European Union (EU), which demand a standardized coding system for cells and tissue throughout the EU. The 2008 workshop agreement of the European Committee for Standardization (CEN) was unique identification by means of a Key Code consisting of country code corresponding to ISO 3166-1, as well as competent authority and tissue establishment. As agreed at the meeting of the Working Group on the European Coding System for Human Tissues and Cells of the Health and Consumers Directorate-General of the European Commission (DG SANCO) held on 19 May 2010 in Brussels, this Key Code could also be used with existing coding systems to provide unique identification and allow EU traceability of all materials from one donation event. Today Eurocode already uses country codes according to ISO 3166-1, and thus the proposed Key Code can be integrated into the current Eurocode data structure and does not need to

  17. Toxicogenomics applied to cultures of human hepatocytes enabled an identification of novel petasites hybridus extracts for the treatment of migraine with improved hepatobiliary safety.

    Science.gov (United States)

    Anderson, Nora; Meier, Tatjana; Borlak, Jürgen

    2009-12-01

    Butterbur extracts (Petasites hybridus) are recommended for the prevention of migraine, but pharmacovigilance reports may be suggestive of rare hepatobiliary toxicity. To evaluate its hepatotoxic potential, a series of in vivo and in vitro studies were carried out. Essentially, there were no signs of hepatocellular toxicity at estimated therapeutic C(max) levels of 60 ng/ml. Nonetheless, in a 28-day toxicity study at approximately 200-fold of therapeutic doses, induced liver transaminases and bilirubin elevations were observed. In a subsequent 6-month chronic toxicity study, the initial hepatobiliary effects were reproduced, but at the end of the study, liver function recovered and returned to normal as evidenced by clinical chemistry measurements. To identify possible mechanisms of hepatotoxicity, we investigated liver function in vitro at > 170-fold of therapeutic C(max) levels, including cytotoxicity (lactate dehydrogenase, MTT, and ATP), transaminase activities (alanine aminotransferase and aspartate aminotransferase), albumin synthesis, urea and testosterone metabolism to assay for cytochrome P450 monooxygenase activity. Only with extracts rich in petasin (37% petasin) and at high and well above therapeutic doses, liver toxicity was observed. A toxicogenomic approach applied to hepatocyte cultures enabled hypothesis generation and was highly suggestive for extracts high in petasin content to impair bile acid transport and lipid and protein metabolism. Importantly, neither chronic rat in vivo nor rat in vitro studies predicted reliably hepatotoxicity, therefore reemphasizing the utility of human-based in vitro investigations for the development of safe medicinal products. Finally, toxicogenomics enabled the characterization of a novel butterbur extract with no signals for hepatotoxicity.

  18. High-sensitivity HLA class I peptidome analysis enables a precise definition of peptide motifs and the identification of peptides from cell lines and patients' sera.

    Science.gov (United States)

    Ritz, Danilo; Gloger, Andreas; Weide, Benjamin; Garbe, Claus; Neri, Dario; Fugmann, Tim

    2016-05-01

    The characterization of peptides bound to human leukocyte antigen (HLA) class I is of fundamental importance for understanding CD8+ T cell-driven immunological processes and for the development of immunomodulatory therapeutic strategies. However, until now, the mass spectrometric analysis of HLA-bound peptides has typically required billions of cells, still resulting in relatively few high-confidence peptide identifications. Capitalizing on the recent developments in mass spectrometry and bioinformatics, we have implemented a methodology for the efficient recovery of acid-eluted HLA peptides after purification with the pan-reactive antibody W6/32 and have identified a total of 27 862 unique peptides with high confidence (1% false discovery rate) from five human cancer cell lines. More than 93% of the identified peptides were eight to 11 amino acids in length and contained signatures that were in excellent agreement with published HLA binding motifs. Furthermore, by purifying soluble HLA class I complexes (sHLA) from sera of melanoma patients, up to 972 high-confidence peptides could be identified, including melanoma-associated antigens already described in the literature. Knowledge of the HLA class I peptidome should facilitate multiplex tetramer technology-based characterization of T cells, and allow the development of patient selection, stratification and immunomodulatory therapeutic strategies. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Elucidation of the zinc-dependent regulation in Amycolatopsis japonicum enabled the identification of the ethylenediamine-disuccinate ([S,S]-EDDS) genes.

    Science.gov (United States)

    Spohn, Marius; Wohlleben, Wolfgang; Stegmann, Evi

    2016-04-01

    The actinomycete Amycolatopsis japonicum produces the complexing agent ethylenediamine-disuccinate ([S,S]-EDDS), which is an isomer of the widely industrially applied ethylenediamine-tetraacetate (EDTA). In contrast to EDTA, [S,S]-EDDS is readily biodegradable and is therefore an alternative with a favourable environmental profile. Biotechnological production of [S,S]-EDDS, however, is not currently possible because its biosynthesis is inhibited by low-micromolar zinc concentrations. Here we illustrate the development of a new strategy for identifying a biosynthetic pathway that is based on the elucidation of transcriptional regulation and the screening for binding sites of the respective regulator that controls the [S,S]-EDDS biosynthesis genes. To achieve this, we identified the zinc uptake regulator Zur in A. japonicum and showed that it mediates the repression of the zinc uptake system ZnuABCAj . The Zur-binding motif, recognized by the zinc-bound Zur protein in the upstream region of znuABCAj , was used to screen the genome, leading to the identification of the aes genes. Transcriptional analysis and shift assays reveal specific zinc-responsive regulation of the aes genes by Zur, and gene inactivation shows their involvement in [S,S]-EDDS biosynthesis. Zur-mediated zinc repression of the [S,S]-EDDS biosynthesis genes is abolished in a Δzur mutant, which offers now the opportunity to develop a biotechnological process. © 2015 Society for Applied Microbiology and John Wiley & Sons Ltd.

  20. An in silico approach combined with in vivo experiments enables the identification of a new protein whose overexpression can compensate for specific respiratory defects in Saccharomyces cerevisiae

    Directory of Open Access Journals (Sweden)

    Meunier Brigitte

    2011-10-01

    identification of a new factor, Usb1p, involved in the biogenesis of respiratory complexes, which could not have been found using classical genetic screens looking for respiratory deficient mutants. Thus, this systems biology approach appears to be a fruitful new way to study the biogenesis of mitochondrial multi-subunit complexes.

  1. A dynamic digital signature scheme without third parties

    NARCIS (Netherlands)

    Van Elsas, M.; Van der Lubbe, J.C.A.; Weber, J.H.

    2015-01-01

    We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each

  2. Perry's Intellectual Scheme.

    Science.gov (United States)

    Love, Patrick G.; Guthrie, Victoria L.

    1999-01-01

    Summarizes William Perry's intellectual scheme and places it in the context of the 1990's. Perry's scheme of cognitive development, though more than thirty years old, is still being used by practitioners today to enhance practice in and out of the classroom. It laid a foundation for new research to extend, challenge, and build onto the scheme.…

  3. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  4. Diagnostic accuracy of a standardized scheme for identification of Streptococcus uberis in quarter milk samples: A comparison between conventional bacteriological examination, modified Rambach agar medium culturing, and 16S rRNA gene sequencing.

    Science.gov (United States)

    Wald, Regina; Baumgartner, Martina; Urbantke, Verena; Stessl, Beatrix; Wittek, Thomas

    2017-02-01

    Bacteriological examination of milk samples is a prerequisite for pathogen-specific therapy and aids in limiting antimicrobial resistance. The aims of this study were to establish a standardized scheme for reliable Streptococcus uberis identification in routine diagnosis and to evaluate the accuracy of conventional tests and growing patterns of Strep. uberis on a selective medium (modified Rambach agar medium, MRAM) using 16S rRNA gene sequencing analysis as a reference method. We obtained isolates of presumptive Strep. uberis (n = 336) from quarter milk samples of dairy cows with intramammary infections and classified the isolates into 2 clusters using biochemical characterization. In cluster 1 (n = 280), cocci grew as non-hemolytic colonies, hydrolyzing esculin, carrying no Lancefield antigen (A/B/C/D/G) or Christie Atkins Munch-Petersen factor, and their growth was inhibited on an Enterococcus agar. Production of β-d-galactosidase on MRAM was shown by 257 of the cluster 1 isolates (91.79%), and 16S rRNA gene sequencing verified 271 (96.79%) of the isolates to be Strep. uberis. In 264 isolates (94.29%), MRAM agreed with the sequencing results. In cluster 2 (n = 56), isolates showed different characteristics: 37 (66.07%) were β-d-galactosidase-positive, and based on 16S sequencing results, 36 (64.29%) were identified correctly as Strep. uberis using biochemical methods. Identification success in this group differed significantly between routine diagnosis and MRAM application: MRAM agreed with sequencing results in 47 isolates (83.93%). To identify Strep. uberis and differentiate it from other lactic acid bacteria in routine diagnosis, we suggest using catalase reaction, hemolysis, esculin hydrolysis, and growth on enterococci agar. Isolates that show a typical biochemical profile can be identified satisfactorily with these tests. For Strep. uberis isolates with divergent patterns, application of MRAM as a follow-up test increased the diagnostic accuracy to 94

  5. Enabling DRM-preserving Digital content Redistribution

    NARCIS (Netherlands)

    Krishnan Nair, S.; Popescu, B.C.; Gamage, C.D.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the use of the se contents, to consumers. In this paper, we extend this model by introducing a security scheme that enables

  6. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  7. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well...

  8. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  9. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  10. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire....... 664 households returned a completed questionnaire. There were five answering categories for each label in the questionnaire: * have not seen the label before. * I have seen the label before but I do not know the precise contents of the labelling scheme. * I have seen the label before, I do not know...

  11. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  12. Nanomaterial-enabled neural stimulation

    Directory of Open Access Journals (Sweden)

    Yongchen eWang

    2016-03-01

    Full Text Available Neural stimulation is a critical technique in treating neurological diseases and investigating brain functions. Traditional electrical stimulation uses electrodes to directly create intervening electric fields in the immediate vicinity of neural tissues. Second-generation stimulation techniques directly use light, magnetic fields or ultrasound in a non-contact manner. An emerging generation of non- or minimally invasive neural stimulation techniques is enabled by nanotechnology to achieve a high spatial resolution and cell-type specificity. In these techniques, a nanomaterial converts a remotely transmitted primary stimulus such as a light, magnetic or ultrasonic signal to a localized secondary stimulus such as an electric field or heat to stimulate neurons. The ease of surface modification and bio-conjugation of nanomaterials facilitates cell-type-specific targeting, designated placement and highly localized membrane activation. This review focuses on nanomaterial-enabled neural stimulation techniques primarily involving opto-electric, opto-thermal, magneto-electric, magneto-thermal and acousto-electric transduction mechanisms. Stimulation techniques based on other possible transduction schemes and general consideration for these emerging neurotechnologies are also discussed.

  13. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  14. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  15. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  16. MIT Scheme Reference Manual

    Science.gov (United States)

    1991-01-01

    their Butterfly Scheme Reference, and to Margaret O’Connell for translating it from BBN’s text-formatting language to ours. Special thanks to Richard ... Stallman , Bob Chassell, and Brian Fox, all of the Free Software Foundation, for creating and maintaining the Texinfo formatting language in which this

  17. A Standardised Vocabulary for Identifying Benthic Biota and Substrata from Underwater Imagery: The CATAMI Classification Scheme.

    Directory of Open Access Journals (Sweden)

    Franziska Althaus

    Full Text Available Imagery collected by still and video cameras is an increasingly important tool for minimal impact, repeatable observations in the marine environment. Data generated from imagery includes identification, annotation and quantification of biological subjects and environmental features within an image. To be long-lived and useful beyond their project-specific initial purpose, and to maximize their utility across studies and disciplines, marine imagery data should use a standardised vocabulary of defined terms. This would enable the compilation of regional, national and/or global data sets from multiple sources, contributing to broad-scale management studies and development of automated annotation algorithms. The classification scheme developed under the Collaborative and Automated Tools for Analysis of Marine Imagery (CATAMI project provides such a vocabulary. The CATAMI classification scheme introduces Australian-wide acknowledged, standardised terminology for annotating benthic substrates and biota in marine imagery. It combines coarse-level taxonomy and morphology, and is a flexible, hierarchical classification that bridges the gap between habitat/biotope characterisation and taxonomy, acknowledging limitations when describing biological taxa through imagery. It is fully described, documented, and maintained through curated online databases, and can be applied across benthic image collection methods, annotation platforms and scoring methods. Following release in 2013, the CATAMI classification scheme was taken up by a wide variety of users, including government, academia and industry. This rapid acceptance highlights the scheme's utility and the potential to facilitate broad-scale multidisciplinary studies of marine ecosystems when applied globally. Here we present the CATAMI classification scheme, describe its conception and features, and discuss its utility and the opportunities as well as challenges arising from its use.

  18. Organising to Enable Innovation

    DEFF Research Database (Denmark)

    Brink, Tove

    2016-01-01

    The purpose of this conceptual paper is to reveal how organising can enable innovation across organisational layers and organisational units. This approach calls for a cross-disciplinary literature review. The aim is to provide an integrated understanding of innovation in an organisational approach....... The findings reveal a continous organising process between individual/ team creativity and organisational structures/control to enable innovation at firm level. Organising provides a dynamic approach and contains the integrated reconstruction of creativity, structures and boundaries for enhanced balance...... of explorative and exploitative learning in uncertain environments. Shedding light on the cross-disciplinary theories to organise innovation provides a contribution at the firm level to enable innovation....

  19. Development of Fault Detection and Diagnosis Schemes for Industrial Refrigeration Systems

    DEFF Research Database (Denmark)

    Thybo, C.; Izadi-Zamanabadi, Roozbeh

    2004-01-01

    The success of a fault detection and diagnosis (FDD) scheme depends not alone on developing an advanced detection scheme. To enable successful deployment in industrial applications, an economically optimal development of FDD schemes are required. This paper reviews and discusses the gained experi...

  20. CUDA Enabled Graph Subset Examiner

    Energy Technology Data Exchange (ETDEWEB)

    2016-12-22

    Finding Godsil-McKay switching sets in graphs is one way to demonstrate that a specific graph is not determined by its spectrum--the eigenvalues of its adjacency matrix. An important area of active research in pure mathematics is determining which graphs are determined by their spectra, i.e. when the spectrum of the adjacency matrix uniquely determines the underlying graph. We are interested in exploring the spectra of graphs in the Johnson scheme and specifically seek to determine which of these graphs are determined by their spectra. Given a graph G, a Godsil-McKay switching set is an induced subgraph H on 2k vertices with the following properties: I) H is regular, ii) every vertex in G/H is adjacent to either 0, k, or 2k vertices of H, and iii) at least one vertex in G/H is adjacent to k vertices in H. The software package examines each subset of a user specified size to determine whether or not it satisfies those 3 conditions. The software makes use of the massive parallel processing power of CUDA enabled GPUs. It also exploits the vertex transitivity of graphs in the Johnson scheme by reasoning that if G has a Godsil-McKay switching set, then it has a switching set which includes vertex 1. While the code (in its current state) is tuned to this specific problem, the method of examining each induced subgraph of G can be easily re-written to check for any user specified conditions on the subgraphs and can therefore be used much more broadly.

  1. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  2. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    -theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  3. The Nordic Housing Enabler

    DEFF Research Database (Denmark)

    Helle, T.; Nygren, C.; Slaug, B.

    2014-01-01

    This study addresses development of a content-valid cross-Nordic version of the Housing Enabler and investigation of its inter-rater reliability when used in occupational therapy rating situations, involving occupational therapists, clients, and their home environments. The instrument...... was translated from the original Swedish version of the Housing Enabler, and adapted according to accessibility norms and guidelines for housing design in Sweden, Denmark, Finland, and Iceland. This iterative process involved occupational therapists, architects, building engineers, and professional translators...... Enabler. Inter-rater reliability was calculated by means of percentage agreement and kappa statistics. Overall good percentage agreement for the personal and environmental components of the instrument was shown, indicating that the instrument was sufficiently reliable for application in practice...

  4. The Nordic Housing Enabler

    DEFF Research Database (Denmark)

    Helle, Tina; Slaug, Bjørn; Brandt, Åse

    2010-01-01

    This study addresses development of a content valid cross-Nordic version of the Housing Enabler and investigation of its inter-rater reliability when used in occupational therapy rating situations, involving occupational therapists, clients and their home environments. The instrument was translated...... from the original Swedish version of the Housing Enabler, and adapted according to accessibility norms and guidelines for housing design in Sweden, Denmark, Finland and Iceland. This iterative process involved occupational therapists, architects, building engineers and professional translators...... Enabler. Inter-rater reliability was calculated by means of percentage agreement and kappa statistics. Overall good percentage agreement for the personal and environmental components of the instrument was shown, indicating that the instrument was sufficiently reliable for application in practice...

  5. Nordic Housing Enabler

    DEFF Research Database (Denmark)

    Helle, Tina; Brandt, Åse

    2009-01-01

    , however, the built environment shows serious deficits when it comes to accessibility. This study addresses development of a content valid cross-Nordic version of the Housing Enabler and investigation of inter-rater reliability, when used in occupational therapy practice. The instrument was translated from...... statistics. Overall good percentage agreement for all parts of the instrument was shown, indicating that the Nordic Housing Enabler is sufficiently reliable for application in practice and research in the Nordic context. The kappa results varied and possible explanations are discussed, which should be kept......Development and reliability testing of the Nordic Housing Enabler – an instrument for accessibility assessment of the physical housing. Tina Helle & Åse Brandt University of Lund, Health Sciences, Faculty of Medicine (SE) and University College Northern Jutland, Occupational Therapy department (DK...

  6. State Of Art in Homomorphic Encryption Schemes

    Directory of Open Access Journals (Sweden)

    S. Sobitha Ahila

    2014-02-01

    Full Text Available The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. However, the critical problem arises when there is a requirement for publicly computing with private data or to modify functions or algorithms in such a way that they are still executable while their privacy is ensured. This is where homomorphic cryptosystems can be used since these systems enable computations with encrypted data. A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypted data.. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. We will take the reader through a journey of these developments and provide a glimpse of the exciting research directions that lie ahead. In this paper, we propose a selection of the most important available solutions, discussing their properties and limitations.

  7. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  8. Parallel particle identification and separation for active optical sorting

    DEFF Research Database (Denmark)

    Perch-Nielsen, Ivan R.; Palima, Darwin; Dam, Jeppe Seidelin

    2009-01-01

    An instrument for rapidly and non-invasively sorting different cell specimens is a valuable tool in biological and medical research. Parallel identification of target specimens through image analysis can sort based on highly tuneable selection criteria and can enable high-speed optical sorting when...... matched with a rapidly reconfigurable optical sorting field. We demonstrate the potential of such a system using colloidal polystyrene microspheres. By combining machine vision with a parallel add-on optical manipulation scheme, we were able to move identified particles over a distance of several hundred...

  9. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR SOLUTION OF NONLINEAR INITIAL VALUE PROBLEMS OF FIRST ORDER ORDINARY DIFFERENTIAL EQUATIONS. ... Global Journal of Mathematical Sciences ... KEY WORDS: backward differentiation scheme, collocation, initial value problems. Global Jnl ...

  10. Online design of Matlab/Simulink block schemes

    Directory of Open Access Journals (Sweden)

    Zoltán Janík

    2011-04-01

    Full Text Available The paper presents a new online tool that enables to build a Matlab/Simulink block scheme in the Internet environment. The block scheme can be designed in similar manner as it is offered by local installation of Simulink. The application was created by widely used technologies as XHTML, CSS, JavaScript, PHP together with AJAX approach. The created application can be used as a supporting tool in virtual and remote laboratories.

  11. Pilot project as enabler?

    DEFF Research Database (Denmark)

    Neisig, Margit; Glimø, Helle; Holm, Catrine Granzow

    This article deals with a systemic perspective on transition. The field of study addressed is a pilot project as enabler of transition in a highly complex polycentric context. From a Luhmannian systemic approach, a framework is created to understand and address barriers of change occurred using...

  12. BPR - Enabled Systems Engineering

    OpenAIRE

    Johnson, Leslie; Stergiou, Maria

    1999-01-01

    As traditional management techniques were no longer appropriate in the changing business environment, companies employed Business Process Reengineering (BPR) to achieve elevated business performance. Similarly, as traditional systems development approaches delivered disappointing results, system developers experimented with other models, including Evolutionary Delivery and Evolutionary Development, in order to enable successful technology exploitation by businesses. Both these business and sy...

  13. Enabling distributed collaborative science

    DEFF Research Database (Denmark)

    Hudson, T.; Sonnenwald, Diane H.; Maglaughlin, K.

    2000-01-01

    To enable collaboration over distance, a collaborative environment that uses a specialized scientific instrument called a nanoManipulator is evaluated. The nanoManipulator incorporates visualization and force feedback technology to allow scientists to see, feel, and modify biological samples being...

  14. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  15. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  16. Fragile watermarking scheme for H.264 video authentication

    Science.gov (United States)

    Wang, Chuen-Ching; Hsu, Yu-Chang

    2010-02-01

    A novel H.264 advanced video coding fragile watermarking method is proposed that enables the authenticity and integrity of the video streams to be verified. The effectiveness of the proposed scheme is demonstrated by way of experimental simulations. The results show that by embedding the watermark information in the last nonzero-quantized coefficient in each discrete cosine transform block, the proposed scheme induces no more than a minor distortion of the video content. In addition, we show that the proposed scheme is able to detect unauthorized changes in the watermarked video content without the original video. The experimental results demonstrate the feasibility of the proposed video authentication system.

  17. Spatially enabled land administration

    DEFF Research Database (Denmark)

    Enemark, Stig

    2006-01-01

    enabling of land administration systems managing tenure, valuation, planning, and development will allow the information generated by these activities to be much more useful. Also, the services available to private and public sectors and to community organisations should commensurably improve. Knowledge....... In other words: Good governance and sustainable development is not attainable without sound land administration or - more broadly – sound land management. The paper presents a land management vision that incorporates the benefits of ICT enabled land administration functions. The idea is that spatial...... the communication between administrative systems and also establish more reliable data due to the use the original data instead of copies. In Denmark, such governmental guidelines for a service-oriented ITarchitecture in support of e-government are recently adopted. Finally, the paper presents the role of FIG...

  18. Enabling Wind Power Nationwide

    Energy Technology Data Exchange (ETDEWEB)

    Jose Zayas, Michael Derby, Patrick Gilman and Shreyas Ananthan,

    2015-05-01

    Leveraging this experience, the U.S. Department of Energy’s (DOE’s) Wind and Water Power Technologies Office has evaluated the potential for wind power to generate electricity in all 50 states. This report analyzes and quantifies the geographic expansion that could be enabled by accessing higher above ground heights for wind turbines and considers the means by which this new potential could be responsibly developed.

