WorldWideScience

Sample records for scheme itas description

  1. Miljardär Ita Ever / Einar Ellermaa

    Index Scriptorium Estoniae

    Ellermaa, Einar, 1960-

    2006-01-01

    Näitleja Ita Everi 75. sünnipäevaks esilinastus mängufilm (või telelavastus) "Vana daami visiit" : režissöör Roman Baskin : stsenaristid Roman Baskin, Ilmar Raag : peaosades Ita Ever ja Aarne Üksküla

  2. WTO’s information technology agreement (ITA and its expansion (ITA II: multilateralizing regionalism

    Directory of Open Access Journals (Sweden)

    Camilla Capucio

    2018-03-01

    Full Text Available Bearing in mind the complex context of the relationship between multilateralism and regionalism, the conclusion of plurilateral agreements within the WTO, open to participation of all interested members, offers a multilateral perspective of regionalism, in which the benefits of partial consensus are to be extended to the multilateral sphere. The ITA - Information Technology Agreement - is mentioned as an example of this possibility, and its recent expansion, through the negotiation of the ITA II, demonstrates the strengthening of this multilateralisation trend of regionalism, although with special features. Thus, this article is developed drawing the context and introduction of the theme of regionalism and multilateralism, and presents the theory of multilateralisation of regionalism and the ITA as one of those experiences, and its recent expansion as a resumption of the relevance of this theory. Considering the impasses for the conclusion of the Doha Round, the expansion of these partial consensus and the continuation of negotiations at the World Trade Organization by the conclusion of sectoral plurilateral agreements emerges as a possible way out, which demands a re-architecture of the interpretation of the role of the WTO in the global economic governance.

  3. ITER ITA newsletter. No. 8, September 2003

    International Nuclear Information System (INIS)

    2003-10-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities including Robert Aymar's leaving ITER for CERN, ITER related issues at the IAEA General Conference and status and prospects of thermonuclear power and activity during the ITA on materials foe vessel and in-vessel components

  4. ITER ITA newsletter. No. 22, May 2005

    International Nuclear Information System (INIS)

    2005-06-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about Japanese Participant Team's recent activities in the ITER Transitional Arrangements(ITA) phase and ITER related meeting the Fourth IAEA Technical Meeting (IAEA-TM) on Negative Ion Based Neutral Beam Injectors which was held in Padova, Italy from 9-11 May 2005

  5. Mivoq Evalita 2016 PosTwITA tagger

    OpenAIRE

    Paci, Giulio

    2017-01-01

    The POS tagger developed by Mivoq to tag tweets according to PosTwITA task guidelines as defined at Evalita 2016 is presented. The system obtained third position with 92.7% of accuracy. Si presenta il POS tagger sviluppato da Mivoq per etichettare i tweet secondo le linee guida del task PosT-wITA, cos come definite per Evalita 2016. Il sistema ha ottenuto la terza posizione con un accuratezza del 92.7%.

  6. Prediction of Support Reaction Forces of ITA via Response Spectrum Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kwak, Jin Sung; Jeong, Joon Ho; Lee, Sang Jin; Oh, Jin Ho; Lee, Jong Min [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The irradiation targets are transferred along pipes between TTS (Target Transfer Station) and ITA (Irradiation Tube Assembly) by hydraulic forces. The ITA corresponds to the vertical guide tube for irradiation targets inside a reactor, and it penetrates the reactor structure. Because the ITA is classified into seismic category II, its structural integrity must be evaluated by the seismic analysis. To approach more realistic problem, the interaction between the ITA and the reactor structure must be considered. However, this paper is focused on the preliminary analysis, and it is simplified that only the response of the ITA caused by earthquake affects the reactor structure. The response of the ITA is predicted by the spectrum response analysis based on the FDRS (Floor Design Response Spectra) of KJRR. Finally, the reaction forces corresponding to the load transfer into the reactor structure are estimated by using ANSYS. In this study, the reaction forces due to the earthquake are estimated by the response spectrum analysis. For the saving computational time and resource required, the FE model with beam element is constructed, and it is confirmed that the accuracy of the solution is acceptable by comparing the results of the solid model.

  7. Non Standard Finite Difference Scheme for Mutualistic Interaction Description

    OpenAIRE

    Gabbriellini, Gianluca

    2012-01-01

    One of the more interesting themes of the mathematical ecology is the description of the mutualistic interaction between two interacting species. Based on continuous-time model developed by Holland and DeAngelis 2009 for consumer-resource mutualism description, this work deals with the application of the Mickens Non Standard Finite Difference method to transform the continuous-time scheme into a discrete-time one. It has been proved that the Mickens scheme is dynamically consistent with the o...

  8. ITER ITA newsletter. No. 16, June-July-August 2004

    International Nuclear Information System (INIS)

    2004-09-01

    This issue of ITER ITA (ITER Transitional Arrangements) newsletter contains concise information about ITER related meetings, namely, the third preparatory meeting for ITER decision making, which was held at the IAEA Headquarters in Vienna on 18 June 2004, the third meeting of the ITER preparatory committee, which was held on 22nd June 2004 at IPP Garching and ITA technical activities status report

  9. 20 CFR 663.420 - Can the duration and amount of ITA's be limited?

    Science.gov (United States)

    2010-04-01

    ... Training Accounts § 663.420 Can the duration and amount of ITA's be limited? (a) Yes, the State or Local Board may impose limits on ITA's, such as limitations on the dollar amount and/or duration. (b) Limits... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Can the duration and amount of ITA's be...

  10. Lactobacillus Pentosus Ita23 and L. Acidipiscis Ita44 Enhance Feed Conversion Efficiency and Beneficial Gut Microbiota in Broiler Chickens

    Directory of Open Access Journals (Sweden)

    YW Altaher

    2015-06-01

    Full Text Available Although the use of probiotics especially Lactobacillus and Bifidobacteria species on growth and feed utilization in poultry production has been extensively studied, the results were inconsistent presumably because the mode of action of probiotic is multi-factorial and each probiotic strain may affect the host in a specific manner. This study investigated the probiotic effect of two strains of Lactobacillus(Lactobacillus pentosus ITA23 and Lactobacillus acidophilus ITA44; 109 cells/kg feed isolated from mulberry (Morus Alba silage on the growth performance, cecal microbial population, and blood cholesterol of broiler chickens. One hundred twenty male broiler chicks (Cobb500 were randomLy allocated to two groups (control and treatment of six replicates (cages with 10 chicks per cage. Chicks in the control group received a standard diet and those in the treatment group received the same diet supplemented with 109 cells of the above Lactobacillus per kg feed. Supplementation of Lactobacillus did not affect body weight gain (averaged 1604 g at 35 days old but feed conversion ratio improved (p<0.01 by 6.4% due to reduction in feed intake (p<0.01 by birds in the treatment group. Supplementation also increased the population of Lactobacillusspp. and reduced pathogens E. coli in the cecal samples. Although Lactobacillus supplementation tends to reduce serum total cholesterol, low-density lipoprotein (LDL and triglyceride concentrations, these values were not significantly different from those of the control group. Results of this study showed that L. pentosus ITA23 and L. acidophilus ITA44 are potential probiotics to be used in poultry diets.

  11. Hingelt punkar Ita Ever / intervjueerinud Ingrid Veidenberg

    Index Scriptorium Estoniae

    Ever, Ita, 1931-

    2011-01-01

    80. sünnipäeva tähistava näitleja Ita Everi ja tema poja Roman Baskini mõtteid elust, perest ja tööst teatris. Näitleja garderoobikaaslase Ülle Kaljuste ja teleprodutsent Toomas Kirsi arvamus

  12. ITER ITA newsletter. No. 21, April 2005

    International Nuclear Information System (INIS)

    2005-05-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about Russian federation Participant Team's activity in the area of preparation for ITER construction and information about International Fusion materials irradiation Facility(IRMIF) project and prospects for implementation

  13. Development of parallel benchmark code by sheet metal forming simulator 'ITAS'

    International Nuclear Information System (INIS)

    Watanabe, Hiroshi; Suzuki, Shintaro; Minami, Kazuo

    1999-03-01

    This report describes the development of parallel benchmark code by sheet metal forming simulator 'ITAS'. ITAS is a nonlinear elasto-plastic analysis program by the finite element method for the purpose of the simulation of sheet metal forming. ITAS adopts the dynamic analysis method that computes displacement of sheet metal at every time unit and utilizes the implicit method with the direct linear equation solver. Therefore the simulator is very robust. However, it requires a lot of computational time and memory capacity. In the development of the parallel benchmark code, we designed the code by MPI programming to reduce the computational time. In numerical experiments on the five kinds of parallel super computers at CCSE JAERI, i.e., SP2, SR2201, SX-4, T94 and VPP300, good performances are observed. The result will be shown to the public through WWW so that the benchmark results may become a guideline of research and development of the parallel program. (author)

  14. ITER ITA newsletter. No. 27, January 2006

    International Nuclear Information System (INIS)

    2006-02-01

    This issue of ITER ITA (ITER transitional arrangements) newsletter contains concise information about two ITER related meetings including the twelfth ITER Negotiations Meeting and The Ninth Meeting of the ITPA Topical Group (TG) on Diagnostics was held at the National Fusion Research Centre (NFRC), Daejeon, Korea, from 10-14 October 2005

  15. ITER ITA newsletter. No. 2, March 2003

    International Nuclear Information System (INIS)

    2003-05-01

    This ITER ITA newsletter contains concise information about the JASS (Joint Assessment of Specific Sites) final report. The main conclusion is that all four sites are sound and fully capable to respond to all ITER Site Requirements and Design assumptions, as approved by the ITER Council in its January 2000 Meeting

  16. Impacts of the elimination of the proportionate consolidation on Itaúsa financial statements

    Directory of Open Access Journals (Sweden)