  19. Cost-Prioritized Droop Schemes for Autonomous AC Microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2015-01-01

    This paper presents two cost-prioritized droop sche- mes for distributed generators (DGs) in a rural or islanded microgrid. Dispatch prioritization of the schemes allows autonomous identification of the appropriate DGs for generation, in accordance to the overall load conditions of the microgrid....

  20. First Principles Identification of New Aircraft Materials Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The identification of new, structurally sound, thermally stable materials for aviation applications will enable a wide range of technologies. The identification of...

  1. EnableATIS strategy assessment.

    Science.gov (United States)

    2014-02-01

    Enabling Advanced Traveler Information Systems (EnableATIS) is the traveler information component of the Dynamic Mobility Application (DMA) program. The objective of : the EnableATIS effort is to foster transformative traveler information application...

  2. identification with model reduction issues

    Directory of Open Access Journals (Sweden)

    A. Bilbao-Guillerna

    2005-01-01

    with the multiestimation scheme instead of a high-order one. Depending on the frequency spectrum characteristics of the input and on the estimates evolution, the multiestimation scheme selects on-line the most appropriate model and its related estimation scheme in order to improve the identification and control performances. Robust closed-loop stability is proved even in the presence of unmodeled dynamics of sufficiently small sizes as it has been confirmed by simulation results. The scheme chooses in real time the estimator/controller associated with a particular reduced model possessing the best performance according to an identification performance index by implementing a switching rule between estimators. The switching rule is subject to a minimum residence time at each identifier/adaptive controller parameterization for closed-loop stabilization purposes. A conceptually simple higher-level supervisor, based on heuristic updating rules which estimate on-line the weights of the switching rule between estimation schemes, is discussed.

  3. Enabling Digital Literacy

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Georgsen, Marianne

    2010-01-01

    There are some tensions between high-level policy definitions of “digital literacy” and actual teaching practice. We need to find workable definitions of digital literacy; obtain a better understanding of what digital literacy might look like in practice; and identify pedagogical approaches, which...... support teachers in designing digital literacy learning. We suggest that frameworks such as Problem Based Learning (PBL) are approaches that enable digital literacy learning because they provide good settings for engaging with digital literacy. We illustrate this through analysis of a case. Furthermore......, these operate on a meso-level mediating between high-level concepts of digital literacy and classroom practice....

  4. Smart Grid Enabled EVSE

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2015-01-12

    The combined team of GE Global Research, Federal Express, National Renewable Energy Laboratory, and Consolidated Edison has successfully achieved the established goals contained within the Department of Energy’s Smart Grid Capable Electric Vehicle Supply Equipment funding opportunity. The final program product, shown charging two vehicles in Figure 1, reduces by nearly 50% the total installed system cost of the electric vehicle supply equipment (EVSE) as well as enabling a host of new Smart Grid enabled features. These include bi-directional communications, load control, utility message exchange and transaction management information. Using the new charging system, Utilities or energy service providers will now be able to monitor transportation related electrical loads on their distribution networks, send load control commands or preferences to individual systems, and then see measured responses. Installation owners will be able to authorize usage of the stations, monitor operations, and optimally control their electricity consumption. These features and cost reductions have been developed through a total system design solution.

  5. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  6. Two notes about Ponzi schemes

    OpenAIRE

    Honohan, Patrick

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  7. Computing homogeneous models with finite volume upwind schemes

    Energy Technology Data Exchange (ETDEWEB)

    Herard, J.M. [Electricite de France (EDF/DRD/DMFTT), 78 - Chatou (France); Universite de Provence, Centre de Mathematiques et d' Informatique, L.A.T.P. - UMR CNRS 6632, 13 - Marseille (France); Kokh, S. [CEA Saclay, Dir. de l' Energie Nucleaire (DEN/SFME), 91 - Gif sur Yvette (France)

    2003-07-01

    We provide in this paper some algorithms to deal with homogeneous equilibrium models on any type of mesh. These schemes rely on the exact Godunov scheme or on some rough Godunov schemes. We first recall some basic ideas which were recently introduced in the 1D framework. We then turn to the 2D framework, and define a class of first order schemes which enable to improve the accuracy on coarse unstructured 2D meshes. We have also tried to underline that current computing power does not enable to perform accurate enough computations for reasonable CPU time, in a few situations including sharp contact discontinuities; this is due in some sense to some kind of loss of pressure consistency between PDE and numerical schemes in conservative form. We have also indicated that some specific remedies available in the literature are not adequate for nuclear safety problems, both in a one dimensional framework (owing to EOS), and in the two dimensional framework (due to differences between mesh interfaces and waves fronts). Comments pertaining to other hybrid schemes are then made. The last part of the paper will focus on computations of three dimensional gas-liquid flows including sharp interfaces. (authors)

  8. Remarks on quantum duopoly schemes

    Science.gov (United States)

    Fraçkiewicz, Piotr

    2016-01-01

    The aim of this paper is to discuss in some detail the two different quantum schemes for duopoly problems. We investigate under what conditions one of the schemes is more reasonable than the other one. Using the Cournot's duopoly example, we show that the current quantum schemes require a slight refinement so that they output the classical game in a particular case. Then, we show how the amendment changes the way of studying the quantum games with respect to Nash equilibria. Finally, we define another scheme for the Cournot's duopoly in terms of quantum computation.

  9. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    times, effectively eliminating the second penalty mentioned. We continue this theoretical study in several ways. First, we dedicate a large part of the thesis to the graph family of trees, for which we provide an overview of labeling schemes supporting several important functions such as ancestry......, routing and especially adjacency. The survey is complemented by novel contributions to this study, among which are the first asymptotically optimal adjacency labeling scheme for bounded degree trees, improved bounds on ancestry labeling schemes, dynamic multifunctional labeling schemes and an experimental...

  10. Enabling graphene nanoelectronics.

    Energy Technology Data Exchange (ETDEWEB)

    Pan, Wei; Ohta, Taisuke; Biedermann, Laura Butler; Gutierrez, Carlos; Nolen, C. M.; Howell, Stephen Wayne; Beechem Iii, Thomas Edwin; McCarty, Kevin F.; Ross, Anthony Joseph, III

    2011-09-01

    Recent work has shown that graphene, a 2D electronic material amenable to the planar semiconductor fabrication processing, possesses tunable electronic material properties potentially far superior to metals and other standard semiconductors. Despite its phenomenal electronic properties, focused research is still required to develop techniques for depositing and synthesizing graphene over large areas, thereby enabling the reproducible mass-fabrication of graphene-based devices. To address these issues, we combined an array of growth approaches and characterization resources to investigate several innovative and synergistic approaches for the synthesis of high quality graphene films on technologically relevant substrate (SiC and metals). Our work focused on developing the fundamental scientific understanding necessary to generate large-area graphene films that exhibit highly uniform electronic properties and record carrier mobility, as well as developing techniques to transfer graphene onto other substrates.

  11. How Governance Regimes Shape the Implementation of Water Reuse Schemes

    Directory of Open Access Journals (Sweden)

    Jos Frijns

    2016-12-01

    Full Text Available The governance dimensions of water reuse scheme development and operation, such as policies and regulatory frameworks, and public involvement and stakeholder collaboration, can serve to both facilitate and constrain wider adoption of water reuse practices. This paper explores the significance and underlying structure of the key governance challenges facing the water reuse sector in Europe. It presents empirical evidence from interviews and focus group sessions conducted at four water reuse schemes: an indirect potable reuse scheme at Torreele (Belgium, the urban reuse of treated municipal wastewater at the London Olympic Park (United Kingdom and at Sabadell (Spain, and the reuse of agro-industrial effluent for irrigation at Capitanata (Italy. The findings underscore the importance of clarity in policy arrangements around water reuse, as well as of the financial competitiveness of reuse projects compared to alternative water supply options. Operators of water reuse schemes expressed a preference for water quality standards, which focus on appropriateness for use rather than over-emphasise the waters’ origin so that unnecessary treatment and costs can be avoided. Positive public support was widely acknowledged as an important factor in the success or failure of water reuse schemes. We conclude that constructive institutional relationships underpin many of the challenges faced by reuse scheme operators and that greater emphasis should be given to building confidence and gaining trust in water service providers through early identification of how governance regimes shape the viability of new schemes.

  12. A situation awareness analysis scheme to identify deficiencies of complex man-machine interactions

    NARCIS (Netherlands)

    van Doorn, E.C.; Rusak, Z.; Horvath, I.

    2017-01-01

    This paper presents an analysis scheme which aims to support a
    systematic study of required situation awareness (RSA). This scheme supports
    identification of deficiencies of support for situation awareness (SA).
    Information needs are goal and task dependent and can be defined

  13. Terrain identification for RHex-type robots

    Science.gov (United States)

    Ordonez, Camilo; Shill, Jacob; Johnson, Aaron; Clark, Jonathan; Collins, Emmanuel

    2013-05-01

    Terrain identification is a key enabling ability for generating terrain adaptive behaviors that assist both robot planning and motor control. This paper considers running legged robots from the RHex family) which the military plans to use in the field to assist troops in reconnaissance tasks. Important terrain adaptive behaviors include the selection of gaits) modulation of leg stiffness) and alteration of steering control laws that minimize slippage) maximize speed and/or reduce energy consumption. These terrain adaptive behaviors can be enabled by a terrain identification methodology that combines proprioceptive sensors already available in RHex-type robots. The proposed classification approach is based on the characteristic frequency signatures of data from leg observers) which combine current sensing with a dynamic model of the leg motion. The paper analyzes the classification accuracy obtained using both a single leg and groups of legs (through a voting scheme) on different terrains such as vinyl) asphalt) grass) and pebbles. Additionally) it presents a terrain classifier that works across various gait speeds and in fact almost as good as an overly specialized classifier.

  14. Whale Identification

    Science.gov (United States)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  15. A real helper data scheme

    NARCIS (Netherlands)

    Shao, X.; Veldhuis, Raymond N.J.

    2013-01-01

    The helper data scheme utilizes a secret key to protect biometric templates. The current helper data scheme requires binary feature representations that introduce quantization error and thus reduce the capacity of biometric channels. For spectral-minutiae based fingerprint recognition systems,

  16. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  17. The Benefits of Partnership Schemes to Schools and Research Students: A Case Study of the Researchers in Residence Scheme

    Science.gov (United States)

    Barley, Helen; Karim, Muhammed; Gilchrist, Myra; Gillies, Andrew

    2013-01-01

    To meet the needs of a modern Scottish society, a "Curriculum for Excellence" enables teachers to deliver a more coherent and skills-based curriculum, involving partnerships with external agencies. This article analyses the work of one host school/researcher team through the Researchers in Residence scheme in an Edinburgh secondary…

  18. Enabling immersive simulation.

    Energy Technology Data Exchange (ETDEWEB)

    McCoy, Josh (University of California Santa Cruz, Santa Cruz, CA); Mateas, Michael (University of California Santa Cruz, Santa Cruz, CA); Hart, Derek H.; Whetzel, Jonathan; Basilico, Justin Derrick; Glickman, Matthew R.; Abbott, Robert G.

    2009-02-01

    The object of the 'Enabling Immersive Simulation for Complex Systems Analysis and Training' LDRD has been to research, design, and engineer a capability to develop simulations which (1) provide a rich, immersive interface for participation by real humans (exploiting existing high-performance game-engine technology wherever possible), and (2) can leverage Sandia's substantial investment in high-fidelity physical and cognitive models implemented in the Umbra simulation framework. We report here on these efforts. First, we describe the integration of Sandia's Umbra modular simulation framework with the open-source Delta3D game engine. Next, we report on Umbra's integration with Sandia's Cognitive Foundry, specifically to provide for learning behaviors for 'virtual teammates' directly from observed human behavior. Finally, we describe the integration of Delta3D with the ABL behavior engine, and report on research into establishing the theoretical framework that will be required to make use of tools like ABL to scale up to increasingly rich and realistic virtual characters.

  19. Multiuser Switched Diversity Scheduling Schemes

    CERN Document Server

    Shaqfeh, Mohammad; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback sys...

  20. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  1. System Identification

    NARCIS (Netherlands)

    Keesman, K.J.

    2011-01-01

    Summary System Identification Introduction.- Part I: Data-based Identification.- System Response Methods.- Frequency Response Methods.- Correlation Methods.- Part II: Time-invariant Systems Identification.- Static Systems Identification.- Dynamic Systems Identification.- Part III: Time-varying

  2. Design and Simulation of a Distributed Control Scheme for Inter-Destination Media Synchronization

    NARCIS (Netherlands)

    Montagud, M.; Boronat, F.; Stokking, H.M.

    2013-01-01

    Inter-Destination Multimedia Synchronization (IDMS) is a key requirement to enable satisfying group shared media experiences. This paper presents the design and simulation of a Distributed Control Scheme (DCS) for IDMS. In this scheme, geographically dispersed receivers exchange (multicast) RTCP

  3. ESQUEMA SIMPLIFICADO PARA IDENTIFICAÇÃO DE ESTAFILOCOCOS COAGULASE-POSITIVOS ISOLADOS DE MASTITE BOVINA SIMPLIFIED SCHEME FOR IDENTIFICATION OF COAGULASE-POSITIVE STAPHYLOCOCCI ISOLATED FROM BOVINE MASTITIS

    Directory of Open Access Journals (Sweden)

    Maria Aparecida Vasconcelos Paiva Brito

    2002-02-01

    to bacitracin, aerobic acid from glycerol in the presence of 0.4mug m-1 of eritromicin, catalase, and coagulated rabbit plasma by the tube test. The acriflavin susceptibility was tested on Baird Parker and P agar plates containing 7mug m-1 of acriflavin. Five coagulase-negative S. hyicus strains identified by the API Staph system and S. aureus ATCC 29213 were used as test controls. Thirty-eight out of the 49 CPS were identified as S. aureus and 11 as S. hyicus, while S. intermedius was not found. The API Staph system was used to confirm the identification of the coagulase-positive strains of S. hyicus, seven S. aureus strains not producing acetoin and four negative for anaerobic fermentation of mannitol. All the strains identified as S. aureus were resistant to acriflavin whereas S. hyicus were sensitive. It was concluded that the sensitivity to acriflavin can be used in addition to the tests of coagulase and acetoin production to differentiate CPS isolated from bovine mastitis.

  4. System for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor)

    2017-01-01

    A sensor and system provide for radio frequency identification (RFID)-enabled information collection. The sensor includes a ring-shaped element and an antenna. The ring-shaped element includes a conductive ring and an RFID integrated circuit. The antenna is spaced apart from the ring-shaped element and defines an electrically-conductive path commensurate in size and shape to at least a portion of the conductive ring. The system may include an interrogator for energizing the ring-shaped element and receiving a data transmission from the RFID integrated circuit that has been energized for further processing by a processor.

  5. Principles for enabling deep secondary design

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Hansen, Magnus Rotvit Perlt

    2017-01-01

    design by analyzing two cases where secondary designers fundamentally change functionality, content and technology complexity level. The first case redesigns a decision model for agile development in an insurance company; the second creates a contingency model for choosing project management tools...... and techniques in a hospital. Our analysis of the two cases leads to the identification of four principles of design implementation that primary designers can apply to enable secondary design and four corresponding design implementation principles that secondary designers themselves need to apply....

  6. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  7. Principles for Enabling Deep Secondary Design

    DEFF Research Database (Denmark)

    Hansen, Magnus Rotvit Perlt; Pries-Heje, Jan

    and techniques in a hospital. Our analysis of the two cases leads to the identification of four principles of design implementation that primary designers can apply to enable secondary design and four corresponding design implementation principles that secondary designers themselves need to apply.......User-based redesign after implementation has been studied in many contexts gone by many different names, such as appropriation of technology, malleable design and secondary design. The phenomenon of redesigning content has mainly revolved around technologies such as Facebook, Twitter, or Wikipedia...... or portal-based technology with configuration abilities, with very little focus on technologies where users can change both functionality, content and the level of technology complexity. We coin this type of secondary design deep secondary design. In this paper, we investigate how to enable deep secondary...

  8. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  9. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  10. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  11. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  12. An active interferometer-stabilization scheme with linear phase control

    DEFF Research Database (Denmark)

    Vardhan Krishnamachari, Vishnu; Andresen, Esben Ravn; Potma, Eric Olaf

    2006-01-01

    We report a simple and robust computer-based active interferometer stabilization scheme which does not require modulation of the interfering beams and relies on an error signal which is linearly related to the optical path difference. In this setup, a non-collinearly propagating reference laser b...... beam stabilizes the interference output of the laser light propagating collinearly through the interferometer. This stabilization scheme enables adjustable phase control with 20 ms switching times in the range from 0.02π radians to 6π radians at 632.8 nm....

  13. Importance biasing scheme implemented in the PRIZMA code

    Energy Technology Data Exchange (ETDEWEB)

    Kandiev, I.Z.; Malyshkin, G.N. [Russian Federal Nuclear Center-All-Russia Scientific-Technical Inst. of Technical Physics, Snezhinsk (Russian Federation)

    1997-12-31

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities.

  14. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  15. Adaptive PCA based fault diagnosis scheme in imperial smelting process.

    Science.gov (United States)

    Hu, Zhikun; Chen, Zhiwen; Gui, Weihua; Jiang, Bin

    2014-09-01

    In this paper, an adaptive fault detection scheme based on a recursive principal component analysis (PCA) is proposed to deal with the problem of false alarm due to normal process changes in real process. Our further study is also dedicated to develop a fault isolation approach based on Generalized Likelihood Ratio (GLR) test and Singular Value Decomposition (SVD) which is one of general techniques of PCA, on which the off-set and scaling fault can be easily isolated with explicit off-set fault direction and scaling fault classification. The identification of off-set and scaling fault is also applied. The complete scheme of PCA-based fault diagnosis procedure is proposed. The proposed scheme is first applied to Imperial Smelting Process, and the results show that the proposed strategies can be able to mitigate false alarms and isolate faults efficiently. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  16. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  17. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  18. Identification of Swedish mosquitoes based on molecular barcoding of the COI gene and SNP analysis.

    Science.gov (United States)

    Engdahl, Cecilia; Larsson, Pär; Näslund, Jonas; Bravo, Mayra; Evander, Magnus; Lundström, Jan O; Ahlm, Clas; Bucht, Göran

    2014-05-01

    Mosquito-borne infectious diseases are emerging in many regions of the world. Consequently, surveillance of mosquitoes and concomitant infectious agents is of great importance for prediction and prevention of mosquito-borne infectious diseases. Currently, morphological identification of mosquitoes is the traditional procedure. However, sequencing of specified genes or standard genomic regions, DNA barcoding, has recently been suggested as a global standard for identification and classification of many different species. Our aim was to develop a genetic method to identify mosquitoes and to study their relationship. Mosquitoes were captured at collection sites in northern Sweden and identified morphologically before the cytochrome c oxidase subunit I (COI) gene sequences of 14 of the most common mosquito species were determined. The sequences obtained were then used for phylogenetic placement, for validation and benchmarking of phenetic classifications and finally to develop a hierarchical PCR-based typing scheme based on single nucleotide polymorphism sites (SNPs) to enable rapid genetic identification, circumventing the need for morphological characterization. The results showed that exact phylogenetic relationships between mosquito taxa were preserved at shorter evolutionary distances, but at deeper levels, they could not be inferred with confidence using COI gene sequence data alone. Fourteen of the most common mosquito species in Sweden were identified by the SNP/PCR-based typing scheme, demonstrating that genetic typing using SNPs of the COI gene is a useful method for identification of mosquitoes with potential for worldwide application. © 2013 John Wiley & Sons Ltd.

  19. GMPLS control plane extensions in support of flex-grid enabled elastic optical networks

    DEFF Research Database (Denmark)

    Turus, Ioan; Fagertun, Anna Manolova; Dittmann, Lars

    2013-01-01

    of generalized labels format and enable enhancements for the wavelength selection procedures. OSPF-TE enables the creation of spectrum databases based on novel LSA sub-TLV attributes capable of advertising spectrum status. Based on the implemented extensions, we propose and evaluate advanced distributed spectrum...... allocation schemes and strategies for dynamic routing algorithms in support of flex-grid optical networks....

  20. Dental plaque identification at home

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003426.htm Dental plaque identification at home To use the sharing features on this page, please enable JavaScript. Plaque is a sticky substance that collects around and ...

  1. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  2. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  3. Geo-Enabled, Mobile Services

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard

    2006-01-01

    We are witnessing the emergence of a global infrastructure that enables the widespread deployment of geo-enabled, mobile services in practice. At the same time, the research community has also paid increasing attention to data management aspects of mobile services. This paper offers me...

  4. Meal box schemes a convenient way to avoid convenience food? Uses and understandings of meal box schemes among Danish consumers.

    Science.gov (United States)

    Hertz, Frej Daniel; Halkier, Bente

    2017-07-01

    The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Toward genome-enabled mycology.

    Science.gov (United States)

    Hibbett, David S; Stajich, Jason E; Spatafora, Joseph W

    2013-01-01

    Genome-enabled mycology is a rapidly expanding field that is characterized by the pervasive use of genome-scale data and associated computational tools in all aspects of fungal biology. Genome-enabled mycology is integrative and often requires teams of researchers with diverse skills in organismal mycology, bioinformatics and molecular biology. This issue of Mycologia presents the first complete fungal genomes in the history of the journal, reflecting the ongoing transformation of mycology into a genome-enabled science. Here, we consider the prospects for genome-enabled mycology and the technical and social challenges that will need to be overcome to grow the database of complete fungal genomes and enable all fungal biologists to make use of the new data.

  6. A New Geometric Trilateration Scheme for GPS-Style Localization

    Science.gov (United States)

    Cheung, K.-M.; Lee, C.

    2017-05-01

    In this article, we introduce a new trilateration method for GPS-style localization. We show by simulations that the localization accuracy of the new method is indistinguishable from that of the traditional GPS approach. On the user segment side, the new scheme is computationally more efficient. This has the potential to translate into lower cost, and to enable faster location acquisition in the more challenging and dynamic operation environments.

  7. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  8. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  9. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  10. Numerical Investigation of a Novel Wiring Scheme Enabling Simple and Accurate Impedance Cytometry

    OpenAIRE

    Federica Caselli; Riccardo Reale; Nicola Antonio Nodargi; Paolo Bisegna

    2017-01-01

    Microfluidic impedance cytometry is a label-free approach for high-throughput analysis of particles and cells. It is based on the characterization of the dielectric properties of single particles as they flow through a microchannel with integrated electrodes. However, the measured signal depends not only on the intrinsic particle properties, but also on the particle trajectory through the measuring region, thus challenging the resolution and accuracy of the technique. In this work we show via...

  11. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  12. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    (log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  13. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  14. Taxonomy Enabled Discovery (TED) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposal addresses the NASA's need to enable scientific discovery and the topic's requirements for: processing large volumes of data, commonly available on the...