    Raquel Wille Sarquis

    2018-02-01

    Full Text Available ABSTRACT This research aims to evaluate the impacts of the elimination of the proportionate consolidation method to recognize joint ventures investments, with the adoption of the Technical Pronouncement CPC 19 (R2, on the accounting amounts reported by Itaúsa - Investimentos Itaú S.A., and identify which accounting adjustments are necessary to explain the differences in reported amounts. Until December 31, 2012, there were two methods to recognize these investments: proportionate consolidation and equity method. The adoption of CPC 19 (R2, from January 1, 2013, brought relevant changes and the elimination of the proportionate consolidation method was the most controversial one. There are many users and researchers that argue that this method provides more relevant information. The effects of this change, with significant impacts on the amounts reported by the joint venturer firm, were even more relevant in Brazil, since almost all Brazilian firms used the proportionate consolidation. It was chosen the case of Itaúsa and, consequently, of Itaú Unibanco Holding because this is the largest private group in Brazil and represents a relevant investment for its joint venturers. The analyses indicated that the total asset reported by Itaúsa using proportionate consolidation was 832% higher than the value reported by the equity method. For liabilities and revenues, this percentage was even higher: 5,096% and 17,771%, respectively. This impact affects financial indicators, industry rankings, and other financial analyses. For example, the debt indicator decreased from 91% to 16%, when the accounting method was changed to the equity method. The analyses also indicated a set of accounting adjustments that explain the differences in the accounting amounts reported by Itaúsa, and these adjustments are beyond the recognition of the proportionate amounts of joint ventures, including goodwill, unrealized intercompany results, among others. The main

  17. ITER ITA newsletter. No. 10, November 2003

    International Nuclear Information System (INIS)

    2003-12-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about an ITER related meeting, namely, the Ninth ITER Negotiations Meeting (N-9), which was held on 9-10 November 2003 at the Fragrant Hill Golden Resources Commerce Hotel in Beijing and information about research on magnetic confinement fusion (MCF) in China

  18. Description of a stable scheme for steady-state coupled Monte Carlo–thermal–hydraulic calculations

    International Nuclear Information System (INIS)

    Dufek, Jan; Eduard Hoogenboom, J.

    2014-01-01

    Highlights: • A stable coupling scheme for steady-state MC–TH calculations is described. • The coupling scheme is based on the stochastic approximation method. • The neutron flux (or power) distribution is relaxed using a variable step-size. - Abstract: We provide a detailed description of a numerically stable and efficient coupling scheme for steady-state Monte Carlo neutronic calculations with thermal–hydraulic feedback. While we have previously derived and published the stochastic approximation based method for coupling the Monte Carlo criticality and thermal–hydraulic calculations, its possible implementation has not been described in a step-by-step manner. As the simple description of the coupling scheme was repeatedly requested from us, we have decided to make it available via this note

  19. Impacts of the elimination of the proportionate consolidation on Itaúsa financial statements

    OpenAIRE

    Raquel Wille Sarquis; Ariovaldo dos Santos

    2018-01-01

    ABSTRACT This research aims to evaluate the impacts of the elimination of the proportionate consolidation method to recognize joint ventures investments, with the adoption of the Technical Pronouncement CPC 19 (R2), on the accounting amounts reported by Itaúsa - Investimentos Itaú S.A., and identify which accounting adjustments are necessary to explain the differences in reported amounts. Until December 31, 2012, there were two methods to recognize these investments: proportionate consolidati...

  20. Ita Ever saab pojalt kingiks filmi / Ada Maltseva

    Index Scriptorium Estoniae

    Maltseva, Ada, 1970-

    2006-01-01

    Näitleja Ita Everi 75-ndaks sünnipäevaks jõuab ekraanile mängufilm "Vana daami visiit" : stsenaristid Roman Baskin, Ilmar Raag : režissöör Roman Baskin : MTÜ Kell Kümme koostöös ETV ja Exitfilmiga, Kultuurkapital. Filmi võtteplatsil toimunust

  1. ITER ITA newsletter. No. 6, July 2003

    International Nuclear Information System (INIS)

    2003-09-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities. One of them was the farewell party for for Annick Lyraud and Robert Aymar, who will take up his position as Director-General of CERN in January 2004, another is information about Dr. Yasuo Shimomura, ITER interim project leader, and ITER technical work during the transitional arrangements

  2. ITER ITA newsletter No. 33, August-September-October 2006

    International Nuclear Information System (INIS)

    2006-11-01

    This issue of ITER ITA (ITER transitional arrangements) newsletter contains concise information about ITER related events such as public debate on ITER in Provence and fiftieth annual General Conference of the IAEA. Eight ITER related statements were made during Conference

  3. ITER ITA newsletter. No. 11, December 2003

    International Nuclear Information System (INIS)

    2003-12-01

    This issue of the ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER including information from the editor about ITER update, about progress in ITER magnet design and preparation of procurement packages and about 25th anniversary of the First Steering Committee Meeting of the International Tokamak Reactor (INTOR) Workshop, organized under the auspices of the IAEA, took place at the IAEA Headquarters in Vienna

  4. ITER ITA newsletter. No. 19, January 2005

    International Nuclear Information System (INIS)

    2005-02-01

    This issue of the ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related meetings, namely, the 20th IAEA Fusion Energy Conference, which was held on 1-6 November 2004 in Vilamoura, Portugal and the seventh meeting of the ITPA topical group on diagnostics which was held at the Institute of Plasma Physics, Chinese Academy of Sciences (ASIPP), Hefei, P. R. China, from 11-15 October 2004

  5. ITER ITA newsletter. No. 1, February 2003

    International Nuclear Information System (INIS)

    2003-04-01

    This first issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related meetings including eighth ITER Negotiations meeting, held on 18-19 February, 2003 in St. Petersburg, Russia, first meeting of the ITER preparatory committee, held on 17 February, 2003 in St. Petersburg, Russia and the third meeting of the ITPA (International Tokamak Physics Activity) coordinating committee, held on 24-25 October 2002 at the Max-Planck-Institut fuer Plasmaphysik, Garching

  6. ITER ITA newsletter. No. 20, February-March 2005

    International Nuclear Information System (INIS)

    2005-03-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities including interview on the occasion of Academician E.P. Velikhov' 70th birthday conducted by Dr. Lev Golubbchikov, former ITER Contact Person of the Russian Federation and a new document management system of ITER called IDM (ITER Document Management), which supersedes the old IDoMS

  7. ITER ITA newsletter. No. 4, May 2003

    International Nuclear Information System (INIS)

    2003-07-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related meetings, one of them the eighth meeting of the ITER negotiators' standing sub-group (NSSG-8) and a number of related meetings from 14 to 22 May 2003 at Garching, Germany, another was bilateral blanket meeting between ITER International Team (IT) and the Research and Development Institute of Power Engineering (ENTEK), which was held in Moscow, Russian Federation on 22 and 23 May, 2003

  8. ITER ITA newsletter No. 30, April-May 2006

    International Nuclear Information System (INIS)

    2006-06-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities including visit of Kaname Ikeda, director general nominee, to Naka; the common message from 6th preparatory meeting for ITER decision making; the eighth ITER preparatory committee and leaders meeting; principal deputy director-general Norbert Holtkamp and recollections of Dr. Michael Roberts on the occasion of his retirement

  9. ITER ITA Newsletter. No. 29, March 2006

    International Nuclear Information System (INIS)

    2006-05-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities and meetings, namely, the ITER Director-General Nominee, Dr. Kaname Ikeda, took up his position as ITER Project Leader in Cadarache on 13 March, the consolidation of information technology infrastructure for ITER and about he Thirty-Fifth Meeting of the Fusion Power Co-ordinating Committee (FPCC), which was held on 28 February-1 March 2006 at the headquarters of the International Energy Agency (IEA) in Paris

  10. ITER ITA newsletter. Special issue - December 2006

    International Nuclear Information System (INIS)

    2006-12-01

    This issue of ITER ITA (ITER transitional arrangements) newsletter contains information about signing ITER Agreement, which took place on 21 November 2006 in Paris, France. It was great day for fusion research as Ministers from the seven ITER Parties in the presence of President Jacques Chirac and President of European Commission Jose Barroso and some 400 invited guests signed the Agreement setting up the ITER International Fusion Energy Organization. This issues contains the speeches, statements and remarks of Presidents and Ministers

  11. External validation of the ITA.LI.CA prognostic system for patients with hepatocellular carcinoma: A multicenter cohort study.

    Science.gov (United States)

    Borzio, Mauro; Dionigi, Elena; Rossini, Angelo; Marignani, Massimo; Sacco, Rodolfo; De Sio, Ilario; Bertolini, Emanuela; Francica, Giampiero; Giacomin, Anna; Parisi, Giancarlo; Vicari, Susanna; Toldi, Anna; Salmi, Andrea; Boccia, Sergio; Mitra, Mario; Fornari, Fabio

    2017-11-22

    Several staging systems for hepatocellular carcinoma (HCC) have been developed. The Barcelona Clinic Liver Cancer staging system is considered the best in predicting survival, although limitations have emerged. Recently, the Italian Liver Cancer (ITA.LI.CA) prognostic system, integrating ITA.LI.CA tumor staging (stages 0, A, B1-3, C) with the Child-Turcotte-Pugh score, Eastern Cooperative Oncology Group performance status, and alpha-fetoprotein with a strong ability to predict survival, was proposed. The aim of our study was to provide an external validation of the ITA.LI.CA system in an independent real-life occidental cohort of HCCs. From September 2008 to April 2016, 1,508 patients with cirrhosis and incident HCC were consecutively enrolled in 27 Italian institutions. Clinical, tumor, and treatment-related variables were collected, and patients were stratified according to scores of the Barcelona Clinic Liver Cancer system, ITA.LI.CA prognostic system, Hong Kong Liver Cancer system, Cancer of the Liver Italian Program, Japanese Integrated System, and model to estimate survival in ambulatory patients with hepatocellular carcinoma. Harrell's C-index, Akaike information criterion, and likelihood-ratio test were used to compare the predictive ability of the different systems. A subgroup analysis for treatment category (curative versus palliative) was performed. Median follow-up was 44 months (interquartile range, 23-63 months), and median overall survival was 34 months (interquartile range, 13-82 months). Median age was 71 years, and patients were mainly male individuals and hepatitis C virus carriers. According to ITA.LI.CA tumor staging, 246 patients were in stage 0, 472 were in stage A, 657 were in stages B1/3, and 133 were in stage C. The ITA.LI.CA prognostic system showed the best discriminatory ability (C-index = 0.77) and monotonicity of gradients compared to other systems, and its superiority was also confirmed after stratification for treatment strategy

  12. ITER ITA newsletter. No. 18, October-November-December 2004

    International Nuclear Information System (INIS)

    2004-12-01

    This issue of ITER ITA (ITER Transitional Arrangements) newsletter contains concise information about ITER related meetings, namely, the fourth preparatory meeting for ITER decision making, which was held at the IAEA Headquarters in Vienna on 9 November 2004 and the 20th IAEA Fusion Energy Conference, which was held on 1-6 November 2004 in Vilamoura, Portugal

  13. ITER ITA newsletter No. 34, November-December 2006

    International Nuclear Information System (INIS)

    2006-12-01

    This issue of ITER ITA (ITER transitional arrangements) newsletter contains concise information about ITER related events such as the 21st IAEA Fusion Energy Conference, which was held in Chengdu, People's Republic of China, on 16-2 October 2006 and an exhibition in recognition of the Agency's support to the ITER Negotiations was organized at the Rotunda of the Vienna International Centre during the week 20-24 November 2006

  14. Foreign monopoly and local disappointment in a small-scale tourism community : The case of Las Peñitas, Nicaragua

    NARCIS (Netherlands)

    Zuidam, Samantha; Roessingh, Carel

    This article describes how small entrepreneurs in the tourism industry of Las Peñitas, Nicaragua, try to cope with contextual changes caused by the development of tourism. The research method for this article is ethnographic. During the fieldwork in Las Peñitas, multi-qualitative research methods

  15. ITER ITA newsletter. No. 23, June 2005

    International Nuclear Information System (INIS)

    2005-06-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related meeting the Eighth Meeting of the ITPA Topical Group (TG) on Diagnostics was held at the Culham Science Centre, UKAEA, from 14-18 March 2005 and the Third International Atomic Energy Agency - Technical Meeting (TM) on Electron Cyclotron Resonance Heating (ECRH) in ITER, following those in Oharai, Japan in 1999, and in Kloster Seeon, Germany in 2003, was held in Como, Italy, from May 2 to May 5, 2005, in a two-and-half day intense workshop

  16. Ekspert : Bushi aastakõne näitas presidendi nõrkust / Neeme Raud

    Index Scriptorium Estoniae

    Raud, Neeme, 1969-

    2006-01-01

    USA mõjuka valitsusvälise välissuhete nõukogu asepresidendi James Lindsay hinnangul näitas USA presidendi George W. Bushi 31. jaanuaril peetud aastakõne olukorrast riigis presidendi nõrkust sise- ja välispoliitilistes küsimustes

  17. ITER ITA newsletter. No. 25, August-September-October 2005

    International Nuclear Information System (INIS)

    2005-12-01

    This issue of the ITER ITA (ITER transitional arrangements) newsletter contains concise information about two ITER related meetings including the tenth ITER Negotiations and related meetings held in the period 7-12 September 2005 at Cadarache, France, the ITER Divertor meeting, which was held in Genova, Italy on 26-28 October 2005, and information about the forty-ninth regular session of IAEA General Conference and eighth Scientific Forum, 26-30 September 2005, Vienna, Austria

  18. Strelovodna zaščita za stanovanjski objekt

    OpenAIRE

    Kunšek, Rok

    2014-01-01

    V diplomskem delu je opisana zaščita stanovanjskega objekta pred udarom strele. Obravnavano je projektiranje, načrtovanje, izračun rizika in meritve. Podani so predlogi izvedbe strelovodne zaščite za stanovanjski objekt, ki so izdelani in izračunani z upoštevanjem najnovejših standardov s področja zaščite pred delovanjem strele. Za dodatno pomoč pri izdelavi lovilnega sistema je uporabljeno programsko orodje Ščit, ki je namenjeno projektiranju in dimenzioniranju strelovodne zaščite....

  19. Mida täiskasvanute oskuste uuring meile näitas? / Aune Valk, Vivika Halapuu

    Index Scriptorium Estoniae

    Valk, Aune, 1972-

    2013-01-01

    Avalikustati rahvusvahelise täiskasvanute oskuste uuringu PIAAC tulemused, mis näitas meie 16-65-aastaste inimeste peamiste infotöötlusoskuste taset nii riigi sees kui ka võrdluses teiste riikidega

  20. ZAŠČITA IN VARNOST INFORMACIJSKEGA SISTEMA V HOTELU

    OpenAIRE

    Mavrin, Marko

    2016-01-01

    Razvoj informacijsko-komunikacijskih tehnologij (IKT) skozi zadnja leta v hotelskih podjetjih kaže na številne pridobitve in priložnosti za izboljšanje poslovanja ter pridobivanja konkurenčne prednosti. Vsaka noviteta s seboj prinese tudi nova varnostna tveganja in nevarnosti, na katere mora biti podjetje pripravljeno. Ker so za uspešno delovanje podjetja pomembni podatki, predvsem pa obdelava podatkov, je ključno, da ne pride do razkritja podatkov tretji osebi. Varovanje in zaščita podatkov ...

  1. ITER ITA newsletter No. 31, June 2006

    International Nuclear Information System (INIS)

    2006-07-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about initialling the ITER Agreement and its related instruments by seven ITER parties, which too place in Brussels on 24 May 2006. The initialling constituted the final act of the ITER negotiations. It confirmed the Parties' common acceptance of the negotiated texts, ad referendum, and signalled their intentions to move forward towards the entry into force of the ITER Agreement as soon as possible. 'ITER - Uniting science today, global energy tomorrow' was the theme of a number of media events timed to accompany a remarkable day in the history of the ITER international venture, May 24th 2006, initialling of the ITER international agreement

  2. Ajatu Ita Ever pühendab end jäägitult teatrile / Rein Veidemann

    Index Scriptorium Estoniae

    Veidemann, Rein, 1946-

    2006-01-01

    Näitleja Ita Everi 75. sünnipäeva puhul. Arvamust tema kohta avaldavad ka näitlejad Aleksander Eelmaa, Rasmus Kaljujärv, Tiit Sukk, teatrikunstnikud Ene-Liis Semper ja Aime Unt, teatrinõunik Tõnu Lensment

  3. Calculating seismic of slabs ITA NNP Garona

    International Nuclear Information System (INIS)

    Ezeberry, J. I.; Guerrero, A.; Gamarra, J.; Beltran, F.

    2014-01-01

    This article describes the methodology that Idom has employed to perform the seismic evaluation of slabs within the ITA project of the NPP Santa Maria de Garona. Seismic calculations that have been conducted include consideration of the effects of the interaction of soil structure as well as the possible take-off containers with respect to slab during the earthquake. Therefore, the main contribution of the work is the study of the coupling of rolling containers with the flexibility of the whole ground-slab For calculations has been used ABAQUS/Explicit program, allowing to solve effectively the nonlinearities listed above using explicit integration algorithms over time. The results of the calculations reflect the importance of jointly analyse the seismic responses of slab and containers. (Author)

  4. Educational impact of in-training assessment (ITA) in postgraduate medical education

    DEFF Research Database (Denmark)

    Ringsted, C; Henriksen, A H; Skaarup, A M

    2004-01-01

    was organised, how the individual assessments were administered, and what perceived benefits or barriers the users had experienced. Secondly, we wanted to explore what perceived impact the introduction af ITA had on the educational process: what was the effect on training, teaching and learning, and what...... benefits and barriers the users believed themselves to have experienced. Finally we wanted to investigate the users' attitudes towards the concept of assessment....

  5. Validating TOEFL[R] iBT Speaking and Setting Score Requirements for ITA Screening

    Science.gov (United States)

    Xi, Xiaoming

    2007-01-01

    Although the primary use of the speaking section of the Test of English as a Foreign Language Internet-based test (TOEFL[R] iBT Speaking) is to inform admissions decisions at English medium universities, it may also be useful as an initial screening measure for international teaching assistants (ITAs). This study provides criterion-related…

  6. Investigating the Criterion-Related Validity of the TOEFL® Speaking Scores for ITA Screening and Setting Standards for ITAS. TOEFL iBT Research Report. TOEFL iBT-03. ETS RR-08-02

    Science.gov (United States)

    Xi, Xiaoming

    2008-01-01

    Although the primary use of the speaking section of the Test of English as a Foreign Language™ Internet-based test (TOEFL® iBT Speaking test) is to inform admissions decisions at English medium universities, it may also be useful as an initial screening measure for international teaching assistants (ITAs). This study provides criterion-related…

  7. ITER ITA Newsletter. No. 28, February 2006

    International Nuclear Information System (INIS)

    2006-03-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities and meetings, namely, the first staff arrival at the Cadarache Joint Work Site (JWS) and IAEA activities in 2005 in support of fusion and ITER. On 30 January 2006 the first staff began working at JWS. Among the first arrivals are members of the Safety, Environment and Health Group, who are charged to prepare the necessary license applications in close cooperation with the host. Other arrivals include members of the Nuclear Technology Division and Site Buildings and Assembly Group charged with the preparations for initial construction work. A branch of the Configuration Management Group, Design Integration Division, has also been installed at Cadarache. The acting Head of the JWS is Eisuke Tada who was previously acting Head at Naka, where Neil Mitchell has taken over the position

  8. ITER ITA newsletter No. 32, July 2006

    International Nuclear Information System (INIS)

    2006-07-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about ITER related activities. The ITER Parties, at their Ministerial Meeting in May 2006 in Brussels, initialled the draft text of the prospective Agreement on the Establishment of the ITER International Fusion Energy Organization for the Joint Implementation of the ITER Project as well as the draft text of the Agreement on the Privileges and Immunities of the ITER International Fusion Energy Organisation for the Joint Implementation of the ITER Project. The Parties have requested that the IAEA Director General serve as Depositary of the two aforementioned Agreements and that the IAEA establish a Trust Fund to Support Common Expenditures under the ITER Transitional Arrangements, pending entry into force of the prospective Agreement on the Establishment of the ITER International Fusion Energy Organization for the Joint Implementation of the ITER Project. At its June Meeting in Vienna, the IAEA Board of Governors approved these requests. There is also information about the Tenth Meeting of the International Tokamak Physics Activity (ITPA) Topical Group (TG) on Diagnostics was held at the Kurchatov Institute, Moscow, from 10-14 April 2006