  15. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  16. Secure Enclaves-Enabled Technologies

    Science.gov (United States)

    2014-04-25

    William Vine , Benjamin Vowell Team Advisor: Capt Nick Mastronardi UNITED STATES AIR FORCE ACADEMY Introduction Secure Enclaves-Enabled...hardware solution to cyber security is unique in an industry dominated by software solutions which hackers inevitably find ways to circumnavigate

  17. Cluster identification based on correlations.

    Science.gov (United States)

    Schulman, L S

    2012-04-01

    The problem addressed is the identification of cooperating agents based on correlations created as a result of the joint action of these and other agents. A systematic method for using correlations beyond second moments is developed. The technique is applied to a didactic example, the identification of alphabet letters based on correlations among the pixels used in an image of the letter. As in this example, agents can belong to more than one cluster. Moreover, the identification scheme does not require that the patterns be known ahead of time.

  18. Systems and Methods for RFID-Enabled Pressure Sensing Apparatus

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor)

    2017-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  19. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  20. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  1. Introjective identification: the analytic work of evocation.

    Science.gov (United States)

    Eekhoff, Judy K

    2016-12-01

    This paper focuses on a particular counter-transference process-introjective identification and the evocation it enables. Introjective identification enables evocation because it engages the analyst's radical openness to the experience of the patient at the most primordial level. The accumulated wisdom of Ferenczi and those who followed him is used to discuss the role of introjective identification in the treatment of patients with non-neurotic structures.

  2. Reverse flood routing with the inverted Muskingum storage routing scheme

    Directory of Open Access Journals (Sweden)

    A. D. Koussis

    2012-01-01

    Full Text Available This work treats reverse flood routing aiming at signal identification: inflows are inferred from observed outflows by orienting the Muskingum scheme against the wave propagation direction. Routing against the wave propagation is an ill-posed, inverse problem (small errors amplify, leading to large spurious responses; therefore, the reverse solution must be smoothness-constrained towards stability and uniqueness (regularised. Theoretical constrains on the coefficients of the reverse routing scheme assist in error control, but optimal grids are derived by numerical experimentation. Exact solutions of the convection-diffusion equation, for a single and a composite wave, are reverse-routed and in both instances the wave is backtracked well for a range of grid parameters. In the arduous test of a square pulse, the result is comparable to those of more complex methods. Seeding outflow data with random errors enhances instability; to cope with the spurious oscillations, the reversed solution is conditioned by smoothing via low-pass filtering or optimisation. Good-quality inflow hydrographs are recovered with either smoothing treatment, yet the computationally demanding optimisation is superior. Finally, the reverse Muskingum routing method is compared to a reverse-solution method of the St. Venant equations of flood wave motion and is found to perform equally well, at a fraction of the computing effort. This study leads us to conclude that the efficiently attained good inflow identification rests on the simplicity of the Muskingum reverse routing scheme that endows it with numerical robustness.

  3. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...... an introduction to the policy context for mCHP. Section 1 describes the rationale for the promotion of mCHP by explaining its potential contribution to European energy policy goals. Section 2 addresses the policy context at the supranational European level by outlining relevant EU Directives on support schemes......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...

  4. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed...

  5. Subranging scheme for SQUID sensors

    Science.gov (United States)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  7. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  8. Automated protein subfamily identification and classification.

    Directory of Open Access Journals (Sweden)

    Duncan P Brown

    2007-08-01

    Full Text Available Function prediction by homology is widely used to provide preliminary functional annotations for genes for which experimental evidence of function is unavailable or limited. This approach has been shown to be prone to systematic error, including percolation of annotation errors through sequence databases. Phylogenomic analysis avoids these errors in function prediction but has been difficult to automate for high-throughput application. To address this limitation, we present a computationally efficient pipeline for phylogenomic classification of proteins. This pipeline uses the SCI-PHY (Subfamily Classification in Phylogenomics algorithm for automatic subfamily identification, followed by subfamily hidden Markov model (HMM construction. A simple and computationally efficient scoring scheme using family and subfamily HMMs enables classification of novel sequences to protein families and subfamilies. Sequences representing entirely novel subfamilies are differentiated from those that can be classified to subfamilies in the input training set using logistic regression. Subfamily HMM parameters are estimated using an information-sharing protocol, enabling subfamilies containing even a single sequence to benefit from conservation patterns defining the family as a whole or in related subfamilies. SCI-PHY subfamilies correspond closely to functional subtypes defined by experts and to conserved clades found by phylogenetic analysis. Extensive comparisons of subfamily and family HMM performances show that subfamily HMMs dramatically improve the separation between homologous and non-homologous proteins in sequence database searches. Subfamily HMMs also provide extremely high specificity of classification and can be used to predict entirely novel subtypes. The SCI-PHY Web server at http://phylogenomics.berkeley.edu/SCI-PHY/ allows users to upload a multiple sequence alignment for subfamily identification and subfamily HMM construction. Biologists wishing to

  9. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  10. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  11. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  12. A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2015-01-01

    Full Text Available Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popular device because it is capable of storing and computing essential information with such properties as tamper resistance. However, many service providers must satisfy the user’s desire to be able to access services anytime and anywhere with the smart card computing devices. Therefore, multipurpose smart cards have become very popular identification tokens. In 2011, Wang et al. proposed an authentication and key agreement scheme for smart card use. Even so, two drawbacks still exist; that is, (1 the security requirement of mutual authentication has not been satisfied and (2 the authentication scheme cannot be used for multipurpose smart cards. In this paper, we propose an efficient and secure multipurpose, authenticated, key agreement scheme in which the user is required to register only once and can be authenticated without any registration center. Furthermore, the proposed scheme can be used in ubiquitous environments because of its low computation and communication overhead.

  13. A DC-Link Modulation Scheme with Phase-Shifted Current Control for Harmonic Cancellations in Multidrive Applications

    DEFF Research Database (Denmark)

    Yang, Yongheng; Davari, Pooya; Zare, Firuz

    2016-01-01

    of a new DC link modulation scheme with a phase-shifted current control enabled by the SCR. The DC-link current modulation scheme is implemented by adding and subtracting specific modulation levels, which makes the total currents drawn from the grid “multi-level”, resulting in an improved current quality...

  14. External quality assessment schemes raise standards: evidence from the UKNEQAS parasitology subschemes

    Science.gov (United States)

    Kettelhut, M M; Chiodini, P L; Edwards, H; Moody, A

    2003-01-01

    Background: The burden of parasitic disease imported into the temperate zone is increasing, and in the tropics remains very high. Thus, high quality diagnostic parasitology services are needed, but to implement clinical governance a measure of quality of service is required. Aim: To examine performance in the United Kingdom National External Quality Assessment Scheme for Parasitology for evidence of improved standards in parasite diagnosis in clinical specimens. Methods: Analysis of performance was made for the period 1986 to 2001, to look for trends in performance scores. Results: An overall rise in performance in faecal and blood parasitology schemes was found from 1986 to 2001. This was seen particularly in the identification of ova, cysts, and larvae in the faecal scheme, the detection of Plasmodium ovale and Plasmodium vivax in the blood scheme, and also in the correct identification of non-malarial blood parasites. Despite this improvement, there are still problems. In the faecal scheme, participants still experience difficulty in recognising small protozoan cysts, differentiating vegetable matter from cysts, and detecting ova and cysts when more than one species is present. In the blood scheme, participants have problems in identifying mixed malarial infections, distinguishing between P ovale and P vivax, and estimating the percentage parasitaemia. The reasons underlying these problems have been identified via the educational part of the scheme, and have been dealt with by distributing teaching sheets and undertaking practical sessions. Conclusions: UK NEQAS for Parasitology has helped to raise the standard of diagnostic parasitology in the UK. PMID:14645352

  15. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    National Research Council Canada - National Science Library

    Pankratova, S.A

    2017-01-01

    .... In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  16. Readout scheme for the Baby-MIND detector

    CERN Document Server

    Noah, Etam; Cadoux, F; Favre, Y; Martinez, B; Nicola, L; Parsa, S; Rayner, M; Antonova, M; Fedotov, S; Izmaylov, A; Kleymenova, A; Khabibullin, M; Khotyantsev, A; Kudenko, Y; Likhacheva, V; Mefodiev, A; Mineev, O; Ovsiannikova, T; Shaykhiev, A; Suvorov, S; Yershov, N; Tsenov, R

    2016-01-01

    A readout scheme has been designed for the plastic scintillator bars of the Baby-MIND detector modules. This spectrometer will measure momentum and identify the charge of 1 GeV/c muons with magnetized iron plates interleaved with detector modules. One challenge the detector aims to address is that of keeping high charge identification efficiencies for momenta below 1 GeV/c where multiple scattering in the iron plates degrades momentum resolution. A front-end board has been developed, with 3 CITIROC readout chips per board and up to 96 channels. Hamamatsu MPPCs type S12571-025C photosensors were chosen for readout of wavelength shifting fibers embedded in plastic scintillators. Procurement of the MPPCs has been carried out to instrument 3000 channels in total. Design choices and first results of this readout scheme are presented.

  17. A Comparison of three high-precision quadrature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Li, Xiaoye S.

    2003-07-01

    The authors have implemented three numerical quadrature schemes, using the new Arbitrary Precision (ARPREC) software package, with the objective of seeking a completely ''automatic'' arbitrary precision quadrature facility, namely one that does not rely on a priori information of the function to be integrated. Such a facility is required, for example, to permit the experimental identification of definite integrals based on their numerical values. The performance and accuracy of these three quadrature schemes are compared using a suite of 15 integrals, ranging from continuous, well-behaved functions on finite intervals to functions with vertical derivatives and integrable singularities at endpoints, as well as several integrals on an infinite interval.

  18. Digital image communication scheme based on the breakup of spiral waves

    Science.gov (United States)

    Vaidelys, Martynas; Lu, Chen; Cheng, Yujie; Ragulskis, Minvydas

    2017-02-01

    A digital image communication scheme based on the breakup of spiral waves is presented in this paper. This communication system does not require spatially homogeneous random initial conditions. Moreover, the secret image is not embedded into the initial conditions of the evolving self-organizing patterns. Such features increase the security of the communication, but still enable an effective transmission of the secret image. Computational experiments are used to demonstrate the properties and efficiency of the proposed scheme.

  19. AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION

    OpenAIRE

    Fazli Bin Mat Nor; Kamarularifin Abd Jalil; Jamalul-lail Ab Manan

    2011-01-01

    Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schemes to validate user legitimacy in order to fulfill the authentication process. Unfortunately, these ...

  20. NLO anomalous dimension of multiplicatively renormalizable four-fermion operators in Schroedinger Functional schemes

    Energy Technology Data Exchange (ETDEWEB)

    Palombi, Filippo [' E. Fermi' Research Center, c/o Compendio Viminale - pal. F, I-00184 Rome (Italy); Pena, Carlos [DESY, Theory Group, Notkestrasse 85, D-22603 Hamburg (Germany); Sint, Stefan [Departamento de Fisica Teorica C-XI and Instituto de Fisica Teorica C-XVI, Universidad Autonoma de Madrid, Cantoblanco, E-28049 Madrid (Spain)

    2005-03-15

    Renormalization constants for multiplicatively renormalizable parity-odd four-fermion operators are computed in various different Schroedinger Functional (SF) schemes and lattice regularizations with Wilson quarks at one-loop order in perturbation theory. Our results are used in the calculation of their NLO anomalous dimensions, through matching to continuum schemes. They also enable a comparison of the two-loop perturbative RG running to the previously obtained nonperturbative one in the region of small renormalized coupling.

  1. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  2. The Ubiquity of Smooth Hilbert Schemes

    OpenAIRE

    Staal, Andrew P.

    2017-01-01

    We investigate the geography of Hilbert schemes that parametrize closed subschemes of projective space with a specified Hilbert polynomial. We classify Hilbert schemes with unique Borel-fixed points via combinatorial expressions for their Hilbert polynomials. We realize the set of all nonempty Hilbert schemes as a probability space and prove that Hilbert schemes are irreducible and nonsingular with probability greater than $0.5$.

  3. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  4. Smart Grid enabled heat pumps

    DEFF Research Database (Denmark)

    Carmo, Carolina; Detlefsen, Nina; Nielsen, Mads Pagh

    2014-01-01

    The transition towards a 100 % fossil-free energy system, while achieving extreme penetration levels of intermittent wind and solar power in electricity generation, requires demand-side technologies that are smart (intermittency-friendly) and efficient. The integration of Smart Grid enabling...

  5. Editorial: Schools as enabling environments

    African Journals Online (AJOL)

    Hennie

    South African Journal of Education, Volume 34, Number 4, November 2014. 1. Editorial, 6 pages, http://www.sajournalofeducation.co.za. Editorial: Schools as enabling environments. Guest Editors: Mahlapahlapana Themane and David Osher. Children and youth need safe and supportive schools if they are to succeed in ...

  6. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...

  7. Quantum broadcast scheme and multi-output quantum teleportation via four-qubit cluster state

    Science.gov (United States)

    Yu, Yan; Zha, Xin Wei; Li, Wei

    2017-02-01

    In this paper, two theoretical schemes of the arbitrary single-qubit states via four-qubit cluster state are proposed. One is three-party quantum broadcast scheme, which realizes the broadcast among three participants. The other is multi-output quantum teleportation. Both allow two distant receivers to simultaneously and deterministically obtain the arbitrary single-qubit states, respectively. Compared with former schemes of an arbitrary single-qubit state, the proposed schemes realize quantum multi-cast communication efficiently, which enables Bob and Charlie to obtain the states simultaneously in the case of just knowing Alice's measurement results. The proposed schemes play an important role in quantum information, specially in secret sharing and quantum teleportation.

  8. An informed synchronization scheme for audio data hiding

    Science.gov (United States)

    LoboGuerrero, Alejandro; Bas, Patrick; Lienard, Joel

    2004-06-01

    This paper deals with the problem of synchronization in the particular case of audio data hiding. In this kind of application the goal is to increase the information of an audio data set by inserting an imperceptible message. An innovating synchronization scheme that uses informed coding theory is proposed. The goal is to realize a complementary approach from two different techniques in order to obtain an enhanced synchronization system. To that end, the analysis of the classical spread spectrum synchronization is done and this classical scheme is improved by the use of side information. Informed coding theory is presented and revisited taking into account the problem of synchronization to enable the selection of signal realizations called Feature Time Points (FTP) which are correlated with a code. Such considerations yield to the definition of informed synchronization. The proposed scheme and the definition of FTP are after presented taking into account the robustness criterion. Finally, results and comparison with classical spread spectrum synchronization schemes are presented.

  9. Deflection routing scheme for GMPLS-based OBS networks

    DEFF Research Database (Denmark)

    Eid, Arafat; Mahmood, Waqar; Alomar, Anwar

    2010-01-01

    Integrating the Generalized Multi-Protocol Label Switching (GMPLS) framework into an Optical Burst Switching (OBS) Control Plane is a promising solution to alleviating most of OBS performance and design issues. However, implementing the already proposed OBS deflection routing schemes is not appli......Integrating the Generalized Multi-Protocol Label Switching (GMPLS) framework into an Optical Burst Switching (OBS) Control Plane is a promising solution to alleviating most of OBS performance and design issues. However, implementing the already proposed OBS deflection routing schemes...... is not applicable in such an integrated solution. This is due to the existence of already established Label Switched Paths (LSPs) between edge nodes in a GMPLS-based OBS network which guide the Data Burst Headers (DBHs) through the network. In this paper we propose a novel deflection routing scheme which can...... be implemented in GMPLS-based OBS Control Plane. In this scheme, deflection routes or LSPs are designed and pre-established for the whole network. The ingress nodes are responsible for enabling DBHs for deflection at contending core ports prior to DBHs transmission. Moreover, we propose an object extension...

  10. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  11. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  12. The Original Management Incentive Schemes

    OpenAIRE

    Richard T. Holden

    2005-01-01

    During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...

  13. Adaptive Optics Metrics & QC Scheme

    Science.gov (United States)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  14. The mathematics of Ponzi schemes

    OpenAIRE

    Artzrouni, Marc

    2009-01-01

    A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...

  15. PV-to-EV schemes for photovoltaics integration and power balance

    Energy Technology Data Exchange (ETDEWEB)

    Lindgren, J.; Niemi, R.; Lund, P.D. [Aalto Univ. School of Science, Espoo-Otaniemi (Finland). New Energy Technologies Group

    2012-07-01

    In this paper the combined energy system effects from combined integrated schemes of renewable electricity (PV) and electrified vehicles (EV) are investigated. The analyses include optimized control of EVs, effects of large EV fleets on electricity price, and PV-EV integration. Key results show that optimal control strategy of EV may yield a 7 % improvement to the electric mileage. With these strategies, the market price of electricity market would be marginally affected by large EV schemes. Optimized EV-schemes would also enable PV integration into the electric system with minimal grid impact. (orig.)

  16. A uniform quantitative stiff stability estimate for BDF schemes

    Directory of Open Access Journals (Sweden)

    Winfried Auzinger

    2006-01-01

    Full Text Available The concepts of stability regions, \\(A\\- and \\(A(\\alpha\\-stability - albeit based on scalar models - turned out to be essential for the identification of implicit methods suitable for the integration of stiff ODEs. However, for multistep methods, knowledge of the stability region provides no information on the quantitative stability behavior of the scheme. In this paper we fill this gap for the important class of Backward Differentiation Formulas (BDF. Quantitative stability bounds are derived which are uniformly valid in the stability region of the method. Our analysis is based on a study of the separation of the characteristic roots and a special similarity decomposition of the associated companion matrix.

  17. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  18. A Hybrid Data Compression Scheme for Improved VNC

    Directory of Open Access Journals (Sweden)

    Xiaozheng (Jane Zhang

    2007-04-01

    Full Text Available Virtual Network Computing (VNC has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. The algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. The improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.

  19. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  20. Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems

    Directory of Open Access Journals (Sweden)

    Jinsuk Chung

    2013-01-01

    Full Text Available This paper describes and evaluates a scalable and efficient resilience scheme based on the concept of containment domains. Containment domains are a programming construct that enable applications to express resilience needs and to interact with the system to tune and specialize error detection, state preservation and restoration, and recovery schemes. Containment domains have weak transactional semantics and are nested to take advantage of the machine and application hierarchies and to enable hierarchical state preservation, restoration and recovery. We evaluate the scalability and efficiency of containment domains using generalized trace-driven simulation and analytical analysis and show that containment domains are superior to both checkpoint restart and redundant execution approaches.

  1. Organizational Enablers for Project Governance

    DEFF Research Database (Denmark)

    Müller, Ralf; Shao, Jingting; Pemsel, Sofia

    and their relationships to organizational success. Based on these results, the authors discovered that organizational enablers (including key factors such as leadership, governance, and influence of project managers) have a critical impact on how organizations operate, adapt to market fluctuations and forces, and make...... essential changes over time. This must-read book is a practical guide for executives and project managers alike. The insights and industry examples provided can be applied to any project-based organization......., Organizational Enablers for Project Governance, Ralf Müller, Jingting Shao, and Sofia Pemsel examine the interaction of governance and governmentality in various types of companies and demonstrate how these factors drive business success and influence project work, efficiency, and profitability. The data...

  2. Channel Aggregation Schemes for Cognitive Radio Networks

    Science.gov (United States)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  3. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    is to approximate the kernel function by a power function near zero and by a step function elsewhere. The resulting approximation of the process is a combination of Wiener integrals of the power function and a Riemann sum, which is why we call this method a hybrid scheme. Our main theoretical result describes...... the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme...

  4. New Generation Sensor Web Enablement

    Directory of Open Access Journals (Sweden)

    Christoph Stasch

    2011-03-01

    Full Text Available Many sensor networks have been deployed to monitor Earth’s environment, and more will follow in the future. Environmental sensors have improved continuously by becoming smaller, cheaper, and more intelligent. Due to the large number of sensor manufacturers and differing accompanying protocols, integrating diverse sensors into observation systems is not straightforward. A coherent infrastructure is needed to treat sensors in an interoperable, platform-independent and uniform way. The concept of the Sensor Web reflects such a kind of infrastructure for sharing, finding, and accessing sensors and their data across different applications. It hides the heterogeneous sensor hardware and communication protocols from the applications built on top of it. The Sensor Web Enablement initiative of the Open Geospatial Consortium standardizes web service interfaces and data encodings which can be used as building blocks for a Sensor Web. This article illustrates and analyzes the recent developments of the new generation of the Sensor Web Enablement specification framework. Further, we relate the Sensor Web to other emerging concepts such as the Web of Things and point out challenges and resulting future work topics for research on Sensor Web Enablement.

  5. 'Ethos' Enabling Organisational Knowledge Creation

    Science.gov (United States)

    Matsudaira, Yoshito

    This paper examines knowledge creation in relation to improvements on the production line in the manufacturing department of Nissan Motor Company and aims to clarify embodied knowledge observed in the actions of organisational members who enable knowledge creation will be clarified. For that purpose, this study adopts an approach that adds a first, second, and third-person's viewpoint to the theory of knowledge creation. Embodied knowledge, observed in the actions of organisational members who enable knowledge creation, is the continued practice of 'ethos' (in Greek) founded in Nissan Production Way as an ethical basis. Ethos is knowledge (intangible) assets for knowledge creating companies. Substantiated analysis classifies ethos into three categories: the individual, team and organisation. This indicates the precise actions of the organisational members in each category during the knowledge creation process. This research will be successful in its role of showing the indispensability of ethos - the new concept of knowledge assets, which enables knowledge creation -for future knowledge-based management in the knowledge society.

  6. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    Energy Technology Data Exchange (ETDEWEB)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra [Department of Medical Physics, School of Medicine,University of Patras, Patras 26504 (Greece); Kalogeropoulou, Christina [Department of Radiology, School of Medicine, University of Patras, Patras 26504 (Greece); Pratikakis, Ioannis [Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi 67100 (Greece); Costaridou, Lena, E-mail: costarid@upatras.gr [Department of Medical Physics, School of Medicine, University of Patras, Patras 26504 (Greece)

    2015-08-15

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  7. The echo-enabled harmonic generation options for FLASH II

    Energy Technology Data Exchange (ETDEWEB)

    Deng, Haixiao [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Shanghai Inst. of Applied Physics (China); Decking, Winfried; Faatz, Bart [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2011-03-15

    FLASH II is an upgrade to the existing free electron laser (FEL) FLASH. The echo-enabled harmonic generation (EEHG) scheme is proposed to be a potential seeding option of FLASH II. In this paper, the possibility of EEHG operation of FLASH II is investigated for the first time. With a combination of existing numerical codes, i.e. a laser-beam interaction code in an undulator (LBICU), a beam tracking code in a chicane (ELEGANT) and an universal FEL simulating code (GENESIS), the effects of beam energy chirp and coherent synchrotron radiation (CSR) on EEHG operation are studied as well. In addition, several interesting issues concerning EEHG simulation are discussed. (orig.)