  9. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  10. A detailed description of the analysis of the decay of neutral kaons to $\\pi^+ \\pi^-$ in the CPLEAR experiment

    CERN Document Server

    Apostolakis, Alcibiades J; Backenstoss, Gerhard; Bargassa, P; Behnke, O; Benelli, A; Bertin, V; Blanc, F; Bloch, P; Carlson, P J; Carroll, M; Cawley, E; Chertok, M B; Danielsson, M; Dejardin, M; Derré, J; Ealet, A; Eleftheriadis, C; Fetscher, W; Fidecaro, Maria; Filipcic, A; Francis, D; Fry, J; Gabathuler, Erwin; Gamet, R; Gerber, H J; Go, A; Haselden, A; Hayman, P J; Henry-Coüannier, F; Hollander, R W; Jon-And, K; Kettle, P R; Kokkas, P; Kreuger, R; Le Gac, R; Leimgruber, F; Mandic, I; Manthos, N; Marel, Gérard; Mikuz, M; Miller, J; Montanet, François; Müller, A; Nakada, Tatsuya; Pagels, B; Papadopoulos, I M; Pavlopoulos, P; Polivka, G; Rickenbach, R; Roberts, B L; Ruf, T; Sakelliou, L; Schäfer, M; Schaller, L A; Schietinger, T; Schopper, A; Tauscher, Ludwig; Thibault, C; Touchard, F; Touramanis, C; van Eijk, C W E; Vlachos, S; Weber, P; Wigger, O; Wolter, M; Yéche, C; Zavrtanik, D; Zimmerman, D

    2000-01-01

    A detailed description is given of the analysis of neutral kaons decaying to \\pipi , based on the complete data sample collected with the CPLEAR experiment.Using a novel approach involving initially strangeness-tagged \\kn\\ and \\knb ,the time-dependent decay rate asymmetry has been measured. This asymmetry, resulting from the interference between the \\ks\\and \\kl\\ decay amplitudes, has enabled both the magnitudeand phase of the CP-violation parameter, \\ita , to be measured, with aprecision comparable to that of the current world average values.

  11. SPI Trend Analysis of New Zealand Applying the ITA Technique

    Directory of Open Access Journals (Sweden)

    Tommaso Caloiero

    2018-03-01

    Full Text Available A natural temporary imbalance of water availability, consisting of persistent lower-than-average or higher-than-average precipitation, can cause extreme dry and wet conditions that adversely impact agricultural yields, water resources, infrastructure, and human systems. In this study, dry and wet periods in New Zealand were expressed using the Standardized Precipitation Index (SPI. First, both the short term (3 and 6 months and the long term (12 and 24 months SPI were estimated, and then, possible trends in the SPI values were detected by means of a new graphical technique, the Innovative Trend Analysis (ITA, which allows the trend identification of the low, medium, and high values of a series. Results show that, in every area currently subject to drought, an increase in this phenomenon can be expected. Specifically, the results of this paper highlight that agricultural regions on the eastern side of the South Island, as well as the north-eastern regions of the North Island, are the most consistently vulnerable areas. In fact, in these regions, the trend analysis mainly showed a general reduction in all the values of the SPI: that is, a tendency toward heavier droughts and weaker wet periods.

  12. Use of a Generic Identification Scheme Connecting Events and Detector Description in the ATLAS Experiment

    CERN Document Server

    Arnault, C.

    2003-01-01

    High energy physics detectors can be described hierarchically from the different subsystems to their divisions in r, phi, theta and to the individual readout channels. An identification schema that follows the logical decomposition of the ATLAS detector has been introduced allowing identification of individual readout channels as well as other parts of the detector, in particular detector elements. These identifiers provide a sort of ?glue? allowing, for example, the connection of raw event data to their detector description for position calculation or alignment corrections, as well as fast access to subsets of the event data for event trigger selection. There are two important requirements on the software to support such an identification scheme. First is the possibility to formally specify these identifiers in terms of their structure and allowed values. And second is to generate different forms of the identifiers optimised in terms of access efficiency to information content, compactness or search key effi...

  13. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  14. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  15. Estudio de los impactos socioculturales de la actividad turística y su incidencia sobre la comuna montañita

    OpenAIRE

    Coronel A., Lidice; Marquez A., Maria De Los Angeles; Ricaurte Quijano, Carla

    2009-01-01

    Se dice que el turismo es el futuro y que puede sacar adelante a un país, aclaración cierta, ya que el turismo tiene una gran capacidad de generar empleos o ingresos. Montañita se ha convertido en lugar de residencia para muchos turistas extranjeros que han sido cautivados por sus playas y paisajes, entre ellos jóvenes surfistas. Algunos de ellos han montando negocios como hoteles y restaurantes de estilo rústico principalmente en el centro del pueblo. Hoy en día el público predominante qu...

  16. Development and validation of the insulin treatment appraisal scale (ITAS) in patients with type 2 diabetes

    DEFF Research Database (Denmark)

    Snoek, Frank J; Skovlund, Søren E; Pouwer, Frans

    2007-01-01

    . Exploratory factor analysis (EFA), internal consistency (Cronbach's alpha) and item-total correlations were determined to test the reliability of the instrument. Concurrent validity was examined by calculating Pearson correlation coefficients between the different measures. Discriminant validity was examined...... 20-item scale was 0.89, suggesting high homogeneity and allowing for calculation of an overall score. Item-total correlations were in the range of 0.46-0.74 for the negative and 0.34 - 0.53 for the positive appraisal scale. The item pertaining to weight gain, as part of the negative appraisal...... subscale, showed low communality and deserves further testing. Concurrent validity was confirmed with low to moderate correlations in the expected direction between ITAS and WHO-5 and PAID. Discriminant validity was confirmed by the fact that patients using insulin had significantly less negative...

  17. The first 100 Mw Brazil - Argentina interconnection. The design of the 500/525 Kv Rincon de Santa Maria-Garabi-Ita power transmission line; Primeira interconexao 1000 MW Brasil-Argentina. Projeto da LT 500/525 kV Rincon de Santa Maria-Garabi-Ita

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Joao Batista Guimaraes Ferreira da; Guimaraes, Rogerio Peixoto; Menezes, Luciene Oliveira; Amaro, Rania Carla Peixoto [ABB, Belo Horizonte, MG (Brazil)]. E-mail: joao-batista.ferreira@br.abb.com; Silva, Vilson Renato da [Engelineas Consultoria e Projetos Ltda., Porto Alegre, RS (Brazil); Menezes, Ruy Carlos Ramos de [Rio Grande do Sul Univ., Porto Alegre, RS (Brazil); Nolasco, Joao Felix [JFNolasco Consultoria Ltda., Belo Horizonte, MG (Brazil); Bugallo, Francisco [Companhia de Interconexao Energetica (CIEN), Rio de Janeiro, RJ (Brazil)

    2001-07-01

    This document reports the main design aspects and also displays how the implantation challenges had been overcome in relation to the Brazil-Argentina energetic first interconnection, through the frequency converter station in Garabi and the 500 Kv / 50 Hz Rincon de Santa Maria-Garabi transmission line and 500 Kv / 60 Hz Garabi-Ita transmission line, resulting in a total of 490 Kilometers. Firstly, it is presented the basic design characteristics involving the drawing definitions and electrical parameters determination. Afterwards, are presented the transmission line mechanical aspects, as well as the main obtained results. Finally, the project technical viability and the reached benefits had been discussed as well.

  18. Correlation between LDH levels and response to sorafenib in HCC patients: an analysis of the ITA.LI.CA database.

    Science.gov (United States)

    Sacco, Rodolfo; Mismas, Valeria; Granito, Alessandro; Musettini, Gianna; Masi, Gianluca; Caparello, Chiara; Vivaldi, Caterina; Felder, Martina; Bresci, Giampaolo; Fornaro, Lorenzo

    2015-02-24

    Lactate dehydrogenase (LDH) is a predictor of clinical outcome in hepatocellular carcinoma (HCC) patients. However, its predictive role in the clinical outcomes of sorafenib treatment has been poorly documented. The correlation between LDH levels and clinical outcomes in HCC patients treated with sorafenib and included in the nationwide Italian database ITA.LI.CA was investigated here. The ITA.LI.CA database contains data for 5,136 HCC patients. All patients treated with sorafenib treatment and with available LDH values were considered. Overall survival (OS) and time to progression (TTP) were compared in patients with LDH levels above and below a defined threshold, determined through an ROC analysis. An explorative analysis investigated the relationship between the variation of LDH levels during treatment and response to sorafenib. Baseline LDH levels were available for 97 patients. The most accurate cutoff value for LDH concentration was 297 U/L. Patients with LDH values above (n=45) and below (n=52) this threshold showed equal OS (12.0 months) and TTP (4.0 months) values. Data on LDH levels during sorafenib treatment were reported for 10 patients. LDH values decreased in 3 patients (mean difference = -219 U/L) who also reported a prolonged OS and TTP versus those with unmodified/increased LDH (OS: NE (not evaluated) vs. 8.0 months, p=0.0083; TTP: 19.0 vs. 3.0 months, p=0.008). The clinical benefits of sorafenib do not seem to be influenced by baseline LDH. According to the results of an explorative analysis, however, a decreased LDH concentration during sorafenib might be associated with improved clinical outcomes.

  19. THULE: A detailed description

    International Nuclear Information System (INIS)

    Terry, M.J.

    1964-07-01

    This report describes the THULE scheme of lattice physics calculation which has been developed in FORTRAN for the IBM 7090. This scheme predicts the neutron flux over energy and space, for many groups and regions, together with reactivity and reaction rate edits for both a single lattice cell and a reactor core. This report describes in detail the input requirements for the THULE programme which forms the main part of the scheme. Brief descriptions of the 7090 programmes TED 6 and NOAH are included as appendices. TED 6 will produce the THULE edits from a WDSN output tape and NOAH is a version of the METHUSELAH programme which contains many of the THULE edits and will also produce input cards for THULE. (author)

  20. Harmonic generation with multiple wiggler schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  1. AUS - the Australian modular scheme for reactor neutronics computations

    International Nuclear Information System (INIS)

    Robinson, G.S.

    1975-12-01

    A general description is given of the AUS modular scheme for reactor neutronics calculations. The scheme currently includes modules which provide the capacity for lattice calculations, 1D transport calculations, 1 and 2D diffusion calculations (with feedback-free kinetics), and burnup calculations. Details are provided of all system aspects of AUS, but individual modules are only outlined. A complete specification is given of that part of user input which controls the calculation sequence. The report also provides sufficient details of the supervisor program and of the interface data sets to enable additional modules to be incorporated in the scheme. (author)

  2. Fauna de abelhas nativas de duas áreas de restinga do Parque Estadual de Itaúnas, Espírito Santo, Brasil.

    OpenAIRE

    RECEPUTI, A. L. M.

    2015-01-01

    Dois estudos foram realizados nesta dissertação: uma avaliação da riqueza, diversidade e composição da fauna de abelhas nativas de uma área de restinga herbáceo-arbustiva e de uma área de restinga florestal do Parque Estadual de Itaúnas, Espírito Santo, Brasil, e uma avaliação da riqueza, diversidade e composição da fauna de Euglossina das duas mesmas áreas. Em ambos os casos objetivou-se responder a duas perguntas diretamente relacionadas, 1) a composição, riqueza e diversidade da fauna de a...

  3. On reciprocal Baecklund transformations of inverse scattering schemes

    International Nuclear Information System (INIS)

    Rogers, C.; Wong, P.

    1984-01-01

    The notion of reciprocally related inverse scattering schemes is introduced and is shown to be a key component in the link between the AKNS and WKI schemes. Reciprocal auto-Baecklund transformations are represented both for a generalised Harry-Dym equation and an equation descriptive of nonlinear oscillation of elastic beams. Further, the N-loop soliton solution of the KIW equation is generated in a convenient parametric form via reciprocal Baecklund transformations. Finally, an important reduction to canonical spectral form is shown to be a reciprocal transformation. (Auth.)

  4. 33 CFR 167.1703 - In Prince William Sound: Valdez Arm Traffic Separation Scheme.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false In Prince William Sound: Valdez Arm Traffic Separation Scheme. 167.1703 Section 167.1703 Navigation and Navigable Waters COAST GUARD... Description of Traffic Separation Schemes and Precautionary Areas Pacific West Coast § 167.1703 In Prince...

  5. Strong renormalization scheme dependence in τ-lepton decay: Fact or fiction?

    International Nuclear Information System (INIS)

    Chyla, J.

    1995-01-01

    The question of the renormalization scheme dependence of the τ semileptonic decay rate is examined in response to a recent criticism. Particular attention is payed to a distinction between a consistent quantitative description of this dependence and the actual selection of a subset of ''acceptable'' renormalization schemes. It is pointed out that this criticism is valid only within a particular definition of the ''strength'' of the renormalization scheme dependence and should not discourage further attempts to use the semileptonic τ decay rate for quantitative tests of perturbative QCD

  6. Strong-coupling constant at three loops in momentum subtraction scheme

    International Nuclear Information System (INIS)

    Chetyrkin, K.G.; Russian Academy of Sciences, Moscow; Kniehl, B.A.; Steinhauser, M.

    2008-12-01

    In this paper we compute the three-loop corrections to the β function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large momenta. Special emphasis is devoted to the relation between the coupling constant in the MOM and MS schemes as well as their ability to describe the phenomenon of decoupling. It is demonstrated by an explicit comparison that the MS scheme can be consistently used to relate the values of the MOM-scheme strong-coupling constant in the energy regions higher and lower than the massive-quark production threshold. This procedure obviates the necessity to know the full mass dependence of the MOM β function and clearly demonstrates the equivalence of both schemes for the description of physics outside the threshold region. (orig.)

  7. Strong-coupling constant at three loops in momentum subtraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Chetyrkin, K.G. [Karlsruhe Univ. (T.H.), Karlsruhe Inst. of Technology (KIT) (Germany). Inst. fuer Theoretische Teilchenphysik]|[Russian Academy of Sciences, Moscow (Russian Federation). Inst. for Nuclear Research; Kniehl, B.A. [Hamburg Univ. (Germany). II. Inst. fuer Theoretische Physik; Steinhauser, M. [Karlsruhe Univ. (T.H.), Karlsruhe Inst. of Technology (KIT) (Germany). Inst. fuer Theoretische Teilchenphysik

    2008-12-15

    In this paper we compute the three-loop corrections to the {beta} function in a momentum subtraction (MOM) scheme with a massive quark. The calculation is performed in the background field formalism applying asymptotic expansions for small and large momenta. Special emphasis is devoted to the relation between the coupling constant in the MOM and MS schemes as well as their ability to describe the phenomenon of decoupling. It is demonstrated by an explicit comparison that the MS scheme can be consistently used to relate the values of the MOM-scheme strong-coupling constant in the energy regions higher and lower than the massive-quark production threshold. This procedure obviates the necessity to know the full mass dependence of the MOM {beta} function and clearly demonstrates the equivalence of both schemes for the description of physics outside the threshold region. (orig.)

  8. Low-Complexity Multiple Description Coding of Video Based on 3D Block Transforms

    Directory of Open Access Journals (Sweden)

    Andrey Norkin

    2007-02-01

    Full Text Available The paper presents a multiple description (MD video coder based on three-dimensional (3D transforms. Two balanced descriptions are created from a video sequence. In the encoder, video sequence is represented in a form of coarse sequence approximation (shaper included in both descriptions and residual sequence (details which is split between two descriptions. The shaper is obtained by block-wise pruned 3D-DCT. The residual sequence is coded by 3D-DCT or hybrid, LOT+DCT, 3D-transform. The coding scheme is targeted to mobile devices. It has low computational complexity and improved robustness of transmission over unreliable networks. The coder is able to work at very low redundancies. The coding scheme is simple, yet it outperforms some MD coders based on motion-compensated prediction, especially in the low-redundancy region. The margin is up to 3 dB for reconstruction from one description.

  9. Overview and Example Test Results of Modern Pilot Schemes for Coordination of Line Distance Protection Relays

    OpenAIRE

    Emil Bartosiewicz; Ryszard Kowalik; Marcin Januszewski

    2014-01-01

    The paper presents a short review of pilot schemes which are available in modern line distance protection relays, and example results of common pilot scheme tests with the testing methods description. Some differences in implementations of selected pilot schemes have been shown for comparison reasons. Distance protection coordination functions have been tested for GE Multilin UR series devices. Every type of available pilot scheme has been checked in synthetic tests and during the real ...

  10. Calculating seismic of slabs ITA NNP Garona; Calculo sismico de las losas del ATI de C.N. Santa maria de Garona

    Energy Technology Data Exchange (ETDEWEB)

    Ezeberry, J. I.; Guerrero, A.; Gamarra, J.; Beltran, F.

    2014-07-01

    This article describes the methodology that Idom has employed to perform the seismic evaluation of slabs within the ITA project of the NPP Santa Maria de Garona. Seismic calculations that have been conducted include consideration of the effects of the interaction of soil structure as well as the possible take-off containers with respect to slab during the earthquake. Therefore, the main contribution of the work is the study of the coupling of rolling containers with the flexibility of the whole ground-slab For calculations has been used ABAQUS/Explicit program, allowing to solve effectively the nonlinearities listed above using explicit integration algorithms over time. The results of the calculations reflect the importance of jointly analyse the seismic responses of slab and containers. (Author)

  11. Analysis of Students Industrial Work Experience Scheme (SIWES) in ...

    African Journals Online (AJOL)

    The study examined Student's Industrial Work Experience Scheme carried out in NIFFR visa-a-vise the challenge of skilled manpower development for fishery extension. Secondary data collected from NIFFR library and report of 2007 SIWES period was analysed descriptively. Out of 617 students from 36 schools that visited ...

  12. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  13. Quantitative schemes in energy dispersive X-ray fluorescence implemented in AXIL

    International Nuclear Information System (INIS)

    Tchantchane, A.; Benamar, M.A.; Tobbeche, S.

    1995-01-01

    E.D.X.R.F (Energy Dispersive X-ray Fluorescence) has long been used for quantitative analysis of many types of samples including environment samples. the software package AXIL (Analysis of x-ray spectra by iterative least quares) is extensively used for the spectra analysis and the quantification of x-ray spectra. It includes several methods of quantitative schemes for evaluating element concentrations. We present the general theory behind each scheme implemented into the software package. The spectra of the performance of each of these quantitative schemes. We have also investigated their performance relative to the uncertainties in the experimental parameters and sample description

  14. Developing and supporting coordinators of structured mentoring schemes in South Africa

    Directory of Open Access Journals (Sweden)

    Penny Abbott

    2010-10-01

    Research purpose: The aim of this research is to discover what the characteristics of coordinators of structured mentoring schemes in South Africa are, what is required of such coordinators and how they feel about their role, with a view to improving development and support for them. Motivation for the study: The limited amount of information about role requirements for coordinators which is available in the literature is not based on empirical research. This study aims to supply the empirical basis for improved development and support for coordinators. Research design and method: A purposive sample of 25 schemes was identified and both quantitative and qualitative data, obtained through questionnaires and interviews, were analysed using descriptive statistics and thematic analysis. Main findings: Functions of coordinators tend to be similar across different types of mentoring schemes. A passion for mentoring is important, as the role involves many frustrations. There is little formalised development and support for coordinators. Practical/managerial implications: The study clarifies the functions of the coordinator, offers a job description and profile and makes suggestions on how to improve the development of the coordinator’s skills. Contribution/value-add: An understanding of what is required from a coordinator, how the necessary knowledge and skills can be developed and how the coordinator can be supported,adds value to an organisation setting up or reviewing its structured mentoring schemes.

  15. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  16. Relativistic description of atomic nuclei

    International Nuclear Information System (INIS)

    Krutov, V.A.