  8. Schematic Method for Effective Identification of Anaerobes from ...

    African Journals Online (AJOL)

    Further tests revealed Bacteroides fragilis, Fusobacterium nucleatium, Porphyromonas assacharolytica, Prevotella intermedia, and Peptosterptococcus magnus as most frequently isolated. The developed scheme interlinked the various identification steps: 1st level; inoculation and growth, 2nd level; Gram differentiation and ...

  9. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  10. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  11. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  12. Fragment separator momentum compression schemes

    Science.gov (United States)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-07-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  13. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...

  14. Staggered Schemes for Fluctuating Hydrodynamics

    CERN Document Server

    Balboa, F; Delgado-Buscalioni, R; Donev, A; Fai, T; Griffith, B; Peskin, C S

    2011-01-01

    We develop numerical schemes for solving the isothermal compressible and incompressible equations of fluctuating hydrodynamics on a grid with staggered momenta. We develop a second-order accurate spatial discretization of the diffusive, advective and stochastic fluxes that satisfies a discrete fluctuation-dissipation balance, and construct temporal discretizations that are at least second-order accurate in time deterministically and in a weak sense. Specifically, the methods reproduce the correct equilibrium covariances of the fluctuating fields to third (compressible) and second (incompressible) order in the time step, as we verify numerically. We apply our techniques to model recent experimental measurements of giant fluctuations in diffusively mixing fluids in a micro-gravity environment [A. Vailati et. al., Nature Communications 2:290, 2011]. Numerical results for the static spectrum of non-equilibrium concentration fluctuations are in excellent agreement between the compressible and incompressible simula...

  15. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    Science.gov (United States)

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  16. Design of Joint Spatial and Power Domain Multiplexing Scheme for Massive MIMO Systems

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2015-01-01

    Full Text Available Massive Multiple-Input Multiple-Output (MIMO is one of the key techniques in 5th generation wireless systems (5G due to its potential ability to improve spectral efficiency. Most of the existing works on massive MIMO only consider Time Division Duplex (TDD operation that relies on channel reciprocity between uplink and downlink channels. For Frequency Division Duplex (FDD systems, with continued efforts, some downlink multiuser MIMO scheme was recently proposed in order to enable “massive MIMO” gains and simplified system operations with limited number of radio frequency (RF chains in FDD system. However these schemes, such as Joint Spatial Division and Multiplexing (JSDM scheme and hybrid precoding scheme, only focus on multiuser transmission in spatial domain. Different from most of the existing works, this paper proposes Joint Spatial and Power Multiplexing (JSPM scheme in FDD systems. It extends existing FDD schemes from spatial division and multiplexing to joint spatial and power domain to achieve more multiplexing gain. The user grouping and scheduling scheme of JSPM is studied and the asymptotic expression for the sum capacity is derived as well. Finally, simulations are conducted to illustrate the effectiveness of the proposed scheme.

  17. Venture Capitalist Enabled Entrepreneurial Mentoring

    DEFF Research Database (Denmark)

    Agrawal, Anirudh

    2018-01-01

    -up entrepreneur. Using some interviews and secondary data from three Indian VC firms, this chapter explores the VC and investee enterprise mentoring within the Indian start-up ecosystem, The data analysis suggests that factors for the best outcomes include VCs that are highly networked‚ intensively sector focused......, have entrepreneurs as investors, and that engage frequently with investees over managerial and market issues. Using these cases, this study proposes an antecedent‚ action and outcome model of venture capital enabled entrepreneurial mentoring in India. This model can be expanded in the global context....

  18. Optimized microsystems-enabled photovoltaics

    Energy Technology Data Exchange (ETDEWEB)

    Cruz-Campa, Jose Luis; Nielson, Gregory N.; Young, Ralph W.; Resnick, Paul J.; Okandan, Murat; Gupta, Vipin P.

    2015-09-22

    Technologies pertaining to designing microsystems-enabled photovoltaic (MEPV) cells are described herein. A first restriction for a first parameter of an MEPV cell is received. Subsequently, a selection of a second parameter of the MEPV cell is received. Values for a plurality of parameters of the MEPV cell are computed such that the MEPV cell is optimized with respect to the second parameter, wherein the values for the plurality of parameters are computed based at least in part upon the restriction for the first parameter.

  19. A reliable RFID mutual authentication scheme for healthcare environments.

    Science.gov (United States)

    Wu, Zhen-Yu; Chen, Lichin; Wu, Ju-Chuan

    2013-04-01

    Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.

  20. Enabling Exploration Through Docking Standards

    Science.gov (United States)

    Hatfield, Caris A.

    2012-01-01

    Human exploration missions beyond low earth orbit will likely require international cooperation in order to leverage limited resources. International standards can help enable cooperative missions by providing well understood, predefined interfaces allowing compatibility between unique spacecraft and systems. The International Space Station (ISS) partnership has developed a publicly available International Docking System Standard (IDSS) that provides a solution to one of these key interfaces by defining a common docking interface. The docking interface provides a way for even dissimilar spacecraft to dock for exchange of crew and cargo, as well as enabling the assembly of large space systems. This paper provides an overview of the key attributes of the IDSS, an overview of the NASA Docking System (NDS), and the plans for updating the ISS with IDSS compatible interfaces. The NDS provides a state of the art, low impact docking system that will initially be made available to commercial crew and cargo providers. The ISS will be used to demonstrate the operational utility of the IDSS interface as a foundational technology for cooperative exploration.

  1. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  2. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme. These sche......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme....... These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms...

  3. Advanced neural network-based computational schemes for robust fault diagnosis

    CERN Document Server

    Mrugalski, Marcin

    2014-01-01

    The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for designing robust fault diagnosis schemes for non-linear dynamic systems. A part of the book focuses on fundamental issues such as architectures of dynamic neural networks, methods for designing of neural networks and fault diagnosis schemes as well as the importance of robustness. The book is of a tutorial value and can be perceived as a good starting point for the new-comers to this field. The book is also devoted to advanced schemes of description of neural model uncertainty. In particular, the methods of computation of neural networks uncertainty with robust parameter estimation are presented. Moreover, a novel approach for system identification with the state-space GMDH neural network is delivered. All the concepts described in this book are illustrated by both simple academic illustrative examples and practica...

  4. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  5. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  6. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  7. Optics design for CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Yu, Chenghui; Gao, Jie

    2017-12-01

    The CEPC is a future Circular Electron and Positron Collider proposed by China to mainly study the Higgs boson. Its baseline design is a double ring scheme and an alternative design is a partial double ring scheme. This paper will present the optics design for the main ring of the double ring scheme. The CEPC will also work as a W and Z factory. Compatible optics designs for a W and a Z modes will be presented as well.

  8. Wavelet Denoising within the Lifting Scheme Framework

    Directory of Open Access Journals (Sweden)

    M. P. Paskaš

    2012-11-01

    Full Text Available In this paper, we consider an example of the lifting scheme and present the results of the simple lifting scheme implementation using lazy transform. The paper is tutorial-oriented. The results are obtained by testing several common test signals for the signal denoising problem and using different threshold values. The lifting scheme represents an effective and flexible tool that can be used for introducing signal dependence into the problem by improving the wavelet properties.

  9. Optimum wireless sensor deployment scheme for structural health monitoring: a simulation study

    Science.gov (United States)

    Liu, Chengyin; Fang, Kun; Teng, Jun

    2015-11-01

    With the rapid advancements in smart sensing technology and wireless communication technology, the wireless sensor network (WSN) offers an alternative solution to structural health monitoring (SHM). In WSNs, dense deployment of wireless nodes aids the identification of structural dynamic characteristics, while data transmission is a significant issue since wireless channels typically have a lower bandwidth and a limited power supply. This paper provides a wireless sensor deployment optimization scheme for SHM, in terms of both energy consumption and modal identification accuracy. A spherical energy model is established to formulate the energy consumption within a WSN. The optimal number of sensors and their locations are obtained through solving a multi-objective function with weighting factors on energy consumption and modal identification accuracy using a genetic algorithm (GA). Simulation and comparison results with traditional sensor deployment methods demonstrate the efficiency of the proposed optimization scheme.

  10. Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

    Directory of Open Access Journals (Sweden)

    Tengfei Tu

    2017-01-01

    Full Text Available As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA. Although the first outsourced auditing scheme can protect against the malicious TPA, this scheme enables TPA to have read access right over user’s outsourced data, which is a potential risk for user data privacy. In this paper, we introduce the notion of User Focus for outsourced auditing, which emphasizes the idea that lets user dominate her own data. Based on User Focus, our proposed scheme not only can prevent user’s data from leaking to TPA without depending on data encryption but also can avoid the use of additional independent random source that is very difficult to meet in practice. We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.

  11. Technology Enabling Ultra High Concentration Multi-Junction Cells. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Bedair, S. M.; Colter, Peter

    2016-03-30

    The project goal is to enable multijunction cells to operate at greater than 2000× suns intensity with efficiency above forty percent. To achieve this goal the recipients have developed a robust high-bandgap tunnel junction, reduce series resistance, and integrated a practical heat dissipation scheme.

  12. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (i......) Ghost states are easily avoided without including semicore shells. (ii) The ultrasoft pseudo-charge-augmentation functions can be made softer. (iii) The number of nonlocal operators is reduced. The scheme will be most useful for transition metals, and the feasibility and accuracy of the scheme...

  13. Central schemes for open-channel flow

    Science.gov (United States)

    Gottardi, Guido; Venutelli, Maurizio

    2003-03-01

    The resolution of the Saint-Venant equations for modelling shock phenomena in open-channel flow by using the second-order central schemes of Nessyahu and Tadmor (NT) and Kurganov and Tadmor (KT) is presented. The performances of the two schemes that we have extended to the non-homogeneous case and that of the classical first-order Lax-Friedrichs (LF) scheme in predicting dam-break and hydraulic jumps in rectangular open channels are investigated on the basis of different numerical and physical conditions. The efficiency and robustness of the schemes are tested by comparing model results with analytical or experimental solutions.

  14. Context-Enabled Business Intelligence

    Energy Technology Data Exchange (ETDEWEB)

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  15. Simulation Enabled Safeguards Assessment Methodology

    Energy Technology Data Exchange (ETDEWEB)

    Robert Bean; Trond Bjornard; Thomas Larson

    2007-09-01

    It is expected that nuclear energy will be a significant component of future supplies. New facilities, operating under a strengthened international nonproliferation regime will be needed. There is good reason to believe virtual engineering applied to the facility design, as well as to the safeguards system design will reduce total project cost and improve efficiency in the design cycle. Simulation Enabled Safeguards Assessment MEthodology (SESAME) has been developed as a software package to provide this capability for nuclear reprocessing facilities. The software architecture is specifically designed for distributed computing, collaborative design efforts, and modular construction to allow step improvements in functionality. Drag and drop wireframe construction allows the user to select the desired components from a component warehouse, render the system for 3D visualization, and, linked to a set of physics libraries and/or computational codes, conduct process evaluations of the system they have designed.

  16. Enablers and constrainers to participation

    DEFF Research Database (Denmark)

    Desjardins, Richard; Milana, Marcella

    2007-01-01

    as to construct a tool for analyzing the targeting of adult learning policy, with regard to both its coverage and expected consequences. Our aim is to develop a means for a more in-depth analysis of the match-mismatch of public policy and persisting constraints to participation.......This paper briefly reviews some of evidence on participation patterns in Nordic countries and some of the defining parameters that may explain the observations. This is done in a comparative perspective by contrasting results from the 2003 Eurobarometer data between Nordic countries and a handful...... of non-Nordic countries. An emphasis is placed on the constraining and enabling elements to participation and how these may explain why certain groups participate more or less than others. A central question of interest to this paper is to what extent does (can) government intervention interact...

  17. Informatics enables public health surveillance

    Directory of Open Access Journals (Sweden)

    Scott J. N McNabb

    2017-01-01

    Full Text Available Over the past decade, the world has radically changed. New advances in information and communication technologies (ICT connect the world in ways never imagined. Public health informatics (PHI leveraged for public health surveillance (PHS, can enable, enhance, and empower essential PHS functions (i.e., detection, reporting, confirmation, analyses, feedback, response. However, the tail doesn't wag the dog; as such, ICT cannot (should not drive public health surveillance strengthening. Rather, ICT can serve PHS to more effectively empower core functions. In this review, we explore promising ICT trends for prevention, detection, and response, laboratory reporting, push notification, analytics, predictive surveillance, and using new data sources, while recognizing that it is the people, politics, and policies that most challenge progress for implementation of solutions.

  18. Genome-enabled plant metabolomics.

    Science.gov (United States)

    Tohge, Takayuki; de Souza, Leonardo Perez; Fernie, Alisdair R

    2014-09-01

    The grand challenge currently facing metabolomics is that of comprehensitivity whilst next generation sequencing and advanced proteomics methods now allow almost complete and at least 50% coverage of their respective target molecules, metabolomics platforms at best offer coverage of just 10% of the small molecule complement of the cell. Here we discuss the use of genome sequence information as an enabling tool for peak identity and for translational metabolomics. Whilst we argue that genome information is not sufficient to compute the size of a species metabolome it is highly useful in predicting the occurrence of a wide range of common metabolites. Furthermore, we describe how via gene functional analysis in model species the identity of unknown metabolite peaks can be resolved. Taken together these examples suggest that genome sequence information is current (and likely will remain), a highly effective tool in peak elucidation in mass spectral metabolomics strategies. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  20. Opportunistic Cognitive Relaying: A Win-Win Spectrum Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Luo Haiyan

    2010-01-01

    Full Text Available A cost-effective spectrum sharing architecture is proposed to enable the legacy noncognitive secondary system to coexist with the primary system. Specifically, we suggest to install a few intermediate nodes, namely, the cognitive relays, to conduct the spectrum sensing and coordinate the spectrum access. To achieve the goal of win-win between primary and secondary systems, the cognitive relay may act as a cooperator for both of them, and an Opportunistic Cognitive Relaying (OCR scheme is specially devised. In this scheme, the cognitive relay opportunistically switches among three different working modes, that is, Relay for Primary Link (RPL, Relay for Secondary Link (RSL, or Relay for Neither of the Links (RNL, respectively, based on the channel-dependent observation of both systems. In addition, the transmit power for cognitive relay and secondary transmitter in each mode are optimally determined by maximizing the transmission rate of secondary system while keeping or even reducing the outage probability of primary system. Simulation results validate the efficiency of the proposed spectrum sharing scheme.

  1. Confirming theoretical pay constructs of a variable pay scheme

    Directory of Open Access Journals (Sweden)

    Sibangilizwe Ncube

    2013-01-01

    Full Text Available Orientation: Return on the investment in variable pay programmes remains controversial because their cost versus contribution cannot be empirically justified. Research purpose: This study validates the findings of the model developed by De Swardt on the factors related to successful variable pay programmes.Motivation for the study: Many organisations blindly implement variable pay programmes without any means to assess the impact these programmes have on the company’s performance. This study was necessary to validate the findings of an existing instrument that validates the contribution of variable pay schemes.Research design, approach and method: The study was conducted using quantitative research. A total of 300 completed questionnaires from a non-purposive sample of 3000 participants in schemes across all South African industries were returned and analysed.Main findings: Using exploratory and confirmatory factor analysis, it was found that the validation instrument developed by De Swardt is still largely valid in evaluating variable pay schemes. The differences between the study and the model were reported.Practical/managerial implications: The study confirmed the robustness of an existing model that enables practitioners to empirically validate the use of variable pay plans. This model assists in the design and implementation of variable pay programmes that meet critical success factors.Contribution/value-add: The study contributed to the development of a measurement instrument that will assess whether a variable pay plan contributes to an organisation’s success.

  2. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  3. A 3-layer coding scheme for biometry template protection based on spectral minutiae

    NARCIS (Netherlands)

    Shao, X.; Xu, H.; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2011-01-01

    Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but it requires error-correcting codes that can handle high bit error rates (i.e. above 40%). In this paper, we propose a

  4. A Systematic Methodology for Constructing High-Order Energy Stable WENO Schemes

    Science.gov (United States)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non{Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter [1] was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables "energy stable" modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  5. Important innovation enablers for innovation teams

    OpenAIRE

    Johnsson, Mikael

    2016-01-01

    This research aims to study if innovation enablers (Enablers), i.e. factors that enable innovation work, are important for innovation teams in on-going innovation work and if lack of Enablers affects innovation projects negatively. The background to this study is that prior research states that numerous factors are important for innovation work, but there’s still knowledge to gain whatever these Enablers are perceived to be important by innovation teams. Data from three innovation teams on-go...

  6. The Global Network of Optical Magnetometers for Exotic physics (GNOME): A novel scheme to search for physics beyond the Standard Model

    Energy Technology Data Exchange (ETDEWEB)

    Pustelny, Szymon [Institute of Physics, Jagiellonian University, Krakow (Poland); Department of Physics, University of California at Berkeley, Berkeley, CA (United States); Jackson Kimball, Derek F. [Department of Physics, California State University, Hayward, CA (United States); Pankow, Chris [Center for Gravitation, Cosmology, and Astrophysics, Department of Physics, University of Wisconsin-Milwaukee, Milwaukee, WI (United States); Ledbetter, Micah P. [Department of Physics, University of California at Berkeley, Berkeley, CA (United States); Wlodarczyk, Przemyslaw [Department of Electronics, AGH University of Science and Technology, Krakow (Poland); Wcislo, Piotr [Institute of Physics, Jagiellonian University, Krakow (Poland); Institute of Physics, Faculty of Physics, Astronomy and Informatics, Nicolaus Copernicus University, Torun (Poland); Pospelov, Maxim [Department of Physics and Astronomy, University of Victoria, Victoria, BC (Canada); Perimeter Institute for Theoretical Physics, Waterloo, ON (Canada); Smith, Joshua R.; Read, Jocelyn [Gravitational-Wave Physics and Astronomy Center, Department of Physics, California State University, Fullerton, CA (United States); Gawlik, Wojciech [Institute of Physics, Jagiellonian University, Krakow (Poland); Budker, Dmitry [Department of Physics, University of California at Berkeley, Berkeley, CA (United States); Nuclear Science Division, Lawrence Berkeley National Laboratory, Berkeley, CA (United States)

    2013-09-15

    A novel experimental scheme enabling the investigation of transient exotic spin couplings is discussed. The scheme is based on synchronous measurements of optical-magnetometer signals from several devices operating in magnetically shielded environments in distant locations (>or similar 100 km). Although signatures of such exotic couplings may be present in the signal from a single magnetometer, it would be challenging to distinguish them from noise. By analyzing the correlation between signals from multiple, geographically separated magnetometers, it is not only possible to identify the exotic transient but also to investigate its nature. The ability of the network to probe presently unconstrained physics beyond the Standard Model is examined by considering the spin coupling to stable topological defects (e.g., domain walls) of axion-like fields. In the spirit of this research, a brief ({proportional_to}2 hours) demonstration experiment involving two magnetometers located in Krakow and Berkeley ({proportional_to}9000 km separation) is presented and discussion of the data-analysis approaches that may allow identification of transient signals is provided. The prospects of the network are outlined in the last part of the paper. (copyright 2013 by WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  7. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  8. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  9. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  10. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  11. Mobile Machine for E-payment Scheme

    OpenAIRE

    Sattar J Aboud

    2010-01-01

    In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.

  12. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    formation transmitted in digital communication systems. Such schemes ... Department of Electronics and Telecommunications Engineering,. University of Dar es ...... (2): 165-176. Kundaeli, H. N. (2013). Throughput-Delay. Analysis of the SR-ST-GBN ARQ Scheme. Mediterranean Journal of Electronics and. Communication.

  13. Enabling technology for human collaboration.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Tim Andrew (MindTel, LLC, Syracuse, NY); Jones, Wendell Bruce; Warner, David Jay (MindTel, LLC, Syracuse, NY); Doser, Adele Beatrice; Johnson, Curtis Martin; Merkle, Peter Benedict

    2003-11-01

    This report summarizes the results of a five-month LDRD late start project which explored the potential of enabling technology to improve the performance of small groups. The purpose was to investigate and develop new methods to assist groups working in high consequence, high stress, ambiguous and time critical situations, especially those for which it is impractical to adequately train or prepare. A testbed was constructed for exploratory analysis of a small group engaged in tasks with high cognitive and communication performance requirements. The system consisted of five computer stations, four with special devices equipped to collect physiologic, somatic, audio and video data. Test subjects were recruited and engaged in a cooperative video game. Each team member was provided with a sensor array for physiologic and somatic data collection while playing the video game. We explored the potential for real-time signal analysis to provide information that enables emergent and desirable group behavior and improved task performance. The data collected in this study included audio, video, game scores, physiological, somatic, keystroke, and mouse movement data. The use of self-organizing maps (SOMs) was explored to search for emergent trends in the physiological data as it correlated with the video, audio and game scores. This exploration resulted in the development of two approaches for analysis, to be used concurrently, an individual SOM and a group SOM. The individual SOM was trained using the unique data of each person, and was used to monitor the effectiveness and stress level of each member of the group. The group SOM was trained using the data of the entire group, and was used to monitor the group effectiveness and dynamics. Results suggested that both types of SOMs were required to adequately track evolutions and shifts in group effectiveness. Four subjects were used in the data collection and development of these tools. This report documents a proof of concept

  14. Enabling Participation In Exoplanet Science

    Science.gov (United States)

    Taylor, Stuart F.

    2015-08-01

    Determining the distribution of exoplanets has required the contributions of a community of astronomers, who all require the support of colleagues to finish their projects in a manner to enable them to enter new collaborations to continue to contribute to understanding exoplanet science.The contributions of each member of the astronomy community are to be encouraged and must never be intentionally obstructed.We present a member’s long pursuit to be a contributing part of the exoplanet community through doing transit photometry as a means of commissioning the telescopes for a new observatory, followed by pursuit of interpreting the distributions in exoplanet parameter data.We present how the photometry projects have been presented as successful by the others who have claimed to have completed them, but how by requiring its employees to present results while omitting one member has been obstructive against members working together and has prevented the results from being published in what can genuinely be called a peer-reviewed fashion.We present how by tolerating one group to obstruct one member from finishing participation and then falsely denying credit is counterproductive to doing science.We show how expecting one member to attempt to go around an ostracizing group by starting something different is destructive to the entire profession. We repeat previously published appeals to help ostracized members to “go around the observatory” by calling for discussion on how the community must act to reverse cases of shunning, bullying, and other abuses. Without better recourse and support from the community, actions that do not meet standard good collegial behavior end up forcing good members from the community. The most important actions are to enable an ostracized member to have recourse to participating in group papers by either working through other authors or through the journal. All journals and authors must expect that no co-author is keeping out a major

  15. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  16. R & D on Beam Injection and Bunching Schemes in the Fermilab Booster

    Energy Technology Data Exchange (ETDEWEB)

    Bhat, C. M. [Fermilab

    2016-01-01

    Fermilab is committed to upgrade its accelerator complex to support HEP experiments at the intensity frontier. The ongoing Proton Improvement Plan (PIP) enables us to reach 700 kW beam power on the NuMI neutrino targets. By the end of the next decade, the current 400 MeV normal conducting LINAC will be replaced by an 800 MeV superconducting LINAC (PIP-II) with an increased beam power >50% of the PIP design goal. Both in PIP and PIP-II era, the existing Booster is going to play a very significant role, at least for next two decades. In the meanwhile, we have recently developed an innovative beam injection and bunching scheme for the Booster called "early injection scheme" that continues to use the existing 400 MeV LINAC and implemented into operation. This scheme has the potential to increase the Booster beam intensity by >40% from the PIP design goal. Some benefits from the scheme have already been seen. In this paper, I will describe the basic principle of the scheme, results from recent beam experiments, our experience with the new scheme in operation, current status, issues and future plans. This scheme fits well with the current and future intensity upgrade programs at Fermilab.