    1985-01-01

    Papers on the relativistic description of nuclei are reviewed. The Brown and Rho ''small'' bag'' model is accepted for hardrons. Meson exchange potentials of the nucleon-nucleon interaction have been considered. Then the transition from a system of two interacting nucleons has been performed to the relativistic nucleus description as a multinucleon system on the basis of OBEP (one-boson exchange potential). The proboem of OPEP (one-pion-exchange potential) inclusion to a relativistic scheme is discussed. Simplicity of calculations and attractiveness of the Walecka model for specific computations and calculations was noted. The relativistic model of nucleons interacting through ''effective'' scalar and vector boson fields was used in the Walacka model for describing neutronaand nuclear mater matters

  17. Useful woody species and its environmental availability: the case of artisanal fishermen in Itaúnas, Brazil

    Directory of Open Access Journals (Sweden)

    Lucas Costa Monteiro Lopes

    2017-06-01

    Full Text Available Ethnobotanical studies involve research with human societies and their different interaction with plants, and the quantitative approaches from thes estudies are important to select conservation priority of species in natural environment. This research aims to quantify use-values for woody plants mentioned by fishers in Itaúnas, state of Espírito Santo, and evaluate the relationship between use-values and species availability (absolute density and frequency, and importance value in two distinct resting vegetation formations. It also proposes to identify priority species for conservation. It was selected 30 species cited in individual semi-structured interviews with key-informant in fishers’ community and who were also on list of structural survey of two vegetation phytophysiognomies in the restinga regions. The data used was collected in previously published work. It was performed a correlation analysis between use-values and structural parameters of the mentioned woody species. Protium heptaphyllum, P. icicariba and Byrsonima sericea present the highest use-values. It was not observed relation between use-value and species availability in each vegetation formation. It was classified two and eight species as priority for conservation on shrubby and forest formations, respectively.

  18. Telidon Videotex presentation level protocol: Augmented picture description instructions

    Science.gov (United States)

    Obrien, C. D.; Brown, H. G.; Smirle, J. C.; Lum, Y. F.; Kukulka, J. Z.; Kwan, A.

    1982-02-01

    The Telidon Videotex system is a method by which graphic and textual information and transactional services can be accessed from information sources by the general public. In order to transmit information to a Telidon terminal at a minimum bandwidth, and in a manner independent of the type of communications channel, a coding scheme was devised which permits the encoding of a picture into the geometric drawing elements which compose it. These picture description instructions are an alpha geometric coding model and are based on the primitives of POINT, LINE, ARC, RECTANGLE, POLYGON, and INCREMENT. Text is encoded as (ASCII) characters along with a supplementary table of accents and special characters. A mosaic shape table is included for compatibility. A detailed specification of the coding scheme and a description of the principles which make it independent of communications channel and display hardware are provided.

  19. Advanced neural network-based computational schemes for robust fault diagnosis

    CERN Document Server

    Mrugalski, Marcin

    2014-01-01

    The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for designing robust fault diagnosis schemes for non-linear dynamic systems. A part of the book focuses on fundamental issues such as architectures of dynamic neural networks, methods for designing of neural networks and fault diagnosis schemes as well as the importance of robustness. The book is of a tutorial value and can be perceived as a good starting point for the new-comers to this field. The book is also devoted to advanced schemes of description of neural model uncertainty. In particular, the methods of computation of neural networks uncertainty with robust parameter estimation are presented. Moreover, a novel approach for system identification with the state-space GMDH neural network is delivered. All the concepts described in this book are illustrated by both simple academic illustrative examples and practica...

  20. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  1. Overview and Example Test Results of Modern Pilot Schemes for Coordination of Line Distance Protection Relays

    Directory of Open Access Journals (Sweden)

    Emil Bartosiewicz

    2014-03-01

    Full Text Available The paper presents a short review of pilot schemes which are available in modern line distance protection relays, and example results of common pilot scheme tests with the testing methods description. Some differences in implementations of selected pilot schemes have been shown for comparison reasons. Distance protection coordination functions have been tested for GE Multilin UR series devices. Every type of available pilot scheme has been checked in synthetic tests and during the real coordination between D60 and D90Plus devices. For the POTT scheme, coordination between two L90 protections has been carried out by a sort of available different data communication link types, for comparison reasons too.

  2. Representações sociais de saúde bucal entre mães no meio rural de Itaúna (MG, 2002 A social representation study of oral health among mothers in rural areas, Itaúna (MG, 2002

    Directory of Open Access Journals (Sweden)

    Mauro Henrique Nogueira Guimarães de Abreu

    2005-03-01

    Full Text Available Análise das representações sociais sobre o processo saúde-doença bucal entre 29 mães de escolares residentes no meio rural de Itaúna, em 2002. As entrevistas semi-estruturadas foram transcritas e a análise de conteúdo foi desenvolvida. A análise mostra que as representações sociais sobre saúde-doença estão vinculadas à alimentação e utilização de serviços médicos. Em relação ao processo saúde-doença bucal, identifica-se um discurso associado às normas odontológicas de higiene e dieta. A cárie dentária é vista como uma experiência inevitável, mas a perda dentária, não. Apesar de as condições materiais de vida no meio rural dificultarem a adoção de práticas consideradas favoráveis à saúde bucal, essas mulheres são cobradas em relação ao trabalho de cuidar dos filhos. Essa vivência contraditória causa sentimentos negativos (culpa e, como conseqüência, queda na qualidade de vida nessa população. Na realidade de vida das entrevistadas, verifica-se que, apesar de as mesmas apresentarem informações sobre o cuidado bucal e desejarem "cuidar dos filhos direito", uma complexa rede de fatores sociais, econômicos, culturais etc., não favorece a promoção de saúde. O planejamento das ações de saúde bucal coletiva deveria levar em consideração não somente dados epidemiológicos quantitativos, mas também as representações sociais sobre saúde bucal.The study evaluated social representation on oral health-illness process between 29 scholarship's mothers in rural areas from Itaúna, in 2002. Semi-structured interviews were transcripted and content analysis was developed. The results have showed that social representation of health-illness was associated with food intake and medical service utilization. Discourse on oral health-illness process was related to dental hygiene and diet rules. Dental caries were an inevitable experience, but tooth loss was not. Despite material conditions of life in

  3. Study of some approximation schemes in the spin-boson problem

    International Nuclear Information System (INIS)

    Kenkre, V.M.; Giuggioli, L.

    2004-01-01

    Some approximation schemes used in the description of the evolution of the spin-boson system are studied through numerical and analytic methods. Among the procedures investigated are semiclassical approximations and the memory function approach. An infinitely large number of semiclassical approximations are discussed. Their two extreme limits are shown to be characterized, respectively, by effective energy mismatch and effective intersite transfer. The validity of the two limits is explored by explicit numerical calculations for important regions in parameter space, and it is shown that they can provide good descriptions in the so-called adiabatic and anti-adiabatic regimes, respectively. The memory function approach, which provides an excellent approximation scheme for a certain range of parameters, is shown to be connected to other approaches such as the non-interacting blip approximation. New results are derived from the memory approach in semiclassical contexts. Comments are made on thermal effects in the spin-boson problem, the discrete non-linear Schroedinger equation, and connections to the areas of dynamic localization, and quantum control

  4. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  5. Practical Design of Delta-Sigma Multiple Description Audio Coding

    DEFF Research Database (Denmark)

    Leegaard, Jack Højholt; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    It was recently shown that delta-sigma quantization (DSQ) can be used for optimal multiple description (MD) coding of Gaussian sources. The DSQ scheme combined oversampling, prediction, and noise-shaping in order to trade off side distortion for central distortion in MD coding. It was shown that ...

  6. Development of a novel fast frequency modulation scheme for the JET multi-channel reflectometer

    International Nuclear Information System (INIS)

    Deliyanakis, N.

    1999-10-01

    A novel frequency modulation scheme has been developed for the multi-channel reflectometer used to measure density profiles and density fluctuations on the JET tokamak. This reflectometer normally uses slow frequency sweeping, combined with fixed-frequency operation, to measure the group delay, as well as plasma fluctuations, at 10 different microwave frequencies. The novel scheme uses continuous frequency modulation on a time-scale much faster than that of plasma fluctuations, the main aim being to make the group delay measurement more robust against plasma fluctuations. This paper discusses the theoretical background of the scheme, gives a detailed description of the system, and presents results from plasma measurements. (author)

  7. A mass-flux cumulus parameterization scheme for large-scale models: description and test with observations

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Tongwen [China Meteorological Administration (CMA), National Climate Center (Beijing Climate Center), Beijing (China)

    2012-02-15

    A simple mass-flux cumulus parameterization scheme suitable for large-scale atmospheric models is presented. The scheme is based on a bulk-cloud approach and has the following properties: (1) Deep convection is launched at the level of maximum moist static energy above the top of the boundary layer. It is triggered if there is positive convective available potential energy (CAPE) and relative humidity of the air at the lifting level of convection cloud is greater than 75%; (2) Convective updrafts for mass, dry static energy, moisture, cloud liquid water and momentum are parameterized by a one-dimensional entrainment/detrainment bulk-cloud model. The lateral entrainment of the environmental air into the unstable ascending parcel before it rises to the lifting condensation level is considered. The entrainment/detrainment amount for the updraft cloud parcel is separately determined according to the increase/decrease of updraft parcel mass with altitude, and the mass change for the adiabatic ascent cloud parcel with altitude is derived from a total energy conservation equation of the whole adiabatic system in which involves the updraft cloud parcel and the environment; (3) The convective downdraft is assumed saturated and originated from the level of minimum environmental saturated equivalent potential temperature within the updraft cloud; (4) The mass flux at the base of convective cloud is determined by a closure scheme suggested by Zhang (J Geophys Res 107(D14)), in which the increase/decrease of CAPE due to changes of the thermodynamic states in the free troposphere resulting from convection approximately balances the decrease/increase resulting from large-scale processes. Evaluation of the proposed convection scheme is performed by using a single column model (SCM) forced by the Atmospheric Radiation Measurement Program's (ARM) summer 1995 and 1997 Intensive Observing Period (IOP) observations, and field observations from the Global Atmospheric Research

  8. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  9. A Description Logic Based Knowledge Representation Model for Concept Understanding

    DEFF Research Database (Denmark)

    Badie, Farshad

    2017-01-01

    This research employs Description Logics in order to focus on logical description and analysis of the phenomenon of ‘concept understanding’. The article will deal with a formal-semantic model for figuring out the underlying logical assumptions of ‘concept understanding’ in knowledge representation...... systems. In other words, it attempts to describe a theoretical model for concept understanding and to reflect the phenomenon of ‘concept understanding’ in terminological knowledge representation systems. Finally, it will design an ontology that schemes the structure of concept understanding based...

  10. Design and operation of an interlaboratory comparison scheme

    International Nuclear Information System (INIS)

    Voiculescu, R. M.; Olteanu, M. C.; Nistor, V. M.

    2013-01-01

    The competence of laboratories is assessed by two complementary techniques. One of the techniques is the on-site evaluation following the requirements of ISO/IEC 17025:2005. The other one implies the proficiency testing which involves the determination of laboratory performance by means of interlaboratory comparisons, whereby the laboratory performs practical tests and their results are further compared with those of other laboratories. The paper treats one of the most important topics of the proficiency testing – the interlaboratory comparison (ILC). There will be presented the need, the purpose and the main objectives of an ILC and also a typically situation where an interlaboratory comparison exercise (for radio-analytical methods) was planned. A fully description of the design and operation of an ILC scheme is the main purpose of this paper. A special attention will be given to the data analysis and evaluation of interlaboratory comparison scheme results. (authors)

  11. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  12. Intellectual capital in mergers and acquisitions: a case study in a world-class financial institution

    Directory of Open Access Journals (Sweden)

    Ricardo Vinícius Dias Jordão

    Full Text Available Abstract The objective of the research described in this paper was to analyse the implications of the merger between Itaú and Unibanco banks on the Intellectual Capital (IC of the Itaú Unibanco S/A Bank. The methodology comprised a qualitative and quantitative case study, in a descriptive approach, based on interviews (formal and informal and questionnaires applied to 225 top managers (directors, superintendents, regional managers and commercial general managers originated from these two banks. The research was complemented with direct observation and documental analysis. The following results were found after the merger: (i improvements were noted in all analysed indicators on the constituent elements of the IC (human capital, structural capital and relational capital, (ii Itaú Unibanco S/A Bank created, developed and acquired knowledge and know-how, and (iii these factors influenced corporative IC, supporting improvements in processes, systems, technology, brands, products and mainly in people, corporate image and the relationship of the company with the market, promoting significant financial results.

  13. A Comparative Study on Metadata Scheme of Chinese and American Open Data Platforms

    Directory of Open Access Journals (Sweden)

    Yang Sinan

    2018-01-01

    Full Text Available [Purpose/significance] Open government data is conducive to the rational development and utilization of data resources. It can encourage social innovation and promote economic development. Besides, in order to ensure effective utilization and social increment of open government data, high-quality metadata schemes is necessary. [Method/process] Firstly, this paper analyzed the related research of open government data at home and abroad. Then, it investigated the open metadata schemes of some Chinese main local governments’ data platforms, and made a comparison with the metadata standard of American open government data. [Result/conclusion] This paper reveals that there are some disadvantages about Chinese local government open data affect the use effect of open data, which including that different governments use different data metadata schemes, the description of data set is too simple for further utilization and usually presented in HTML Web page format with lower machine-readable. Therefore, our government should come up with a standardized metadata schemes by drawing on the international mature and effective metadata standard, to ensure the social needs of high quality and high value data.

  14. Core functions of the Web-of-Cells control scheme

    DEFF Research Database (Denmark)

    Evenblij, Berend; Rikos, Evangelos; Heussen, Kai

    In order to maintain frequency (balancing) and voltage control in the future power system, the ELECTRA Web-of-Cells (WoC) control scheme introduces six high-level use cases, which are Balance Restoration Control (BRC), Frequency Containment Control (FCC), Inertia Response Power Control (IRPC), Ba......), Balance Steering Control (BSC), Primary Voltage Control (PVC) and Post Primary Voltage Control (PPVC). This document presents the detailed description of the core functions that are needed and sufficient for controlling the grid in a Web-of-Cells architecture....

  15. Objective judgement by Kalman filtering in the generalized Landsbergian scheme

    International Nuclear Information System (INIS)

    Lukacs, B.; Racz, A.

    1992-08-01

    A method is suggested to check if a non-equilibrium thermodynamic description of a system is complete. Exploring Landsberg's idea of the role of third person, a scheme is proposed for treating non-equilibrium systems as well. In order to suppress irrelevant information carried by measurement noise or for very fast phenomena, Kalman filter can act as the objective spectator. The idea is illustrated via a thermodynamic model of non-relativistic heavy ion collisions. (author) 12 refs.; 3 figs

  16. Assessment of Climate Air Energy Regional Schemes in Burgundy and in Franche-Comte - Intermediate review on June 27, 2017. Burgundy Climate Air Energy Regional Scheme. Project, Scheme, Appendix to the SRCAE - Wind regional scheme of Burgundy, synthesis, opinion of the Burgundy CESER. Territorial Climate Energy Plan - Program of actions, Plenary session of the November 25, 2013. Climate Air Energy Regional Scheme - Franche-Comte SRCAE

    International Nuclear Information System (INIS)

    2011-09-01

    A first report proposes an assessment of the various aspects addressed by the Climate Air Energy Regional Schemes (SRCAE) of Burgundy and Franche-Comte: global aspects, and aspects related to adaptation to climate change, to air quality, to land planning, to the building sector, to mobility, to good transports, to agriculture, to forest, to industry and craft, to renewable energies, and to ecological responsibility. A synthetic presentation of the Burgundy scheme is proposed, and then an extended version which contains a description of the situation, an analysis of the regional potential, and a definition of orientations for the same above-mentioned aspects. A document more particularly addresses wind energy: role of wind energy in the energy mix of the region, role of small installations, wind energy potential, challenges and constraints (heritage and landscapes, natural environment, technical constraints), identification of areas of interest for wind energy projects, qualitative objectives. Documents published by the regional economic, social and environmental Council (CESER) of Burgundy are then proposed: a contribution to the Climate Air Energy Regional Scheme, a discussion and a presentation of a program of actions for the Climate Energy Territorial Plan (a large number of sheets of presentation of actions is proposed). The last document presents the Franche-Comte regional scheme: overview of regional knowledge on climate, air quality and environmental issues, challenges and potential per activity sector (transports and development, building, agriculture, industry, renewable energy production), definition of orientations and objectives for axes of action

  17. Structuring free form verbal descriptions in equipment failure reports

    International Nuclear Information System (INIS)

    Huzdovich, J.

    1983-01-01

    Information is encoded for convenience in computer sort/search routines used to manage a large number of records. The codes in use for equipment failure reports are limited due to practical considerations, and this limitation forces the reporter to leave out information to satisfy the coding requirements. The free form verbal descriptions, as found in the Generating Availability Data System (GADS) and the Nuclear Plant Reliability Data System (NPRDS), allow for reporting of this non-codable information. A systematic approach to constructing the verbal description based on rules of grammar, especially syntax, results in a structured narrative suitable for computer data management schemes. In addition, the reporter has a full range of descriptive terminology and does not have to select subjectively from a predetermined, limited vocabulary to describe the event. This paper introduces a concept that places in perspective the integration of structured, formal reporting and free form verbal description. A second benefit of this structured narrative is the systematic development of failure mode/failure cause relationships in the event

  18. Geological Classification of Uranium Deposits and Description of Selected Examples

    International Nuclear Information System (INIS)

    2018-04-01

    With the increased level of investigation into uranium deposits in recent years, a wealth of new information has become available, which has made it possible to investigate some of the least understood aspects of uranium metallogeny. This publication defines a new classification scheme, which is simple and descriptive, but flexible enough to encompass the recent advances in our understanding of uranium geology and deposit genesis. It contains improved definition of the deposit types, supported by type examples of those deposits for which good data are available, but not well described in previous literature. Along with the descriptive information, new data on uranium resources available for each deposit type are also provided.

  19. Combinatorial description of space and strong interactions

    International Nuclear Information System (INIS)

    Zenczykowski, P.

    1988-01-01

    A reinterpretation is given of a successful phenomenological approach to hadron self-energy effects known as the unitarized quark model. General arguments are given that the proper description of strong interactions may require abandoning the assignment of a primary role to continuous concepts such as position and momentum in favor of discrete ones such as spin or W-spin. The reinterpretation exploits an analogy between the W-spin diagrams occurring in the calculations of hadronic loop effects and the spin network idea of Penrose. A connection between the S-matrix approach to hadron masses and the purely algebraic approach characteristic of the quark model is indicated. Several hadron mass relations generated by a resulting SU(6)/sub w/-group-theoretic expression are presented and discussed. Results of an attempt to generalize the scheme to the description of hadron vertices are reported

  20. Charge conserving current deposition scheme for PIC simulations in modified spherical coordinates

    Science.gov (United States)

    Cruz, F.; Grismayer, T.; Fonseca, R. A.; Silva, L. O.

    2017-10-01

    Global models of pulsar magnetospheres have been actively pursued in recent years. Both macro and microscopic (PIC) descriptions have been used, showing that collective processes of e-e + plasmas dominate the global structure of pulsar magnetospheres. Since these systems are best described in spherical coordinates, the algorithms used in cartesian simulations must be generalized. A problem of particular interest is that of charge conservation in PIC simulations. The complex geometry and irregular grids used to improve the efficiency of these algorithms represent major challenges in the design of a charge conserving scheme. Here we present a new first-order current deposition scheme for a 2D axisymmetric, log-spaced radial grid, that rigorously conserves charge. We benchmark this scheme in different scenarios, by integrating it with a spherical Yee scheme and Boris/Vay pushers. The results show that charge is conserved to machine precision, making it unnecessary to correct the electric field to guarantee charge conservation. This scheme will be particularly important for future studies aiming to bridge the microscopic physical processes of e-e + plasma generation due to QED cascades, its self-consistent acceleration and radiative losses to the global dynamics of pulsar magnetospheres. Work supported by the European Research Council (InPairs ERC-2015-AdG 695088), FCT (Portugal) Grant PD/BD/114307/2016, and the Calouste Gulbenkian Foundation through the 2016 Scientific Research Stimulus Program.