  17. Targeted ENO schemes with tailored resolution property for hyperbolic conservation laws

    Science.gov (United States)

    Fu, Lin; Hu, Xiangyu Y.; Adams, Nikolaus A.

    2017-11-01

    In this paper, we extend the range of targeted ENO (TENO) schemes (Fu et al. (2016) [18]) by proposing an eighth-order TENO8 scheme. A general formulation to construct the high-order undivided difference τK within the weighting strategy is proposed. With the underlying scale-separation strategy, sixth-order accuracy for τK in the smooth solution regions is designed for good performance and robustness. Furthermore, a unified framework to optimize independently the dispersion and dissipation properties of high-order finite-difference schemes is proposed. The new framework enables tailoring of dispersion and dissipation as function of wavenumber. The optimal linear scheme has minimum dispersion error and a dissipation error that satisfies a dispersion-dissipation relation. Employing the optimal linear scheme, a sixth-order TENO8-opt scheme is constructed. A set of benchmark cases involving strong discontinuities and broadband fluctuations is computed to demonstrate the high-resolution properties of the new schemes.

  18. Mastering system identification in 100 exercises

    CERN Document Server

    Schoukens, J; Rolain, Yves

    2012-01-01

    "This book enables readers to understand system identification and linear system modeling through 100 practical exercises without requiring complex theoretical knowledge. The contents encompass state-of-the-art system identification methods, with both time and frequency domain system identification methods covered, including the pros and cons of each. Each chapter features MATLAB exercises, discussions of the exercises, accompanying MATLAB downloads, and larger projects that serve as potential assignments in this learn-by-doing resource"--

  19. FEATURES OF THE SCHEMES OF CASH PAYMENTS AND BANKING OPERATIONS WITH MONEY LAUNDERING

    Directory of Open Access Journals (Sweden)

    Irina N. Mihailova

    2014-01-01

    Full Text Available The scientific article is devoted to problems of identification schemes origin of the property and money by making a wide range of transactions and financial operations in business and other economic activity, which is carried out by change of the nominal owner of the property (front companies. In most cases, these transactions have no economic sense. For the legislation of criminal possession of property transactions are documented. In the process of legalization of income obtained illegally are in the form of goods, funds, securities, property rights, which require constant perfection of methods for the detection of fraudulent schemes.

  20. Enabling individualized therapy through nanotechnology.

    Science.gov (United States)

    Sakamoto, Jason H; van de Ven, Anne L; Godin, Biana; Blanco, Elvin; Serda, Rita E; Grattoni, Alessandro; Ziemys, Arturas; Bouamrani, Ali; Hu, Tony; Ranganathan, Shivakumar I; De Rosa, Enrica; Martinez, Jonathan O; Smid, Christine A; Buchanan, Rachel M; Lee, Sei-Young; Srinivasan, Srimeenakshi; Landry, Matthew; Meyn, Anne; Tasciotti, Ennio; Liu, Xuewu; Decuzzi, Paolo; Ferrari, Mauro

    2010-08-01

    Individualized medicine is the healthcare strategy that rebukes the idiomatic dogma of 'losing sight of the forest for the trees'. We are entering a new era of healthcare where it is no longer acceptable to develop and market a drug that is effective for only 80% of the patient population. The emergence of "-omic" technologies (e.g. genomics, transcriptomics, proteomics, metabolomics) and advances in systems biology are magnifying the deficiencies of standardized therapy, which often provide little treatment latitude for accommodating patient physiologic idiosyncrasies. A personalized approach to medicine is not a novel concept. Ever since the scientific community began unraveling the mysteries of the genome, the promise of discarding generic treatment regimens in favor of patient-specific therapies became more feasible and realistic. One of the major scientific impediments of this movement towards personalized medicine has been the need for technological enablement. Nanotechnology is projected to play a critical role in patient-specific therapy; however, this transition will depend heavily upon the evolutionary development of a systems biology approach to clinical medicine based upon "-omic" technology analysis and integration. This manuscript provides a forward looking assessment of the promise of nanomedicine as it pertains to individualized medicine and establishes a technology "snapshot" of the current state of nano-based products over a vast array of clinical indications and range of patient specificity. Other issues such as market driven hurdles and regulatory compliance reform are anticipated to "self-correct" in accordance to scientific advancement and healthcare demand. These peripheral, non-scientific concerns are not addressed at length in this manuscript; however they do exist, and their impact to the paradigm shifting healthcare transformation towards individualized medicine will be critical for its success. Copyright 2010 Elsevier Ltd. All rights

  1. Enabling individualized therapy through nanotechnology

    Science.gov (United States)

    Sakamoto, Jason H.; van de Ven, Anne L.; Godin, Biana; Blanco, Elvin; Serda, Rita E.; Grattoni, Alessandro; Ziemys, Arturas; Bouamrani, Ali; Hu, Tony; Ranganathan, Shivakumar I.; De Rosa, Enrica; Martinez, Jonathan O.; Smid, Christine A.; Buchanan, Rachel M.; Lee, Sei-Young; Srinivasan, Srimeenakshi; Landry, Matthew; Meyn, Anne; Tasciotti, Ennio; Liu, Xuewu; Decuzzi, Paolo; Ferrari, Mauro

    2010-01-01

    Individualized medicine is the healthcare strategy that rebukes the idiomatic dogma of ‘losing sight of the forest for the trees’. We are entering a new era of healthcare where it is no longer acceptable to develop and market a drug that is effective for only 80% of the patient population. The emergence of “-omic” technologies (e.g. genomics, transcriptomics, proteomics, metabolomics) and advances in systems biology are magnifying the deficiencies of standardized therapy, which often provide little treatment latitude for accommodating patient physiologic idiosyncrasies. A personalized approach to medicine is not a novel concept. Ever since the scientific community began unraveling the mysteries of the genome, the promise of discarding generic treatment regimens in favor of patient-specific therapies became more feasible and realistic. One of the major scientific impediments of this movement towards personalized medicine has been the need for technological enablement. Nanotechnology is projected to play a critical role in patient-specific therapy; however, this transition will depend heavily upon the evolutionary development of a systems biology approach to clinical medicine based upon “-omic” technology analysis and integration. This manuscript provides a forward looking assessment of the promise of nanomedicine as it pertains to individualized medicine and establishes a technology “snapshot” of the current state of nano-based products over a vast array of clinical indications and range of patient specificity. Other issues such as market driven hurdles and regulatory compliance reform are anticipated to “self-correct” in accordance to scientific advancement and healthcare demand. These peripheral, non-scientific concerns are not addressed at length in this manuscript; however they do exist, and their impact to the paradigm shifting healthcare transformation towards individualized medicine will be critical for its success. PMID:20045055

  2. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  3. Towards an "All Speed" Unstructured Upwind Scheme

    Science.gov (United States)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  4. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  5. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  6. Deitmar schemes, graphs and zeta functions

    Science.gov (United States)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called ;loose graph; (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are ;defined over F1; in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called ;surgery,; we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  7. Classification scheme for acid rock drainage detection - the Hamersley Basin, Western Australia

    Science.gov (United States)

    Skrzypek, Grzegorz; Dogramaci, Shawan; McLean, Laura

    2017-04-01

    In arid environment where precipitation and surface water are very limited, groundwater is the most important freshwater resource. For this reasons it is intensively exploited and needs to be managed wisely and protected from pollutants. Acid rock drainage often constitutes a serious risk to groundwater quality, particularly in catchments that are subject to mining, large scale groundwater injection or abstraction. However, assessment of the potential acid rock drainage risk can be challenging, especially in carbonate rich environment, where the decreasing pH that usually accompanies pyrite oxidation, can be masked by the high pH-neutralisation capacity of carbonate minerals. In this study, we analysed 73 surface and groundwater samples from different water bodies and aquifers located in the Hamersley Basin, Western Australia. Although the majority of samples had a neutral pH, there was a large spatial variability in the dissolved sulphate concentrations that ranged from 1 mg/L to 15,000 mg/L. Waters with high dissolved sulphate concentration were found in areas with a high percentage of sulphide minerals (e.g. pyrite) located within the aquifer matrix and were characterised by low δ34SSO4 values (+1.2‰ to +4.6) consistent with signatures of aquifer matrix pyritic rock samples (+1.9‰ to +4.4). It was also found that the SO4 concentrations and acidity levels were not only dependent on δ34SSO4 values and existence of pyrite but also on the presence of carbonate minerals in the aquifer matrix. Based on the results from this study, a classification scheme has been developed for identification of waters impacted by acid rock drainage that also encompasses numerous concomitant geochemical processes that often occur in aqueous systems. The classification uses five proxies: SO4, SO4/Cl, SI of calcite, δ34SSO4 and δ18OSO4 to improve assessment of the contribution that oxidation of sulphide minerals has to overall sulphate ion concentrations, regardless of acidity

  8. An Extended Multilocus Sequence Typing (MLST Scheme for Rapid Direct Typing of Leptospira from Clinical Samples.

    Directory of Open Access Journals (Sweden)

    Sabrina Weiss

    2016-09-01

    Full Text Available Rapid typing of Leptospira is currently impaired by requiring time consuming culture of leptospires. The objective of this study was to develop an assay that provides multilocus sequence typing (MLST data direct from patient specimens while minimising costs for subsequent sequencing.An existing PCR based MLST scheme was modified by designing nested primers including anchors for facilitated subsequent sequencing. The assay was applied to various specimen types from patients diagnosed with leptospirosis between 2014 and 2015 in the United Kingdom (UK and the Lao Peoples Democratic Republic (Lao PDR. Of 44 clinical samples (23 serum, 6 whole blood, 3 buffy coat, 12 urine PCR positive for pathogenic Leptospira spp. at least one allele was amplified in 22 samples (50% and used for phylogenetic inference. Full allelic profiles were obtained from ten specimens, representing all sample types (23%. No nonspecific amplicons were observed in any of the samples. Of twelve PCR positive urine specimens three gave full allelic profiles (25% and two a partial profile. Phylogenetic analysis allowed for species assignment. The predominant species detected was L. interrogans (10/14 and 7/8 from UK and Lao PDR, respectively. All other species were detected in samples from only one country (Lao PDR: L. borgpetersenii [1/8]; UK: L. kirschneri [1/14], L. santarosai [1/14], L. weilii [2/14].Typing information of pathogenic Leptospira spp. was obtained directly from a variety of clinical samples using a modified MLST assay. This assay negates the need for time-consuming culture of Leptospira prior to typing and will be of use both in surveillance, as single alleles enable species determination, and outbreaks for the rapid identification of clusters.

  9. Room-temperature in situ fabrication of Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced photocatalytic activity

    Science.gov (United States)

    He, Rongan; Zhou, Jiaqian; Fu, Huiqing; Zhang, Shiying; Jiang, Chuanjia

    2018-02-01

    Constructing direct Z-scheme heterojunction is an effective approach to separating photogenerated charge carriers and improving the activity of semiconductor photocatalysts. Herein, a composite of bismuth(III) oxide (Bi2O3) and graphitic carbon nitride (g-C3N4) was in situ fabricated at room temperature by photoreductive deposition of Bi3+ and subsequent air-oxidation of the resultant metallic Bi. Quantum-sized ω-Bi2O3 nanoparticles approximately 6 nm in diameter were uniformly distributed on the surface of mesoporous g-C3N4. The as-prepared Bi2O3/g-C3N4 composite exhibited higher photocatalytic activity than pure Bi2O3 and g-C3N4 for photocatalytic degradation of phenol under visible light. Reactive species trapping experiments revealed that superoxide radicals and photogenerated holes played important roles in the photocatalytic degradation of phenol. The enhanced photocatalytic activity, identification of reactive species and higher rate of charge carrier recombination (as indicated by stronger photoluminescence intensity) collectively suggest that the charge migration within the Bi2O3/g-C3N4 composite followed a Z-scheme mechanism. Photogenerated electrons on the conduction band of Bi2O3 migrate to the valence band of g-C3N4 and combine with photogenerated holes therein. At the cost of these less reactive charge carriers, the Z-scheme heterojunction enables efficient charge separation, while preserving the photogenerated electrons and holes with stronger redox abilities, which is beneficial for enhanced photocatalytic activity.

  10. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  11. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  12. Galilean invariant resummation schemes of cosmological perturbations

    Science.gov (United States)

    Peloso, Marco; Pietroni, Massimo

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them in the so called Time-Flow, or TRG, equations.

  13. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  14. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  15. Graph state-based quantum authentication scheme

    Science.gov (United States)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-04-01

    Inspired by the special properties of the graph state, a quantum authentication scheme is proposed in this paper, which is implemented with the utilization of the graph state. Two entities, a reliable party, Trent, as a verifier and Alice as prover are included. Trent is responsible for registering Alice in the beginning and confirming Alice in the end. The proposed scheme is simple in structure and convenient to realize in the realistic physical system due to the use of the graph state in a one-way quantum channel. In addition, the security of the scheme is extensively analyzed and accordingly can resist the general individual attack strategies.

  16. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    . This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC......) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more...

  17. SRFID: A hash-based security scheme for low cost RFID systems

    Directory of Open Access Journals (Sweden)

    Walid I. Khedr

    2013-03-01

    Full Text Available Radio Frequency Identification (RFID technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance.

  18. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    Science.gov (United States)

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  19. Password authentication scheme based on the quadratic residue problem

    Science.gov (United States)

    Ali, Muhammad Helmi; Ismail, Eddie Shahril

    2017-04-01

    In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a verification file, and the scheme can withstand replay attacks and resist from the guessing and impersonation attacks. We next discuss the advantages of our designated scheme over other schemes in terms of security and efficiency.

  20. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  1. Missing persons genetic identification

    Directory of Open Access Journals (Sweden)

    Matija Bajželj

    2017-09-01

    Full Text Available This article presents identification of missing persons from badly preserved post-mortem remains using molecular genetics methods. Extremely polymorphic and individually specific genetic markers that enable the identification of missing persons are microsatellites on autosomal chromosomes, microsatellites on Y chromosome and control region of mitochondrial DNA. For genetic profile comparison, biological material from post-mortem remains and reference samples have to be collected. If post-mortem remains are found shortly after the presumed death of the missing person, their personal items are used for comparison. If these are not available, (the missing person‘s relatives could be used as reference samples or achieved tissues stored in medical institutions if biopsy for the needs of medical diagnostics was performed earlier during their life. When reference samples are not available, genetic identification is not possible. The type of biological material sampled from the deceased depends on the condition of human remains. Blood, soft tissues, nails, teeth or bones are most commonly used for genetic identification, and the time required for DNA extraction depends on the type of biological material. The most demanding and time consuming is extraction of DNA from teeth and bones, therefore we use it in cases when only skeleton is available or we cannot get a sufficient amount of DNA for genetic identification from other tissues. If the genetic profile of post-mortem reamains and a reference sample of the missing person match, the strength of genetic evidence has to be statistically evaluated and the probability of identification reported.

  2. Key enablers to facilitate healthy behavior change: workshop summary.

    Science.gov (United States)

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  3. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  4. A Climate Classification Scheme for Habitable Worlds

    Science.gov (United States)

    Byrne, J. F.

    2017-11-01

    This presentation will include an exploration of the internal/external forcings and variability associated with climate using Earth as a reference model in addition to a classification scheme consisting of five categories.

  5. Secure Wake-Up Scheme for WBANs

    Science.gov (United States)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  6. Renormalization scheme dependence with renormalization group summation

    Science.gov (United States)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  7. Asynchronous Communication Scheme For Hypercube Computer

    Science.gov (United States)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  8. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  9. Readout scheme of the upgraded ALICE TPC

    CERN Document Server

    Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens

    2016-01-01

    In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.

  10. Dynamic Restarting Schemes for Eigenvalue Problems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  11. Performance Analysis Of Active Queue Management AQM In VOIP Using Different Voice Encoder Scheme

    OpenAIRE

    Samir Eid Mohammed; Mohamed H. M. Nerma

    2015-01-01

    Abstract Voice over Internet Protocol VoIP is a rapidly growing technology that enables transport of voice over data networks such as Ethernet Wide area networks WANs due to this important different codec scheme is developed to meet the QoS requirements. This thesis presents a comprehensive study about the impact of active queue management AQM on Voice over Internet Protocol VoIP quality of service using different codec scheme such as G711 G723 G729 and GSM using simulations tools. The evalua...

  12. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  13. IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

    Science.gov (United States)

    Du, Ping; Abe, Shunji

    Denial of service (DoS) attacks have become one of the most serious threats to the Internet. Enabling detection of attacks in network traffic is an important and challenging task. However, most existing volume-based schemes can not detect short-term attacks that have a minor effect on traffic volume. On the other hand, feature-based schemes are not suitable for real-time detection because of their complicated calculations. In this paper, we develop an IP packet size entropy (IPSE)-based DoS/DDoS detection scheme in which the entropy is markedly changed when traffic is affected by an attack. Through our analysis, we find that the IPSE-based scheme is capable of detecting not only long-term attacks but also short-term attacks that are beyond the volume-based schemes' ability to detect. Moreover, we test our proposal using two typical Internet traffic data sets from DARPA and SINET, and the test results show that the IPSE-based detection scheme can provide detection of DoS/DDoS attacks not only in a local area network (DARPA) and but also in academic backbone network (SINET).

  14. A suggested color scheme for reducing perception-related accidents on construction work sites.

    Science.gov (United States)

    Yi, June-seong; Kim, Yong-woo; Kim, Ki-aeng; Koo, Bonsang

    2012-09-01

    Changes in workforce demographics have led to the need for more sophisticated approaches to addressing the safety requirements of the construction industry. Despite extensive research in other industry domains, the construction industry has been passive in exploring the impact of a color scheme; perception-related accidents have been effectively diminished by its implementation. The research demonstrated that the use of appropriate color schemes could improve the actions and psychology of workers on site, thereby increasing their perceptions of potentially dangerous situations. As a preliminary study, the objects selected by rigorous analysis on accident reports were workwear, safety net, gondola, scaffolding, and safety passage. The colors modified on site for temporary facilities were adopted from existing theoretical and empirical research that suggests the use of certain colors and their combinations to improve visibility and conspicuity while minimizing work fatigue. The color schemes were also tested and confirmed through two workshops with workers and managers currently involved in actual projects. The impacts of color schemes suggested in this paper are summarized as follows. First, the color schemes improve the conspicuity of facilities with other on site components, enabling workers to quickly discern and orient themselves in their work environment. Secondly, the color schemes have been selected to minimize the visual work fatigue and monotony that can potentially increase accidents. Copyright © 2011 Elsevier Ltd. All rights reserved.

  15. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  16. XOA: Web-Enabled Cross-Ontological Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Riensche, Roderick M.; Baddeley, Bob; Sanfilippo, Antonio P.; Posse, Christian; Gopalan, Banu

    2007-07-09

    The paper being submitted (as an "extended abstract" prior to conference acceptance) provides a technical description of our proof-of-concept prototype for the XOA method. Abstract: To address meaningful questions, scientists need to relate information across diverse classification schemes such as ontologies, terminologies and thesauri. These resources typically address a single knowledge domain at a time and are not cross-indexed. Information that is germane to the same object may therefore remain unlinked with consequent loss of knowledge discovery across disciplines and even sub-domains of the same discipline. We propose to address these problems by fostering semantic interoperability through the development of ontology alignment web services capable of enabling cross-scale knowledge discovery, and demonstrate a specific application of such an approach to the biomedical domain.

  17. A cross-validation scheme for machine learning algorithms in shotgun proteomics.

    Science.gov (United States)

    Granholm, Viktor; Noble, William Stafford; Käll, Lukas

    2012-01-01

    Peptides are routinely identified from mass spectrometry-based proteomics experiments by matching observed spectra to peptides derived from protein databases. The error rates of these identifications can be estimated by target-decoy analysis, which involves matching spectra to shuffled or reversed peptides. Besides estimating error rates, decoy searches can be used by semi-supervised machine learning algorithms to increase the number of confidently identified peptides. As for all machine learning algorithms, however, the results must be validated to avoid issues such as overfitting or biased learning, which would produce unreliable peptide identifications. Here, we discuss how the target-decoy method is employed in machine learning for shotgun proteomics, focusing on how the results can be validated by cross-validation, a frequently used validation scheme in machine learning. We also use simulated data to demonstrate the proposed cross-validation scheme's ability to detect overfitting.

  18. A cross-validation scheme for machine learning algorithms in shotgun proteomics

    Directory of Open Access Journals (Sweden)

    Granholm Viktor

    2012-11-01

    Full Text Available Abstract Peptides are routinely identified from mass spectrometry-based proteomics experiments by matching observed spectra to peptides derived from protein databases. The error rates of these identifications can be estimated by target-decoy analysis, which involves matching spectra to shuffled or reversed peptides. Besides estimating error rates, decoy searches can be used by semi-supervised machine learning algorithms to increase the number of confidently identified peptides. As for all machine learning algorithms, however, the results must be validated to avoid issues such as overfitting or biased learning, which would produce unreliable peptide identifications. Here, we discuss how the target-decoy method is employed in machine learning for shotgun proteomics, focusing on how the results can be validated by cross-validation, a frequently used validation scheme in machine learning. We also use simulated data to demonstrate the proposed cross-validation scheme's ability to detect overfitting.

  19. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  20. An Integrated Conceptual Framework for RFID Enabled Healthcare

    Directory of Open Access Journals (Sweden)

    Gaurav Gupta

    2015-12-01

    Full Text Available Radio frequency identification (RFID technology is a wireless communication technology that facilitates automatic identification and data capture without human intervention. Since 2000s, RFID applications in the health care industry are increasing.  RFID has brought many improvements in areas like patient care, patient safety, equipment tracking, resource utilization, processing time reduction and so on. On the other hand, often deployment of RFID is questioned on the issues like high capital investment, technological complexity, and privacy concerns. Exploration of existing literature indicates the presence of works on the topics like asset management, patient management, staff management, institutional advantages, and organizational issues. However, most of the works are focused on a particular issue. Still now, scholarly attempts to integrate all the facades of RFID-enabled healthcare are limited. In this paper, we propose a conceptual framework that represents the scope for implementation of this technology and the various dimensions of RFID-enabled healthcare and demonstrate them in detail. Also, we have discussed the critical issues that can prove to be potential barriers to its successful implementation and current approaches to resolving these. We also discuss some of the regulatory initiatives encouraging its adoption in the healthcare industry. Also, we have highlighted the future research opportunities in this domain.

  1. Isotope Identification

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this training modules is to examine the process of using gamma spectroscopy for radionuclide identification; apply pattern recognition to gamma spectra; identify methods of verifying energy calibration; and discuss potential causes of isotope misidentification.

  2. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  3. Notes on a Continuous-Variable Quantum Key Distribution Scheme

    Science.gov (United States)

    Ichikawa, Tsubasa; Hirano, Takuya; Matsubara, Takuto; Ono, Motoharu; Namiki, Ryo

    2017-09-01

    We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.

  4. Combining image-processing and image compression schemes

    Science.gov (United States)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  5. A Semiautomated Framework for Integrating Expert Knowledge into Disease Marker Identification

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Jing; Webb-Robertson, Bobbie-Jo M.; Matzke, Melissa M.; Varnum, Susan M.; Brown, Joseph N.; Riensche, Roderick M.; Adkins, Joshua N.; Jacobs, Jon M.; Hoidal, John R.; Scholand, Mary Beth; Pounds, Joel G.; Blackburn, Michael R.; Rodland, Karin D.; McDermott, Jason E.

    2013-10-01

    Background. The availability of large complex data sets generated by high throughput technologies has enabled the recent proliferation of disease biomarker studies. However, a recurring problem in deriving biological information from large data sets is how to best incorporate expert knowledge into the biomarker selection process. Objective. To develop a generalizable framework that can incorporate expert knowledge into data-driven processes in a semiautomated way while providing a metric for optimization in a biomarker selection scheme. Methods. The framework was implemented as a pipeline consisting of five components for the identification of signatures from integrated clustering (ISIC). Expert knowledge was integrated into the biomarker identification process using the combination of two distinct approaches; a distance-based clustering approach and an expert knowledge-driven functional selection. Results. The utility of the developed framework ISIC was demonstrated on proteomics data from a study of chronic obstructive pulmonary disease (COPD). Biomarker candidates were identified in a mouse model using ISIC and validated in a study of a human cohort. Conclusions. Expert knowledge can be introduced into a biomarker discovery process in different ways to enhance the robustness of selected marker candidates. Developing strategies for extracting orthogonal and robust features from large data sets increases the chances of success in biomarker identification.

  6. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  7. Empirical Bayes for DCM: A Group Inversion Scheme.

    Science.gov (United States)

    Friston, Karl; Zeidman, Peter; Litvak, Vladimir

    2015-01-01

    This technical note considers a simple but important methodological issue in estimating effective connectivity; namely, how do we integrate measurements from multiple subjects to infer functional brain architectures that are conserved over subjects. We offer a solution to this problem that rests on a generalization of random effects analyses to Bayesian inference about nonlinear models of electrophysiological time-series data. Specifically, we present an empirical Bayesian scheme for group or hierarchical models, in the setting of dynamic causal modeling (DCM). Recent developments in approximate Bayesian inference for hierarchical models enable the efficient estimation of group effects in DCM studies of multiple trials, sessions, or subjects. This approach estimates second (e.g., between-subject) level parameters based on posterior estimates from the first (e.g., within-subject) level. Here, we use empirical priors from the second level to iteratively optimize posterior densities over parameters at the first level. The motivation for this iterative application is to finesse the local minima problem inherent in the (first level) inversion of nonlinear and ill-posed models. Effectively, the empirical priors shrink the first level parameter estimates toward the global maximum, to provide more robust and efficient estimates of within (and between-subject) effects. This paper describes the inversion scheme using a worked example based upon simulated electrophysiological responses. In a subsequent paper, we will assess its robustness and reproducibility using an empirical example.

  8. The Digital Thread as the Key Enabler

    Science.gov (United States)

    2016-11-01

    life cycle by providing the capability to access, integrate and transform disparate data into actionable information. The digital thread is the...17 Defense AT&L: November-December 2016 The Digital Thread as the Key Enabler Col. Keith Bearden, USAF Bearden is the deputy director of...enabling you to do your job better, faster and cheaper. There is one initiative, the key enabler, to accomplish this goal—the digital thread. But let’s

  9. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  10. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  11. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  12. Semantic Sensor Web Enablement for COAST Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Sensor Web Enablement (SWE) is an Open Geospatial Consortium (OGC) standard Service Oriented Architecture (SOA) that facilitates discovery and integration of...

  13. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks.

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-04-18

    Using mobile vehicles as "data mules" to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.

  14. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    Full Text Available In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  15. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  16. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  17. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-Hoc Networks

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-01-01

    Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%. PMID:28420218

  18. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  19. Single-cone finite difference scheme for the (2+1)D Dirac von Neumann equation

    Science.gov (United States)

    Pötz, Walter; Schreilechner, Magdalena

    2017-11-01

    An explicit finite difference scheme is presented for the von Neumann equation for (2+1)D Dirac fermions. It is founded upon a staggered space-time grid which ensures a single-cone energy dispersion and performs the time-derivative in one sweep using a three-step leap-frog procedure. It enables a space-time-resolved numerical treatment of the mixed-state dynamics of Dirac fermions within the effective single-particle density matrix formalism. Energy-momentum dispersion, stability and convergence properties are derived. Elementary numerical tests to demonstrate stability properties use parameters which pertain to topological insulator surface states. A method for the simulation of charge injection from an electric contact is presented and tested numerically. Potential extensions of the scheme to a Dirac-Lindblad equation, real-space-time Green's function formulations, and higher-order finite-difference schemes are discussed.

  20. Reducing patient re-identification risk for laboratory results within research datasets.

    Science.gov (United States)

    Atreya, Ravi V; Smith, Joshua C; McCoy, Allison B; Malin, Bradley; Miller, Randolph A

    2013-01-01

    To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. In our threat model, an attacker obtains 5-7 laboratory results from one patient and uses them as a search key to discover the corresponding record in a de-identified biomedical research database. To test our models, the existing Vanderbilt TIME database of 8.5 million Safe Harbor de-identified laboratory results from 61 280 patients was used. The uniqueness of unaltered laboratory results in the dataset was examined, and then two data perturbation models were applied-simple random offsets and an expert-derived clinical meaning-preserving model. A rank-based re-identification algorithm to mimic an attack was used. The re-identification risk and the retention of clinical meaning for each model's perturbed laboratory results were assessed. Differences in re-identification rates between the algorithms were small despite substantial divergence in altered clinical meaning. The expert algorithm maintained the clinical meaning of laboratory results better (affecting up to 4% of test results) than simple perturbation (affecting up to 26%). With growing impetus for sharing clinical data for research, and in view of healthcare-related federal privacy regulation, methods to mitigate risks of re-identification are important. A practical, expert-derived perturbation algorithm that demonstrated potential utility was developed. Similar approaches might enable administrators to select data protection scheme parameters that meet their preferences in the trade-off between the protection of privacy and the retention of clinical meaning of shared data.

  1. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Pankratova, S.A.

    2017-06-01

    Full Text Available Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative parameters of heuristic potential which opens the possibility of modeling the mechanisms of metaphoric meaning development. In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  2. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  3. Tradable white certificate schemes : what can we learn from tradable green certificate schemes?

    NARCIS (Netherlands)

    Oikonomou, Vlasis; Mundaca, Luis

    In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green

  4. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  5. Mapping service activity: the example of childhood obesity schemes in England

    Directory of Open Access Journals (Sweden)

    Roberts Helen

    2010-06-01

    Full Text Available Abstract Background Childhood obesity is high on the policy agenda of wealthier nations, and many interventions have been developed to address it. This work describes an overview of schemes for obese and overweight children and young people in England, and the 'mapping' approach we used. Methods Our search strategy, inclusion criteria and coding frame had to be suitable for describing a potentially large number of schemes within a short timeframe. Data were collected from key informants, scheme publicity and reports, and via a web-survey. To be included, schemes had to be based in England, follow a structured programme lasting at least two weeks, promote healthy weight, and be delivered exclusively to overweight and/or obese children and young people (age range 4-18. Data were entered into a coding frame recording similar information for each scheme, including any underpinning research evidence, evaluation or monitoring reports. Priority questions were identified in consultation with colleagues from the Department of Health and the Cross Government Obesity Unit. Results Fifty-one schemes were identified. Some operated in multiple areas, and by using estimates of the number of schemes provided by multi-site scheme leads, we found that between 314 and 375 local programmes were running at any time. Uncertainty is largely due to the largest scheme provider undergoing rapid expansion at the time of the mapping exercise and therefore able to provide only an estimate of the number of programmes running. Many schemes were similar in their approach, had been recently established and were following NICE guidelines on interventions to promote healthy weight. Rigorous evaluation was rare. Conclusions Our methods enabled us to produce a rapid overview of service activity across a wide geographic area and a range of organisations and sectors. In order to develop the evidence base for childhood obesity interventions, rigorous evaluation of these schemes is

  6. A fuzzy robust control scheme for vibration suppression of a nonlinear electromagnetic-actuated flexible system

    Science.gov (United States)

    Tavakolpour-Saleh, A. R.; Haddad, M. A.

    2017-03-01

    In this paper, a novel robust vibration control scheme, namely, one degree-of-freedom fuzzy active force control (1DOF-FAFC) is applied to a nonlinear electromagnetic-actuated flexible plate system. First, the flexible plate with clamped-free-clamped-free (CFCF) boundary conditions is modeled and simulated. Then, the validity of the simulation platform is evaluated through experiment. A nonlinear electromagnetic actuator is developed and experimentally modeled through a parametric system identification scheme. Next, the obtained nonlinear model of the actuator is applied to the simulation platform and performance of the proposed control technique in suppressing unwanted vibrations is investigated via simulation. A fuzzy controller is applied to the robust 1DOF control scheme to tune the controller gain using acceleration feedback. Consequently, an intelligent self-tuning vibration control strategy based on an inexpensive acceleration sensor is proposed in the paper. Furthermore, it is demonstrated that the proposed acceleration-based control technique owns the benefits of the conventional velocity feedback controllers. Finally, an experimental rig is developed to investigate the effectiveness of the 1DOF-FAFC scheme. It is found that the first, second, and third resonant modes of the flexible system are attenuated up to 74%, 81%, and 90% respectively through which the effectiveness of the proposed control scheme is affirmed.

  7. Carbon trading: Current schemes and future developments

    Energy Technology Data Exchange (ETDEWEB)

    Perdan, Slobodan, E-mail: slobodan.perdan@manchester.ac.uk [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom); Azapagic, Adisa [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom)

    2011-10-15

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: > The paper provides an extensive overview of mandatory emissions trading schemes around the world. > Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. > The expansion requires considerable technical fixes and harmonisation of different trading systems. > Clear policy signals, political support and a stable economic environment are needed for the expansion. > A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  8. Wavelet-enabled progressive data Access and Storage Protocol (WASP)

    Science.gov (United States)

    Clyne, J.; Frank, L.; Lesperance, T.; Norton, A.

    2015-12-01

    Current practices for storing numerical simulation outputs hail from an era when the disparity between compute and I/O performance was not as great as it is today. The memory contents for every sample, computed at every grid point location, are simply saved at some prescribed temporal frequency. Though straightforward, this approach fails to take advantage of the coherency in neighboring grid points that invariably exists in numerical solutions to mathematical models. Exploiting such coherence is essential to digital multimedia; DVD-Video, digital cameras, streaming movies and audio are all possible today because of transform-based compression schemes that make substantial reductions in data possible by taking advantage of the strong correlation between adjacent samples in both space and time. Such methods can also be exploited to enable progressive data refinement in a manner akin to that used in ubiquitous digital mapping applications: views from far away are shown in coarsened detail to provide context, and can be progressively refined as the user zooms in on a localized region of interest. The NSF funded WASP project aims to provide a common, NetCDF-compatible software framework for supporting wavelet-based, multi-scale, progressive data, enabling interactive exploration of large data sets for the geoscience communities. This presentation will provide an overview of this work in progress to develop community cyber-infrastructure for the efficient analysis of very large data sets.

  9. Mesh Network Architecture for Enabling Inter-Spacecraft Communication

    Science.gov (United States)

    Becker, Christopher; Merrill, Garrick

    2017-01-01

    To enable communication between spacecraft operating in a formation or small constellation, a mesh network architecture was developed and tested using a time division multiple access (TDMA) communication scheme. The network is designed to allow for the exchange of telemetry and other data between spacecraft to enable collaboration between small spacecraft. The system uses a peer-to-peer topology with no central router, so that it does not have a single point of failure. The mesh network is dynamically configurable to allow for addition and subtraction of new spacecraft into the communication network. Flight testing was performed using an unmanned aerial system (UAS) formation acting as a spacecraft analogue and providing a stressing environment to prove mesh network performance. The mesh network was primarily devised to provide low latency, high frequency communication but is flexible and can also be configured to provide higher bandwidth for applications desiring high data throughput. The network includes a relay functionality that extends the maximum range between spacecraft in the network by relaying data from node to node. The mesh network control is implemented completely in software making it hardware agnostic, thereby allowing it to function with a wide variety of existing radios and computing platforms..

  10. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  11. An Elaborate Secure Quantum Voting Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-10-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  12. A COMPLETE SCHEME FOR A MUON COLLIDER.

    Energy Technology Data Exchange (ETDEWEB)

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  13. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...

  14. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  15. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady......Although many droop schemes have been proposed for distributed generator (DG) control in a microgrid, they mainly focus on achieving proportional power sharing based on the DG kVA ratings. Other factors like generation costs, efficiencies, and emission penalties at different loads have not been...

  16. Enabling Routes as Context in Mobile Services

    DEFF Research Database (Denmark)

    Brilingaite, Agne; Jensen, Christian Søndergaard; Zokaite, Nora

    2004-01-01

    With the continuing advances in wireless communications, geo-positioning, and portable electronics, an infrastructure is emerging that enables the delivery of on-line, location-enabled services to very large numbers of mobile users. A typical usage situation for mobile services is one characterized...

  17. Enabling Routes as Context in Mobile Services

    DEFF Research Database (Denmark)

    Brilingaite, Agne; Jensen, Christian Søndergaard; Zokaite, Nora

    With the continuing advances in wireless communications, geo-positioning, and portable electronics, an infrastructure is emerging that enables the delivery of on-line, location-enabled services to very large numbers of mobile users. A typical usage situation for mobile services is one characterized...

  18. Patient centric identification and association.

    Science.gov (United States)

    Frisch, P; Miodownik, S; Booth, P; Carragee, P; Dowling, M

    2009-01-01

    Increased technological complexity of medical devices and systems coupled with increased workloads and reduced staffing, have created difficulties and discontinuities in the management of patient information. These issues have directly impacted and contributed to a rise in equipment-related errors, patient dissatisfaction, a potential for patient injury and resulting overall increased concern for patient safety. In response these concerns a variety of new devices, systems and applications have been developed to share information, provide cross checks along with verified delivery of critical information to the point of care. These applications include biomedical information systems, medication administration, sample collection, and electronic medical records. The deployment of these new integrated and networked devices, systems and applications are dependent on an accurate and consistent patient identification and association methodology which dynamically manages the relationship between patients, staff and equipment. Since the association information is common to many applications and utilizes a variety of technologies, (i.e. active and passive radio frequency identification (RFID), barcodes, etc.) an institutional approach is necessary to mange these processes in a consistent manor utilizing a common set of identification hardware. Implementation of a "Patient Centric Identification and Association Platform" represents a significant advance in the management of clinical patient information. The implementation of a Biomedical Device Information Network at Memorial Sloan-Kettering Cancer Center (MSKCC) integrates the identification and association of patients with devices and care providers and provides the methodologies to manage alarms, providing the ability to filter low priority or nuisance alarms. This implementation enables critical information to be distributed directly to care providers utilizing dedicated communications devices. Patient Centric

  19. Model-based fault diagnosis techniques design schemes, algorithms, and tools

    CERN Document Server

    Ding, Steven

    2008-01-01

    The objective of this book is to introduce basic model-based FDI schemes, advanced analysis and design algorithms, and the needed mathematical and control theory tools at a level for graduate students and researchers as well as for engineers. This is a textbook with extensive examples and references. Most methods are given in the form of an algorithm that enables a direct implementation in a programme. Comparisons among different methods are included when possible.

  20. Preface to the special issue on next-generation multiplexing schemes in fiber-based systems

    Science.gov (United States)

    Sillard, Pierre; Essiambre, René-Jean; Jung, Yongmin; Yamamoto, Takashi

    2017-02-01

    Since the beginning of optical communications in the late 70s, capacity has kept up with the exponential growth of traffic demand. This has been enabled by many technologies among which the most up-to-date wavelength multiplexing combined with coherent detection of polarized-multiplexed quadrature-amplitude-modulated signals. There is, however, a growing realization that this might no longer be sufficient and that next-generation multiplexing schemes are needed to avoid an imminent capacity crunch.

  1. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Abstract. We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit ...

  2. Identification device

    Science.gov (United States)

    Lin, Jian-Shian; Su, Chih-Chieh; Chou, Ta-Hsin; Wu, Mount-Learn; Lai, Chieh-Lung; Hsu, Che-Lung; Lan, Hsiao-Chin; Huang, Hung-I.; Liu, Yung-Chih; Tu, Zong-Ru; Lee, Chien-Chieh; Chang, Jenq-Yang

    2007-09-01

    In this Letter, the identification device disclosed in the present invention is comprised of: a carrier and a plurality of pseudo-pixels; wherein each of the plural pseudo-pixels is formed on the carrier and is further comprised of at least a light grating composed of a plurality of light grids. In a preferred aspect, each of the plural light grids is formed on the carrier while spacing from each other by an interval ranged between 50nm and 900nm. As the aforesaid identification device can present specific colors and patterns while it is being viewed by naked eye with respect to a specific viewing angle, the identification device is preferred for security and anti-counterfeit applications since the specific colors and patterns will become invisible when it is viewed while deviating from the specific viewing angle.

  3. Viden: Attacker Identification on In-Vehicle Networks

    OpenAIRE

    Cho, Kyong-Tak; Shin, Kang

    2017-01-01

    Various defense schemes --- which determine the presence of an attack on the in-vehicle network --- have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this need, we propose a novel scheme, called Viden (Voltage-based attacker identification), which can identify the attacker ECU by measuring and utilizi...

  4. A Hybrid Data Compression Scheme for Power Reduction in Wireless Sensors for IoT.

    Science.gov (United States)

    Deepu, Chacko John; Heng, Chun-Huat; Lian, Yong

    2017-04-01

    This paper presents a novel data compression and transmission scheme for power reduction in Internet-of-Things (IoT) enabled wireless sensors. In the proposed scheme, data is compressed with both lossy and lossless techniques, so as to enable hybrid transmission mode, support adaptive data rate selection and save power in wireless transmission. Applying the method to electrocardiogram (ECG), the data is first compressed using a lossy compression technique with a high compression ratio (CR). The residual error between the original data and the decompressed lossy data is preserved using entropy coding, enabling a lossless restoration of the original data when required. Average CR of 2.1 × and 7.8 × were achieved for lossless and lossy compression respectively with MIT/BIH database. The power reduction is demonstrated using a Bluetooth transceiver and is found to be reduced to 18% for lossy and 53% for lossless transmission respectively. Options for hybrid transmission mode, adaptive rate selection and system level power reduction make the proposed scheme attractive for IoT wireless sensors in healthcare applications.

  5. Creating Culturally Sustainable Agri-Environmental Schemes

    Science.gov (United States)

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  6. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...

  7. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    Enhancing Cooperative Loan Scheme Through Automated Loan Management System. ... Financial transactions through manual system of operation are prone to errors and unimagined complexities, making it so difficult a task maintaining all entries of users account, search records of activities, handle loan deduction errors ...

  8. Geometrical and frequential watermarking scheme using similarities

    Science.gov (United States)

    Bas, Patrick; Chassery, Jean-Marc; Davoine, Franck

    1999-04-01

    Watermarking schemes are more and more robust to classical degradations. The NEC system developed by Cox, using both original and marked images, can detect the mark with a JPEG compression ratio of 30. Nevertheless a very simple geometric attack done by the program Stirmark can remove the watermark. Most of the present watermarking schemes only map a mark on the image without geometric reference and therefore are not robust to geometric transformation. We present a scheme based on the modification of a collage map (issued from a fractal code used in fractal compression). We add a mark introducing similarities in the image. The embedding of the mark is done by selection of points of interest supporting blocks on which similarities are hided. This selection is done by the Stephens-Harris detector. The similarity is embedded locally to be robust to cropping. Contrary to many schemes, the reference mark used for the detection comes from the marked image and thus undergoes geometrical distortions. The detection of the mark is done by searching interest blocks and their similarities. It does not use the original image and the robustness is guaranteed by a key. Our first results show that the similarities-based watermarking is quite robust to geometric transformation such as translations, rotations and cropping.

  9. The Partners in Flight species prioritization scheme

    Science.gov (United States)

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  10. Shanghai : Developing a Green Electricity Scheme

    OpenAIRE

    Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.

    2006-01-01

    This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...

  11. EXPERIMENTAL EVALUATION OF LIDAR DATA VISUALIZATION SCHEMES

    Directory of Open Access Journals (Sweden)

    S. Ghosh

    2012-07-01

    Full Text Available LiDAR (Light Detection and Ranging has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011 performs the best in terms of feature and depth perception.

  12. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  13. Value constraints in the CLP scheme

    NARCIS (Netherlands)

    M.H. van Emden

    1996-01-01

    textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines

  14. Benefit Reentitlement Conditions in Unemployment Insurance Schemes

    DEFF Research Database (Denmark)

    Andersen, Torben M.; Christoffersen, Mark Strøm; Svarer, Michael

    Unemployment insurance schemes include conditions on past employment history as part of the eligibility conditions. This aspect is often neglected in the literature which primarily focuses on benefit levels and benefit duration. In a search-matching framework we show that benefit duration and emp...

  15. External quality assessment schemes for toxicology.

    Science.gov (United States)

    Wilson, John

    2002-08-14

    A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).

  16. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  17. Voluntary Certification Schemes and Legal Minimum Standards

    NARCIS (Netherlands)

    Herzfeld, T.; Jongeneel, R.A.

    2012-01-01

    EU farmers face increasing requests to comply with legal as well as private agribusiness and retail standards. Both requests potentially raise farmer’s administrative burden. This paper discusses the potential synergies between cross-compliance and third-party certification schemes. In selected

  18. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  19. A Presuppositional Approach to Conceptual Schemes | Wang ...

    African Journals Online (AJOL)

    ; for they have been focused too much on the truth-conditional notions of meaning/concepts and translation/interpretation in Tarski's style. It is exactly due to such a Quinean interpretation of the notion of conceptual schemes that the very notion ...

  20. Observations and comments on the classification schemes ...

    African Journals Online (AJOL)

    Reviews of the classification schemes proposed by various geologists are basically similar. However, general discrepancies, inconsistencies and contradictions in the stratigraphic positions of some of the rock units have been observed, as well as terminologies to describe rock units which are inconsistent with stratigraphic ...

  1. Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles

    Directory of Open Access Journals (Sweden)

    Xingwen Zhao

    2017-01-01

    Full Text Available Recently, scientists in South Korea developed on-line electric vehicle (OLEV, which is a kind of electric vehicle that can be charged wirelessly while it is moving on the road. The battery in the vehicle can absorb electric energy from the power transmitters buried under the road without any contact with them. Several billing schemes have been presented to offer privacy-preserving billing for OLEV owners. However, they did not consider the existence of free-riders. When some vehicles are being charged after showing the tokens, vehicles that are running ahead or behind can switch on their systems and drive closely for a free charging. We describe a billing scheme against free-riders by using several cryptographic tools. Each vehicle should authenticate with a compensation-prepaid token before it can drive on the wireless-charging-enabled road. The service provider can obtain compensation if it can prove that certain vehicle is a free-rider. Our scheme is privacy-preserving so the charging will not disclose the locations and routine routes of each vehicle. In fact, our scheme is a fast authentication scheme that anonymously authenticates each user on accessing a sequence of services. Thus, it can be applied to sequential data delivering services in future 5G systems.

  2. Interference Cancellation Schemes for Single-Carrier Block Transmission with Insufficient Cyclic Prefix

    Directory of Open Access Journals (Sweden)

    Hayashi Kazunori

    2008-01-01

    Full Text Available Abstract This paper proposes intersymbol interference (ISI and interblock interference (IBI cancellation schemes at the transmitter and the receiver for the single-carrier block transmission with insufficient cyclic prefix (CP. The proposed scheme at the transmitter can exterminate the interferences by only setting some signals in the transmitted signal block to be the same as those of the previous transmitted signal block. On the other hand, the proposed schemes at the receiver can cancel the interferences without any change in the transmitted signals compared to the conventional method. The IBI components are reduced by using previously detected data signals, while for the ISI cancellation, we firstly change the defective channel matrix into a circulant matrix by using the tentative decisions, which are obtained by our newly derived frequency domain equalization (FDE, and then the conventional FDE is performed to compensate the ISI. Moreover, we propose a pilot signal configuration, which enables us to estimate a channel impulse response whose order is greater than the guard interval (GI. Computer simulations show that the proposed interference cancellation schemes can significantly improve bit error rate (BER performance, and the validity of the proposed channel estimation scheme is also demonstrated.

  3. Efficient multichannel acoustic echo cancellation using constrained tap selection schemes in the subband domain

    Science.gov (United States)

    Desiraju, Naveen Kumar; Doclo, Simon; Wolff, Tobias

    2017-12-01

    Acoustic echo cancellation (AEC) is a key speech enhancement technology in speech communication and voice-enabled devices. AEC systems employ adaptive filters to estimate the acoustic echo paths between the loudspeakers and the microphone(s). In applications involving surround sound, the computational complexity of an AEC system may become demanding due to the multiple loudspeaker channels and the necessity of using long filters in reverberant environments. In order to reduce the computational complexity, the approach of partially updating the AEC filters is considered in this paper. In particular, we investigate tap selection schemes which exploit the sparsity present in the loudspeaker channels for partially updating subband AEC filters. The potential for exploiting signal sparsity across three dimensions, namely time, frequency, and channels, is analyzed. A thorough analysis of different state-of-the-art tap selection schemes is performed and insights about their limitations are gained. A novel tap selection scheme is proposed which overcomes these limitations by exploiting signal sparsity while not ignoring any filters for update in the different subbands and channels. Extensive simulation results using both artificial as well as real-world multichannel signals show that the proposed tap selection scheme outperforms state-of-the-art tap selection schemes in terms of echo cancellation performance. In addition, it yields almost identical echo cancellation performance as compared to updating all filter taps at a significantly reduced computational cost.

  4. Codon sextets with leading role of serine create "ideal" symmetry classification scheme of the genetic code.

    Science.gov (United States)

    Rosandić, Marija; Paar, Vladimir

    2014-06-10

    The standard classification scheme of the genetic code is organized for alphabetic ordering of nucleotides. Here we introduce the new, "ideal" classification scheme in compact form, for the first time generated by codon sextets encoding Ser, Arg and Leu amino acids. The new scheme creates the known purine/pyrimidine, codon-anticodon, and amino/keto type symmetries and a novel A+U rich/C+G rich symmetry. This scheme is built from "leading" and "nonleading" groups of 32 codons each. In the ensuing 4 × 16 scheme, based on trinucleotide quadruplets, Ser has a central role as initial generator. Six codons encoding Ser and six encoding Arg extend continuously along a linear array in the "leading" group, and together with four of six Leu codons uniquely define construction of the "leading" group. The remaining two Leu codons enable construction of the "nonleading" group. The "ideal" genetic code suggests the evolution of genetic code with serine as an initiator. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Symmetry Scheme for Amino Acid Codons

    OpenAIRE

    Balakrishnan, J.

    2003-01-01

    Group theoretical concepts are invoked in a specific model to explain how only twenty amino acids occur in nature out of a possible sixty four. The methods we use enable us to justify the occurrence of the recently discovered twenty first amino acid selenocysteine, and also enables us to predict the possible existence of two more, as yet undiscovered amino acids.

  6. Energy decomposition scheme based on the generalized Kohn-Sham scheme.

    Science.gov (United States)

    Su, Peifeng; Jiang, Zhen; Chen, Zuochang; Wu, Wei

    2014-04-03

    In this paper, a new energy decomposition analysis scheme based on the generalized Kohn-Sham (GKS) and the localized molecular orbital energy decomposition analysis (LMO-EDA) scheme, named GKS-EDA, is proposed. The GKS-EDA scheme has a wide range of DFT functional adaptability compared to LMO-EDA. In the GKS-EDA scheme, the exchange, repulsion, and polarization terms are determined by DFT orbitals; the correlation term is defined as the difference of the GKS correlation energy from monomers to supermolecule. Using the new definition, the GKS-EDA scheme avoids the error of LMO-EDA which comes from the separated treatment of EX and EC functionals. The scheme can perform analysis both in the gas and in the condensed phases with most of the popular DFT functionals, including LDA, GGA, meta-GGA, hybrid GGA/meta-GGA, double hybrid, range-separated (long-range correction), and dispersion correction. By the GKS-EDA scheme, the DFT functionals assessment for hydrogen bonding, vdW interaction, symmetric radical cation, charge-transfer, and metal-ligand interaction is performed.

  7. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  8. Electricity storage using a thermal storage scheme

    Science.gov (United States)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  9. Subspace Identification

    DEFF Research Database (Denmark)

    Knudsen, Torben

    2002-01-01

    Subspace identification algorithms are user friendly, numerical fast and stable and they provide a good consistent estimate of the deterministic part of a system. The weak point is the stochastic part. The uncertainty on this part is discussed below and methods to reduce it is derived....

  10. Subspace Identification

    DEFF Research Database (Denmark)

    Knudsen, Torben

    2001-01-01

    Subspace identification algorithms are user friendly, numerical fast and stable and they provide a good consistent estimate of the deterministic part of a system. The weak point is the stochastic part. The uncertainty on this part is discussed below and methods to reduce it is derived....

  11. Inertia Identification and PI Parameter Tuning of PMSM Servo Drives

    Science.gov (United States)

    Lei, Huang

    2017-05-01

    The goal of this paper is to improve the performance of permanent magnet synchronous motor(PMSM) servo system by identification of the inertia parameter and auto-tuning of PI parameters. The method relies on the speed acceleration and deceleration response produced by speed ramp signals applied to a speed-controlled servo. The proposed method relies on simple numerical calculations, thus make the proposed scheme more practical. After the knowledge of the inertia parameter, the tuning of the speed control loop can be performed. The experimental results verified that the proposed identification scheme can estimate inertia parameters accurately and effectively and the control system tuned can achieve good dynamic performance.

  12. Closed-loop System Identification with New Sensors

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, K; Stoustrup, Jakob

    2008-01-01

    This paper deals with system identification of new system dynamics revealed by online introduction of new sensors in existing multi-variable linear control systems. The so-called "Hansen Scheme" utilises the dual Youla-Kucera parameterisation of all systems stabilised by a given linear controller...... to transform closed-loop system identification problems into open-loop-like problems. We show that this scheme can be formally extended to accomodate extra sensors in a nice way. The approach is illustrated on a simple simulation example....

  13. Enabling Technology for Small Satellite Launch Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Access to space for Small Satellites is enabled by the use of excess launch capacity on existing launch vehicles. A range of sizes, form factors and masses need to...

  14. Enabling Technology for Small Satellite Launch Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Access to space for Small Satellites is enabled by the use of excess launch capacity on existing launch vehicles. A range of sizes, form factors and masses of small...

  15. Integrated Photonics Enabled by Slow Light

    DEFF Research Database (Denmark)

    Mørk, Jesper; Chen, Yuntian; Ek, Sara

    2012-01-01

    In this talk we will discuss the physics of slow light in semiconductor materials and in particular the possibilities offered for integrated photonics. This includes ultra-compact slow light enabled optical amplifiers, lasers and pulse sources....

  16. Utility Energy Services Contracts: Enabling Documents

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-05-01

    Utility Energy Services Contracts: Enabling Documents provides materials that clarify the authority for Federal agencies to enter into utility energy services contracts (UESCs), as well as sample documents and resources to ease utility partnership contracting.

  17. Web Enabled DROLS Verity TopicSets

    National Research Council Canada - National Science Library

    Tong, Richard

    1999-01-01

    The focus of this effort has been the design and development of automatically generated TopicSets and HTML pages that provide the basis of the required search and browsing capability for DTIC's Web Enabled DROLS System...

  18. Optical Coherent Receiver Enables THz Wireless Bridge

    DEFF Research Database (Denmark)

    Yu, Xianbin; Liu, Kexin; Zhang, Hangkai

    2016-01-01

    We experimentally demonstrated a 45 Gbit/s 400 GHz photonic wireless communication system enabled by an optical coherent receiver, which has a high potential in fast recovery of high data rate connections, for example, in disaster....

  19. Utility Energy Services Contracts: Enabling Documents

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Karen; Vasquez, Deb

    2017-01-01

    The Federal Energy Management Program's 'Utility Energy Service Contracts: Enabling Documents' provide legislative information and materials that clarify the authority for federal agencies to enter into utility energy service contracts, or UESCs.

  20. Guide and keys for the identification of Syllidae (Annelida, Phyllodocida from the British Isles (reported and expected species

    Directory of Open Access Journals (Sweden)

    Guillermo San Martín

    2015-03-01

    Full Text Available In November 2012, a workshop was carried out on the taxonomy and systematics of the family Syllidae (Annelida: Phyllodocida at the Dove Marine Laboratory, Cullercoats, Tynemouth, UK for the National Marine Biological Analytical Quality Control (NMBAQC Scheme. Illustrated keys for subfamilies, genera and species found in British and Irish waters were provided for participants from the major national agencies and consultancies involved in benthic sample processing. After the workshop, we prepared updates to these keys, to include some additional species provided by participants, and some species reported from nearby areas. In this paper, we provide the revised keys to enable rapid identification of Syllidae from the seas around Britain and Ireland. One new combination, Palposyllis propeweismanni, is proposed.

  1. Guide and keys for the identification of Syllidae (Annelida, Phyllodocida) from the British Isles (reported and expected species)

    Science.gov (United States)

    San Martín, Guillermo; Worsfold, Tim M.

    2015-01-01

    Abstract In November 2012, a workshop was carried out on the taxonomy and systematics of the family Syllidae (Annelida: Phyllodocida) at the Dove Marine Laboratory, Cullercoats, Tynemouth, UK for the National Marine Biological Analytical Quality Control (NMBAQC) Scheme. Illustrated keys for subfamilies, genera and species found in British and Irish waters were provided for participants from the major national agencies and consultancies involved in benthic sample processing. After the workshop, we prepared updates to these keys, to include some additional species provided by participants, and some species reported from nearby areas. In this paper, we provide the revised keys to enable rapid identification of Syllidae from the seas around Britain and Ireland. One new combination, Palposyllis propeweismanni, is proposed. PMID:25878521

  2. Paradoxical Leadership to Enable Strategic Agility

    OpenAIRE

    Lewis, M. W.; Andriopoulos, C.; Smith, W. K.

    2014-01-01

    Strategic agility evokes contradictions, such as stability-flexibility, commitment-change, and established routines-novel approaches. These competing demands pose challenges that require paradoxical leadership—practices seeking creative, both/and solutions that can enable fast-paced, adaptable decision making. Why is managing paradox critical to strategic agility? And which practices enable leaders to effectively manage tensions? This article describes the paradoxical nature of strategic agil...

  3. ISS - Enabling Exploration Through Docking Standards

    Science.gov (United States)

    Hatfield, Caris A.

    2011-01-01

    NASA and the ISS partnership are jointly developing a key standard to enable future collaborative exploration. The IDSS is based on flight proven design while incorporating new low impact technology. Low impact technology accommodates a wide range of vehicle contact and capture conditions. This standard will get early demonstration on the ISS. Experience gained here will enable operational experience and the opportunity to refine the standard.

  4. Dynamics-Enabled Nanoelectromechanical Systems (NEMS) Oscillators

    Science.gov (United States)

    2014-06-01

    AFRL-RY-WP-TR-2014-0144 DYNAMICS-ENABLED NANOELECTROMECHANICAL SYSTEMS ( NEMS ) OSCILLATORS Michael Roukes California Institute...SYSTEMS ( NEMS ) OSCILLATORS 5a. CONTRACT NUMBER FA8650-10-1-7029 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR(S) Michael Roukes...engineer, and demonstrate nonlinear-dynamics-enabled nanoelectromechanical system ( NEMS ) frequency-source technology. 15. SUBJECT TERMS

  5. Enabling Sustainable NESHAP Compliance for Army Installations

    Science.gov (United States)

    2009-05-07

    including the Chemical Agent Resistant Coating (CARC) system  Solvents, thinners and cleaners  Depainting materials (a.k.a., paint strippers ...or work practice standards UNCLASSIFIED UNCLASSIFIED Enabling DLSME NESHAP Compliance: Methylene Chloride (MeCl) Depainting (1) What we are doing...50% growth cap for large vats; usage cap outside of vats UNCLASSIFIED UNCLASSIFIED Enabling DLSME NESHAP Compliance: Methylene Chloride (MeCl

  6. Patterns of Work Identification

    Science.gov (United States)

    Hebden, J. E.

    1975-01-01

    The paper examines ways in which the concept of work identification may provide a useful means of delineating the boundaries of occupational groups. Two kinds of identification are discussed: identification with employing organizations and identification with occupation.

  7. Securing the Use of RFID-Enabled Banknotes

    Science.gov (United States)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  8. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    Science.gov (United States)

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  9. Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    Directory of Open Access Journals (Sweden)

    Chunfeng Lv

    2012-04-01

    Full Text Available Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  10. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  11. Simple and High-Accurate Schemes for Hyperbolic Conservation Laws

    Directory of Open Access Journals (Sweden)

    Renzhong Feng

    2014-01-01

    Full Text Available The paper constructs a class of simple high-accurate schemes (SHA schemes with third order approximation accuracy in both space and time to solve linear hyperbolic equations, using linear data reconstruction and Lax-Wendroff scheme. The schemes can be made even fourth order accurate with special choice of parameter. In order to avoid spurious oscillations in the vicinity of strong gradients, we make the SHA schemes total variation diminishing ones (TVD schemes for short by setting flux limiter in their numerical fluxes and then extend these schemes to solve nonlinear Burgers’ equation and Euler equations. The numerical examples show that these schemes give high order of accuracy and high resolution results. The advantages of these schemes are their simplicity and high order of accuracy.

  12. Damage identification in beams by a response surface based technique

    Directory of Open Access Journals (Sweden)

    Teidj S.

    2014-01-01

    Full Text Available In this work, identification of damage in uniform homogeneous metallic beams was considered through the propagation of non dispersive elastic torsional waves. The proposed damage detection procedure consisted of the following sequence. Giving a localized torque excitation, having the form of a short half-sine pulse, the first step was calculating the transient solution of the resulting torsional wave. This torque could be generated in practice by means of asymmetric laser irradiation of the beam surface. Then, a localized defect assumed to be characterized by an abrupt reduction of beam section area with a given height and extent was placed at a known location of the beam. Next, the response in terms of transverse section rotation rate was obtained for a point situated afterwards the defect, where the sensor was positioned. This last could utilize in practice the concept of laser vibrometry. A parametric study has been conducted after that by using a full factorial design of experiments table and numerical simulations based on a finite difference characteristic scheme. This has enabled the derivation of a response surface model that was shown to represent adequately the response of the system in terms of the following factors: defect extent and severity. The final step was performing the inverse problem solution in order to identify the defect characteristics by using measurement.

  13. A Smart phone Identification Method Based on Gesture

    Directory of Open Access Journals (Sweden)

    Xu Di

    2016-01-01

    Full Text Available In order to promote the practicality of smart phone identification based on gesture, we introduce weighted morphological characteristics and early termination of authentication into dynamic time warping (DTW algorithm, which based on characteristic moving data captured by in-built accelerometer and gyroscopes, and put forward an effective identification algorithm (ME-DTW for smartphone. The algorithm controls the contribution made by the difference between the latitudes to the total Euclidean distance by smartphone morphological characteristics. It also introduces restricted areas touch trigger gesture acquisition scheme and authentication gesture length selection scheme based on normal distribution, which effectively improve the identification accuracy and efficiency. Experimental results show that: when others imitate gestures attack false acceptance rate tends to 0%, the personal identification false rejection rate remained at 3.29%, which can meet most practical security needs

  14. Transverse Hilbert schemes and completely integrable systems

    Directory of Open Access Journals (Sweden)

    Donin Niccolò Lora Lamia

    2017-12-01

    Full Text Available In this paper we consider a special class of completely integrable systems that arise as transverse Hilbert schemes of d points of a complex symplectic surface S projecting onto ℂ via a surjective map p which is a submersion outside a discrete subset of S. We explicitly endow the transverse Hilbert scheme Sp[d] with a symplectic form and an endomorphism A of its tangent space with 2-dimensional eigenspaces and such that its characteristic polynomial is the square of its minimum polynomial and show it has the maximal number of commuting Hamiltonians.We then provide the inverse construction, starting from a 2ddimensional holomorphic integrable system W which has an endomorphism A: TW → TW satisfying the above properties and recover our initial surface S with W ≌ Sp[d].

  15. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  16. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....... function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...

  17. Fixed Wordsize Implementation of Lifting Schemes

    Directory of Open Access Journals (Sweden)

    Tanja Karp

    2007-01-01

    Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  18. New communication schemes based on adaptive synchronization.

    Science.gov (United States)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  19. Optimization of Train Trip Package Operation Scheme

    Directory of Open Access Journals (Sweden)

    Lu Tong

    2015-01-01

    Full Text Available Train trip package transportation is an advanced form of railway freight transportation, realized by a specialized train which has fixed stations, fixed time, and fixed path. Train trip package transportation has lots of advantages, such as large volume, long distance, high speed, simple forms of organization, and high margin, so it has become the main way of railway freight transportation. This paper firstly analyzes the related factors of train trip package transportation from its organizational forms and characteristics. Then an optimization model for train trip package transportation is established to provide optimum operation schemes. The proposed model is solved by the genetic algorithm. At last, the paper tests the model on the basis of the data of 8 regions. The results show that the proposed method is feasible for solving operation scheme issues of train trip package.

  20. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  1. Optimizing multiplexing scheme in interferometric microscopy

    Science.gov (United States)

    Tayebi, Behnam; Jaferzadeh, Keyvan; Sharif, Farnaz; Han, Jae-Ho

    2016-08-01

    In single exposure off-axis interferometry, multiple information can be recorded by spatial frequency multiplexing. We investigate optimum conditions for designing 2D sampling schemes to record larger field of view in off-axis interferometry multiplexing. The spatial resolution of the recorded image is related to the numerical aperture of the system and sensor pixel size. The spatial resolution should preserve by avoiding crosstalk in the frequency domain. Furthermore, the field of view depends on the sensor size and magnification of the imaging system. In order to preserve resolution and have a larger field of view, the frequency domain should be designed correctly. The experimental results demonstrate that selecting the wrong geometrical scheme in frequency domain decrease the recorded image area.

  2. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  3. Exploration of Terminal Procedures Enabled by NASA Wake VAS Technologies

    Science.gov (United States)

    Lunsford, Clark R.; Smith, Arthur P., III; Cooper, Wayne W., Jr.; Mundra, Anand D.; Gross, Amy E.; Audenaerd, Laurence F.; Killian, Bruce E.

    2004-01-01

    The National Aeronautics and Space Administration (NASA) tasked The MITRE Corporation's Center for Advanced Aviation System Development (CAASD) to investigate potential air traffic control (ATC) procedures that could benefit from technology used or developed in NASA's Wake Vortex Advisory System (WakeVAS). The task also required developing an estimate of the potential benefits of the candidate procedures. The main thrust of the investigation was to evaluate opportunities for improved capacity and efficiency in airport arrival and departure operations. Other procedures that would provide safety enhancements were also considered. The purpose of this investigation was to provide input to the WakeVAS program office regarding the most promising areas of development for the program. A two-fold perspective was desired: First, identification of benefits from possible procedures enabled by both incremental components and the mature state of WakeVAS technology; second identification of procedures that could be expected to evolve from the current Federal Aviation Administration (FAA) procedures. The evolution of procedures should provide meaningful increments of benefit and a low risk implementation of the WakeVAS technologies.

  4. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    OpenAIRE

    Pankratova, S.A.

    2017-01-01

    Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative par...

  5. [A scheme to support teenagers in care].

    Science.gov (United States)

    Maldera, David

    In some family situations, the placement of a teenager, even in the case of a court decision, proves ineffective. The accumulation of all kinds of difficulties requires a different type of support, based on responsiveness, attention and above all time to come together. A dedicated scheme helps to prevent situations of waywardness or marginalisation among these teenagers and to support the families. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  6. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  7. Failure of a proposed superluminal scheme

    Science.gov (United States)

    Furuya, K.; Milonni, P. W.; Steinberg, A. M.; Wolinsky, M.

    1999-02-01

    We consider a “superluminal quantum Morse telegraph”, recently proposed by Garuccio, involving a polarization-correlated photon pair and a Michelson interferometer in which one of the mirrors is replaced by a phase-conjugating mirror (PCM). Superluminal information transfer in this scheme is precluded by the impossibility of distinguishing between unpolarized photons prepared by mixing linear polarization states or by mixing circular polarization states.

  8. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  9. A Scatter Storage Scheme for Dictionary Lookups

    Directory of Open Access Journals (Sweden)

    D. M. Murray

    1970-09-01

    Full Text Available Scatter storage schemes are examined with respect to their applicability to dictionary lookup procedures. Of particular interest are virtual scatter methods which combine the advantages of rapid search speed and reasonable storage requirements. The theoretical aspects of computing hash addresses are developed, and several algorithms are evaluated. Finally, experiments with an actual text lookup process are described, and a possible library application is discussed.

  10. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    one more than the total number of blocks or one more than `, whichever is less. min ( f s/bs, `) + 1 (4.10) 4.3.1 MAC-PDP For local data experiments, we...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COST COMPARISON AMONG PROVABLE DATA POSSESSION SCHEMES by Stephen J. Bremer March 2016 Thesis...response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and

  11. A rational function based scheme for solving advection equation

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).

  12. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  13. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  14. Fractal-based image sequence compression scheme

    Science.gov (United States)

    Li, Haibo; Novak, Mirek; Forchheimer, Robert

    1993-07-01

    The dominant image transformation used in the existing fractal coding schemes is the affine function. Although an affine transformation is easy to compute and understand, its linear approximation ability limits the employment of larger range blocks, that is, it limits further improvement in compression efficiency. We generalize the image transformation from the usual affine form to the more general quadratic form, and provide theoretical requirements for the generalized transformation to be contractive. Based on the self-transformation system (STS) model, an image sequence coding scheme--fractal-based image sequence coding--is proposed. In this coding scheme, our generalized transformation is used to model the self- transformation is used to model the self-transformation from the domain block to its range blocks. Experimental results on a real image sequence show that for the same size of blocks, the SNR can be improved by 10 dB, or, for the same SNR of the decoded image sequence, the compression ratio is raised twofold when the new generalized transformation is used to replace the usual affine transformation. In addition, due to the utilization of the STS model, the computational complexity is only linearly related to the size of the 3-D blocks. This provides for fast encoding and decoding.

  15. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  16. Progress on Implementing Additional Physics Schemes into ...

    Science.gov (United States)

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  17. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Multimedia

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  18. Dynamical decoupling schemes derived from Hamilton cycles

    Science.gov (United States)

    Rötteler, Martin

    2008-04-01

    We address the problem of decoupling the interactions in a spin network governed by a pair-interaction Hamiltonian. Combinatorial schemes for decoupling and for manipulating the couplings of Hamiltonians have been developed, which use selective pulses. In this paper, we consider an additional requirement on these pulse sequences: as few different control operations as possible should be used. This requirement is motivated by the fact that to find an optimal implementation of each individual selective pulse will be expensive since it requires to solve a pulse shaping problem. Hence, it is desirable to use as few different selective pulses as possible. As a first result, we show that for d-dimensional systems, where d ⩾2, the ability to implement only two control operations is sufficient to turn off the time evolution. Next, we address the case of a bipartite system with local control and show that four different control operations are sufficient. Finally, turning to networks consisting of several d-dimensional nodes, we show that decoupling can be achieved if one is able to control a number of different control operations, which is logarithmic in the number of nodes. We give an explicit family of efficient decoupling schemes with logarithmic number of different pulses based on the classic Hamming codes. We also provide a table of the best known decoupling schemes for small networks of qubits.

  19. Parallel Implementation of MAFFT on CUDA-Enabled Graphics Hardware.

    Science.gov (United States)

    Zhu, Xiangyuan; Li, Kenli; Salah, Ahmad; Shi, Lin; Li, Keqin

    2015-01-01

    Multiple sequence alignment (MSA) constitutes an extremely powerful tool for many biological applications including phylogenetic tree estimation, secondary structure prediction, and critical residue identification. However, aligning large biological sequences with popular tools such as MAFFT requires long runtimes on sequential architectures. Due to the ever increasing sizes of sequence databases, there is increasing demand to accelerate this task. In this paper, we demonstrate how graphic processing units (GPUs), powered by the compute unified device architecture (CUDA), can be used as an efficient computational platform to accelerate the MAFFT algorithm. To fully exploit the GPU's capabilities for accelerating MAFFT, we have optimized the sequence data organization to eliminate the bandwidth bottleneck of memory access, designed a memory allocation and reuse strategy to make full use of limited memory of GPUs, proposed a new modified-run-length encoding (MRLE) scheme to reduce memory consumption, and used high-performance shared memory to speed up I/O operations. Our implementation tested in three NVIDIA GPUs achieves speedup up to 11.28 on a Tesla K20m GPU compared to the sequential MAFFT 7.015.

  20. Uncertainty of Microphysics Schemes in CRMs

    Science.gov (United States)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  1. Visualised predictions of gap anisotropy to test new electron pairing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, X.H.; Walmsley, D.G., E-mail: dg.walmsley@qub.ac.uk

    2017-03-15

    Highlights: • Proposed test of new electron pairing scheme. • Energy gap anisotropy maps. • Reinterpretation of experimental data on gap anisotropy. • Critical comparison of theoretical results with sparse experimental data in lead, aluminium, niobium and tantalum. • Identification of absence of significant (>1%) gap anisotropy in single crystal tunnelling data. - Abstract: The rich and fertile but not yet adequately exploited ground of superconductor anisotropy is proposed as a test bed for a new empirical scheme of electron pairing. The scheme is directed to resolving a numerical and conceptual difficulty in the BCS theory. The original theoretical formulation of the anisotropy problem by Bennett is adopted and its outcomes extensively explored. Here the Bennett conclusion that in metallic superconductors phonon anisotropy is the principal source of gap anisotropy is accepted. Values of the energy gap are visualised globally in k-space with unprecedented detail and accuracy. Comparison is made between the anisotropy pattern from the new and the usual BCS pairing schemes. Differences are revealed for future experimental resolution.

  2. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  3. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  4. Community first responders and responder schemes in the United Kingdom: systematic scoping review.

    Science.gov (United States)

    Phung, Viet-Hai; Trueman, Ian; Togher, Fiona; Orner, Roderick; Siriwardena, A Niroshan

    2017-06-19

    Community First Responder (CFR) schemes support lay people to respond to medical emergencies, working closely with ambulance services. They operate widely in the UK. There has been no previous review of UK literature on these schemes. This is the first systematic scoping review of UK literature on CFR schemes, which identifies the reasons for becoming a CFR, requirements for training and feedback and confusion between the CFR role and that of ambulance service staff. This study also reveals gaps in the evidence base for CFR schemes. We conducted a systematic scoping review of the published literature, in the English language from 2000 onwards using specific search terms in six databases. Narrative synthesis was used to analyse article content. Nine articles remained from the initial search of 15,969 articles after removing duplicates, title and abstract and then full text review. People were motivated to become CFRs through an altruistic desire to help others. They generally felt rewarded by their work but recognised that the help they provided was limited by their training compared with ambulance staff. There were concerns about the possible emotional impact on CFRs responding to incidents. CFRs felt that better feedback would enhance their learning. Ongoing training and support were viewed as essential to enable CFRs to progress. They perceived that public recognition of the CFR role was low, patients sometimes confusing them with ambulance staff. Relationships with the ambulance service were sometimes ambivalent due to confusion over roles. There was support for local autonomy of CFR schemes but with greater sharing of best practice. Most studies dated from 2005 and were descriptive rather than analytical. In the UK and Australia CFRs are usually lay volunteers equipped with basic skills for responding to medical emergencies, whereas in the US they include other emergency staff as well as lay people. Opportunities for future research include exploring

  5. What are the emerging features of community health insurance schemes in east Africa?

    Directory of Open Access Journals (Sweden)

    Robert Basaza

    2009-06-01

    Full Text Available Robert Basaza1,3, George Pariyo2, Bart Criel31Ministry of Health Uganda, Kampala, Uganda; 2Department of Health Policy, Planning and Management, Makerere University school of Public Health, New Mulago Hospital Complex, Kampala, Uganda; 3Institute of Tropical Medicine Nationalestraat 155, B-2000 Antwerp, BelgiumBackground: The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units.Objective: To provide comparative description of community health insurance (CHI schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods: An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions: The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework.Keywords: community health insurance, low enrolment, policy and Africa

  6. Nanomaterial-Enabled Wearable Sensors for Healthcare.

    Science.gov (United States)

    Yao, Shanshan; Swetha, Puchakayala; Zhu, Yong

    2018-01-01

    Highly sensitive wearable sensors that can be conformably attached to human skin or integrated with textiles to monitor the physiological parameters of human body or the surrounding environment have garnered tremendous interest. Owing to the large surface area and outstanding material properties, nanomaterials are promising building blocks for wearable sensors. Recent advances in the nanomaterial-enabled wearable sensors including temperature, electrophysiological, strain, tactile, electrochemical, and environmental sensors are presented in this review. Integration of multiple sensors for multimodal sensing and integration with other components into wearable systems are summarized. Representative applications of nanomaterial-enabled wearable sensors for healthcare, including continuous health monitoring, daily and sports activity tracking, and multifunctional electronic skin are highlighted. Finally, challenges, opportunities, and future perspectives in the field of nanomaterial-enabled wearable sensors are discussed. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Enabling the Discovery of Gravitational Radiation

    Science.gov (United States)

    Isaacson, Richard

    2017-01-01

    The discovery of gravitational radiation was announced with the publication of the results of a physics experiment involving over a thousand participants. This was preceded by a century of theoretical work, involving a similarly large group of physicists, mathematicians, and computer scientists. This huge effort was enabled by a substantial commitment of resources, both public and private, to develop the different strands of this complex research enterprise, and to build a community of scientists to carry it out. In the excitement following the discovery, the role of key enablers of this success has not always been adequately recognized in popular accounts. In this talk, I will try to call attention to a few of the key ingredients that proved crucial to enabling the successful discovery of gravitational waves, and the opening of a new field of science.

  8. Origami-enabled deformable silicon solar cells

    Energy Technology Data Exchange (ETDEWEB)

    Tang, Rui; Huang, Hai; Liang, Hanshuang; Liang, Mengbing [School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, Arizona 85287 (United States); Tu, Hongen; Xu, Yong [Electrical and Computer Engineering, Wayne State University, 5050 Anthony Wayne Dr., Detroit, Michigan 48202 (United States); Song, Zeming; Jiang, Hanqing, E-mail: hanqing.jiang@asu.edu [School for Engineering of Matter, Transport and Energy, Arizona State University, Tempe, Arizona 85287 (United States); Yu, Hongyu, E-mail: hongyu.yu@asu.edu [School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, Arizona 85287 (United States); School of Earth and Space Exploration, Arizona State University, Tempe, Arizona 85287 (United States)

    2014-02-24

    Deformable electronics have found various applications and elastomeric materials have been widely used to reach flexibility and stretchability. In this Letter, we report an alternative approach to enable deformability through origami. In this approach, the deformability is achieved through folding and unfolding at the creases while the functional devices do not experience strain. We have demonstrated an example of origami-enabled silicon solar cells and showed that this solar cell can reach up to 644% areal compactness while maintaining reasonable good performance upon cyclic folding/unfolding. This approach opens an alternative direction of producing flexible, stretchable, and deformable electronics.

  9. Raman fiber-optical method for colon cancer detection: Cross-validation and outlier identification approach

    Science.gov (United States)

    Petersen, D.; Naveed, P.; Ragheb, A.; Niedieker, D.; El-Mashtoly, S. F.; Brechmann, T.; Kötting, C.; Schmiegel, W. H.; Freier, E.; Pox, C.; Gerwert, K.

    2017-06-01

    Endoscopy plays a major role in early recognition of cancer which is not externally accessible and therewith in increasing the survival rate. Raman spectroscopic fiber-optical approaches can help to decrease the impact on the patient, increase objectivity in tissue characterization, reduce expenses and provide a significant time advantage in endoscopy. In gastroenterology an early recognition of malign and precursor lesions is relevant. Instantaneous and precise differentiation between adenomas as precursor lesions for cancer and hyperplastic polyps on the one hand and between high and low-risk alterations on the other hand is important. Raman fiber-optical measurements of colon biopsy samples taken during colonoscopy were carried out during a clinical study, and samples of adenocarcinoma (22), tubular adenomas (141), hyperplastic polyps (79) and normal tissue (101) from 151 patients were analyzed. This allows us to focus on the bioinformatic analysis and to set stage for Raman endoscopic measurements. Since spectral differences between normal and cancerous biopsy samples are small, special care has to be taken in data analysis. Using a leave-one-patient-out cross-validation scheme, three different outlier identification methods were investigated to decrease the influence of systematic errors, like a residual risk in misplacement of the sample and spectral dilution of marker bands (esp. cancerous tissue) and therewith optimize the experimental design. Furthermore other validations methods like leave-one-sample-out and leave-one-spectrum-out cross-validation schemes were compared with leave-one-patient-out cross-validation. High-risk lesions were differentiated from low-risk lesions with a sensitivity of 79%, specificity of 74% and an accuracy of 77%, cancer and normal tissue with a sensitivity of 79%, specificity of 83% and an accuracy of 81%. Additionally applied outlier identification enabled us to improve the recognition of neoplastic biopsy samples.

  10. Raman fiber-optical method for colon cancer detection: Cross-validation and outlier identification approach.

    Science.gov (United States)

    Petersen, D; Naveed, P; Ragheb, A; Niedieker, D; El-Mashtoly, S F; Brechmann, T; Kötting, C; Schmiegel, W H; Freier, E; Pox, C; Gerwert, K

    2017-06-15

    Endoscopy plays a major role in early recognition of cancer which is not externally accessible and therewith in increasing the survival rate. Raman spectroscopic fiber-optical approaches can help to decrease the impact on the patient, increase objectivity in tissue characterization, reduce expenses and provide a significant time advantage in endoscopy. In gastroenterology an early recognition of malign and precursor lesions is relevant. Instantaneous and precise differentiation between adenomas as precursor lesions for cancer and hyperplastic polyps on the one hand and between high and low-risk alterations on the other hand is important. Raman fiber-optical measurements of colon biopsy samples taken during colonoscopy were carried out during a clinical study, and samples of adenocarcinoma (22), tubular adenomas (141), hyperplastic polyps (79) and normal tissue (101) from 151 patients were analyzed. This allows us to focus on the bioinformatic analysis and to set stage for Raman endoscopic measurements. Since spectral differences between normal and cancerous biopsy samples are small, special care has to be taken in data analysis. Using a leave-one-patient-out cross-validation scheme, three different outlier identification methods were investigated to decrease the influence of systematic errors, like a residual risk in misplacement of the sample and spectral dilution of marker bands (esp. cancerous tissue) and therewith optimize the experimental design. Furthermore other validations methods like leave-one-sample-out and leave-one-spectrum-out cross-validation schemes were compared with leave-one-patient-out cross-validation. High-risk lesions were differentiated from low-risk lesions with a sensitivity of 79%, specificity of 74% and an accuracy of 77%, cancer and normal tissue with a sensitivity of 79%, specificity of 83% and an accuracy of 81%. Additionally applied outlier identification enabled us to improve the recognition of neoplastic biopsy samples. Copyright

  11. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  12. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  13. 7 CFR 400.458 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  14. Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service

    Directory of Open Access Journals (Sweden)

    Jiaxing Qu

    2017-01-01

    Full Text Available Location sharing service has become an indispensable part in mobile social networks. However, location sharing may introduce a new class of privacy threats ranging from localizing an individual to profiling and identifying him based on the places he shared. Although users may avoid releasing geocontent in sensitive locations, it does not necessarily prevent the adversary from inferring users’ privacy through space-temporal correlations and historical information. In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. First, we define fingerprint identification based on Markov chain and state classification to describe the users’ behavior patterns. Then, we propose a novel location anonymization mechanism, which adopts a ε-indistinguishability strategy to protect user’s sensitive location information published. Finally, experimental results are given to illustrate good performance and effectiveness of the proposed scheme.

  15. Relation Between Early Maladaptive Schemes and Anxiety and Depression Features in University Students

    Directory of Open Access Journals (Sweden)

    Diana Lucía Sánchez-Ortíz***

    2009-12-01

    Full Text Available Anxiety and depression are important health problems, because of the high prevalence rates in normal population and in clinical population. This non-experimental study intends to identify the cognitive profile, through the early maladaptive schemes in students from the Universidad Pontificia Bolivariana Bucaramanga, related with depression and anxiety scores. Thegoal is to contribute to the identification of cognitive characteristics that could help in the prevention of these disorders. 259 psychology students of the first seven semesters were evaluated by means from the following questionnaires: BDI, ST/DEP, STAI and YSQ-L2. The results don’t show the presence of specific schemes as a function of the presence of State/ Trait depression or State/Trait anxiety, which might suggest, through the dimensional paradigm, the presence of a cognitive pattern for an anxiety and depression mix disorder. It is suggested that further research should be carried out with other samples, including clinical population.

  16. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  17. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  18. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  19. Design concepts for a virtualizable embedded MPSoC architecture enabling virtualization in embedded multi-processor systems

    CERN Document Server

    Biedermann, Alexander

    2014-01-01

    Alexander Biedermann presents a generic hardware-based virtualization approach, which may transform an array of any off-the-shelf embedded processors into a multi-processor system with high execution dynamism. Based on this approach, he highlights concepts for the design of energy aware systems, self-healing systems as well as parallelized systems. For the latter, the novel so-called Agile Processing scheme is introduced by the author, which enables a seamless transition between sequential and parallel execution schemes. The design of such virtualizable systems is further aided by introduction

  20. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  1. Optimization of nanofountain probe microfabrication enables large-scale nanopatterning

    Science.gov (United States)

    Safi, Asmahan; Kang, Wonmo; Czapleski, David; Divan, Ralu; Moldovan, Nicolae; Espinosa, Horacio D.

    2013-12-01

    A technological gap in nanomanufacturing has prevented the translation of many nanomaterial discoveries into real-world commercialized products. Bridging this gap requires a paradigm shift in methods for fabricating nanoscale devices in a reliable and repeatable fashion. Here we present the optimized fabrication of a robust and scalable nanoscale delivery platform, the nanofountain probe (NFP), for parallel direct-write of functional materials. Microfabrication of a new generation of NFP was realized with the aim of increasing the uniformity of the device structure. Optimized probe geometry was integrated into the design and fabrication process by modifying the precursor mask dimensions and by using an isotropic selective dry etching of the outer shell that defines the protrusion area. Probes with well-conserved sharp tips and controlled protrusion lengths were obtained. Sealing effectiveness of the channels was optimized. A conformal tetraethyl orthosilicate based oxide layer increased the sealing efficacy while minimizing the required thickness. A compensation scheme based on the residual stresses in each layer was implemented to minimize bending of the cantilever after releasing the device. The device was tested by patterning ferritin catalyst arrays on silicon dioxide with sub-100 nm resolution. The optimized probes increased the control over the parallel patterning resolution which enables manufacturing of ordered arrays of nanomaterials.

  2. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    The point of contention in this case was whether the illegality of the business of the scheme was a relevant consideration in determining whether the pay-outs were made in the ordinary course of business of the scheme. This paper discusses pyramid schemes in the context of impeachable dispositions in terms of the ...

  3. a comparative study of prioritized handoff schemes with guard

    African Journals Online (AJOL)

    eobe

    A COMPARATIVE STUDY OF PRIORITIZED HANDOFF SCHEMES WITH GUARD CHANNELS IN WIRELESS NETWORKS. D. U. Onyishi. D. U. Onyishi, et al. Nigerian Journal of Technology. Vol. 34, No. 3, July 2015 600 application of resource allocation schemes.This gives precedence to handoff calls. Such schemes ...

  4. Matters of Coercion-Resistance in Cryptographic Voting Schemes

    OpenAIRE

    Kempka, Carmen

    2014-01-01

    This work addresses coercion-resistance in cryptographic voting schemes. It focuses on three particularly challenging cases: write-in candidates, internet elections and delegated voting. Furthermore, this work presents a taxonomy for analyzing and comparing a huge variety of voting schemes, and presents practical experiences with the voting scheme Bingo Voting.

  5. Efficient rate control scheme using modified inter-layer dependency ...

    Indian Academy of Sciences (India)

    In this paper, a spatial-resolutionratio-based MB mode decision scheme is proposed for spatially enhanced layers. The scheme uses the motion estimated at the base layer, to encode the respective MBs in the enhancement layers. The spatial–temporalsearch schemes at the enhancement layers are used to derive motion ...

  6. 7 CFR 623.21 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  7. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  8. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  9. 7 CFR 795.17 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  10. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  11. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  12. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  13. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  14. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2) Made...

  15. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  16. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  17. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  18. 7 CFR 1415.20 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  19. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  20. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  1. 7 CFR 633.18 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  2. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  3. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  4. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  5. 7 CFR 625.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  6. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  7. 7 CFR 1467.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  8. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  9. 7 CFR 1410.60 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  10. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  11. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  12. 7 CFR 1491.32 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  13. Nigeria's National Health Insurance Scheme: a critical reappraisal ...

    African Journals Online (AJOL)

    For well over four decades, the National Health Insurance Scheme (NHIS) remained on the drawing board. It is now a little over half a decade since the actual commencement of the implementation of the scheme. This review, therefore, chronicles the historical background to the introduction of the scheme, highlighting the ...

  14. On the strong monotonicity of the CABARET scheme

    Science.gov (United States)

    Ostapenko, V. V.

    2012-03-01

    The strong monotonicity of the CABARET scheme with single flux correction is analyzed as applied to the linear advection equation. It is shown that the scheme is strongly monotone (has the NED property) at Courant numbers r ∈ (0,0,5), for which it is monotone. Test computations illustrating this property of the CABARET scheme are presented.

  15. An Annotation Scheme for Social Interaction in Digital Playgrounds

    NARCIS (Netherlands)

    Moreno Celleri, Alejandro Manuel; van Delden, Robertus Wilhelmus; Reidsma, Dennis; Poppe, Ronald Walter; Heylen, Dirk K.J.; Herrlich, Marc; Malaka, Rainer; Masuch, Maic

    This paper introduces a new annotation scheme, designed specifically to study children's social interactions during play in digital playgrounds. The scheme is motivated by analyzing relevant literature, combined with observations from recordings of play sessions. The scheme allows us to analyze how

  16. Fissioned Triangular Schemes Via the Cross-Ratio

    NARCIS (Netherlands)

    van Dam, E.R.; de Caen, D.

    1999-01-01

    A construction of association schemes is presented; these are fission schemes of the triangular schemes T(n) where n=q + 1with q any prime power. The key observation is quite elementary, being that the natural action of PGL(2,q) on the 2-element subsets of the projective line PG(1,q) is generously

  17. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  18. throughput analysis of arq schemes using state transition diagrams

    African Journals Online (AJOL)

    User

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is pos-.

  19. Throughput Analysis of Arq Schemes Using State Transition Diagrams

    African Journals Online (AJOL)

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...

  20. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.