  1. National Cases combining promotion scheme, ownership structure and operational strategy for Denmark, France and Portugal

    DEFF Research Database (Denmark)

    Costa, Ana; Kroff, Pablo; Morthorst, Poul Erik

    2011-01-01

    The scope of the FC4Home project is to assess technical and economic aspects of the ongoing fuel cell based micro-combined heat and power demonstration projects by addressing the socio-economic and systems analyses perspectives of a large-scale promotion scheme of fuel cells. This was carried out...... by means of energy systems analysis and studies on central cases for each of the participating project partners. This document comprises results from Work Package 6 – National Cases combining support schemes, ownership structures and operational strategies of the FC4Home research project. It integrates...... – Analyses of models for promotion schemes and ownership arrangements and Work Package 5 – Residential fuel cell micro CHP in Denmark, France and Portugal – model description, accomplished during the project....

  2. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  3. Coding Scheme for Assessment of Students’ Explanations and Predictions

    Directory of Open Access Journals (Sweden)

    Mihael Gojkošek

    2017-04-01

    Full Text Available In the process of analyzing students’ explanations and predictions for interaction between brightness enhancement film and beam of white light, a need for objective and reliable assessment instrumentarose. Consequently, we developed a codingscheme that was mostly inspired by the rubrics for self-assessment of scientific abilities. In the paper we present the grading categories that were integrated in the coding scheme, and descriptions of criteria used for evaluation of students work. We report the results of reliability analysis of new assessment tool and present some examples of its application.

  4. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  5. Evolution of local citizen participation schemes in the German wind market

    International Nuclear Information System (INIS)

    Enzenberger, N.; Fichtner, W.; Rentz, O.

    2003-01-01

    Local citizen participation schemes like the German 'Buergerwindparks' (citizen wind farm) have been an important vehicle to develop the wind energy business to its present state of market maturity. This article discusses ownership as an integrated part of the economic project design for renewable energy projects. Different forms of local citizen participation are differentiated and strategic aspects related to the entrepreneurial decision of involving local citizens are highlighted. Then, the focus will be on a description of different role models for local citizen-financed wind energy projects. The paper also explains the evolution of two new role models: the merger of existing project companies to larger citizen-owned project portfolio companies and the role of closed-end wind funds as a new equity provision approach. Finally, the role of local citizen participation schemes in different market phases is discussed. (author)

  6. General calibration methodology for a combined Horton-SCS infiltration scheme in flash flood modeling

    Science.gov (United States)

    Gabellani, S.; Silvestro, F.; Rudari, R.; Boni, G.

    2008-12-01

    Flood forecasting undergoes a constant evolution, becoming more and more demanding about the models used for hydrologic simulations. The advantages of developing distributed or semi-distributed models have currently been made clear. Now the importance of using continuous distributed modeling emerges. A proper schematization of the infiltration process is vital to these types of models. Many popular infiltration schemes, reliable and easy to implement, are too simplistic for the development of continuous hydrologic models. On the other hand, the unavailability of detailed and descriptive information on soil properties often limits the implementation of complete infiltration schemes. In this work, a combination between the Soil Conservation Service Curve Number method (SCS-CN) and a method derived from Horton equation is proposed in order to overcome the inherent limits of the two schemes. The SCS-CN method is easily applicable on large areas, but has structural limitations. The Horton-like methods present parameters that, though measurable to a point, are difficult to achieve a reliable estimate at catchment scale. The objective of this work is to overcome these limits by proposing a calibration procedure which maintains the large applicability of the SCS-CN method as well as the continuous description of the infiltration process given by the Horton's equation suitably modified. The estimation of the parameters of the modified Horton method is carried out using a formal analogy with the SCS-CN method under specific conditions. Some applications, at catchment scale within a distributed model, are presented.

  7. Discretization of convection-diffusion equations with finite-difference scheme derived from simplified analytical solutions

    International Nuclear Information System (INIS)

    Kriventsev, Vladimir

    2000-09-01

    Most of thermal hydraulic processes in nuclear engineering can be described by general convection-diffusion equations that are often can be simulated numerically with finite-difference method (FDM). An effective scheme for finite-difference discretization of such equations is presented in this report. The derivation of this scheme is based on analytical solutions of a simplified one-dimensional equation written for every control volume of the finite-difference mesh. These analytical solutions are constructed using linearized representations of both diffusion coefficient and source term. As a result, the Efficient Finite-Differencing (EFD) scheme makes it possible to significantly improve the accuracy of numerical method even using mesh systems with fewer grid nodes that, in turn, allows to speed-up numerical simulation. EFD has been carefully verified on the series of sample problems for which either analytical or very precise numerical solutions can be found. EFD has been compared with other popular FDM schemes including novel, accurate (as well as sophisticated) methods. Among the methods compared were well-known central difference scheme, upwind scheme, exponential differencing and hybrid schemes of Spalding. Also, newly developed finite-difference schemes, such as the the quadratic upstream (QUICK) scheme of Leonard, the locally analytic differencing (LOAD) scheme of Wong and Raithby, the flux-spline scheme proposed by Varejago and Patankar as well as the latest LENS discretization of Sakai have been compared. Detailed results of this comparison are given in this report. These tests have shown a high efficiency of the EFD scheme. For most of sample problems considered EFD has demonstrated the numerical error that appeared to be in orders of magnitude lower than that of other discretization methods. Or, in other words, EFD has predicted numerical solution with the same given numerical error but using much fewer grid nodes. In this report, the detailed

  8. Classification of High-Rise Residential Building Facilities: A Descriptive Survey on 170 Housing Scheme in Klang Valley

    Directory of Open Access Journals (Sweden)

    Abd Wahab Siti Rashidah Hanum

    2016-01-01

    Full Text Available High-rise residential building is a type of housing that has multi-dwelling units built on the same land. This type of housing has become popular each year in urban area due to the increasing cost of land. There are several common facilities provided in high-rise residential building. For example playground, swimming pool, gymnasium, 24 hours security system such as CCTV, access card and so on. Thus, maintenance works of the common facilities must be well organised. The purpose of this paper is to identify the classification of facilities provided at high rise residential building. The survey was done on 170 high-rise residential schemes by using stratified random sampling technique. The scope of this research is within Klang Valley area. This area is rapidly developed with high-rise residential building. The objective of this survey is to list down all the facilities provided in each sample of the schemes. The result, there are nine classification of facilities provided for high-rise residential building.

  9. Proposed classification scheme for high-level and other radioactive wastes

    International Nuclear Information System (INIS)

    Kocher, D.C.; Croff, A.G.

    1986-01-01

    The Nuclear Waste Policy Act (NWPA) of 1982 defines high-level radioactive waste (HLW) as: (A) the highly radioactive material resulting from the reprocessing of spent nuclear fuel....that contains fission products in sufficient concentrations; and (B) other highly radioactive material that the Commission....determines....requires permanent isolation. This paper presents a generally applicable quantitative definition of HLW that addresses the description in paragraph (B). The approach also results in definitions of other waste classes, i.e., transuranic (TRU) and low-level waste (LLW). A basic waste classification scheme results from the quantitative definitions

  10. Knowledge and uptake of community-based health insurance scheme among residents of Olowora, Lagos

    Directory of Open Access Journals (Sweden)

    O A Ibukun

    2013-01-01

    Full Text Available Background and Objective: The informal sector population in developing nations has low health coverage from Community Based Health Insurance (CBHI and problems such as limited awareness about the potential impact of prepayment health financing and the limited resources to finance health care can impede success. This study assessed the community based health insurance scheme uptake and determinants in Olowora, Lagos State. Methods: This was a descriptive cross sectional study carried out in July 2010 in all households of 12 out of 41 streets in Olowora,by multistage sampling. Four hundred and sixteen interviewer-administered questionnaires were completed and returned. Analysis was by Epi- info version 3.5.1 software. Results: Although 75.5% of respondents were aware of the Community Health Insurance scheme at Olowora, just about half (49.5% of them had good knowledge of the scheme. A substantial proportion (44.2% of respondents did not believe in contributing money for illness yet to come, and majority (72.3% of such respondents prefers payment for health care when ill. While about half (53% of respondentshad enrolled into the community health insurance scheme, 45.6% of those who had not enrolled were not aware of the scheme. Lack of money was the main reason (51.5% why some enrollees had defaulted. Conclusion: The study identified information gaps and poor understanding of the scheme as well as poverty as factors that have negatively affected uptake. The scheme management has to re-evaluate its sensitization programmes, and also strengthen marketing strategies with special emphasis on the poor.

  11. GRAP, Gamma-Ray Level-Scheme Assignment

    International Nuclear Information System (INIS)

    Franklyn, C.B.

    2002-01-01

    1 - Description of program or function: An interactive program for allocating gamma-rays to an energy level scheme. Procedure allows for searching for new candidate levels of the form: 1) L1 + G(A) + G(B) = L2; 2) G(A) + G(B) = G(C); 3) G(A) + G(B) = C (C is a user defined number); 4) L1 + G(A) + G(B) + G(C) = L2. Procedure indicates intensity balance of feed and decay of each energy level. Provides for optimization of a level energy (and associated error). Overall procedure allows for pre-defining of certain gamma-rays as belonging to particular regions of the level scheme, for example, high energy transition levels, or due to beta- decay. 2 - Method of solution: Search for cases in which the energy difference between two energy levels is equal to a gamma-ray energy within user-defined limits. 3 - Restrictions on the complexity of the problem: Maximum number of gamma-rays: 999; Maximum gamma ray energy: 32000 units; Minimum gamma ray energy: 10 units; Maximum gamma-ray intensity: 32000 units; Minimum gamma-ray intensity: 0.001 units; Maximum number of levels: 255; Maximum level energy: 32000 units; Minimum level energy: 10 units; Maximum error on energy, intensity: 32 units; Minimum error on energy, intensity: 0.001 units; Maximum number of combinations: 6400 (ca); Maximum number of gamma-ray types : 127

  12. Development of reduced kinetic schemes for the description of pollutants formation in combustion; Mise au point de schemas cinetiques reduits pour decrire la formation des polluants dans la combustion

    Energy Technology Data Exchange (ETDEWEB)

    Ferrendier, M.

    1998-12-17

    The typical dimensions of details chemical-kinetic mechanisms proposed to describe combustion systems are too large for multi-dimensional computations applications. The objective of reduction methods is to construct low-dimensional schemes that can be incorporated in industrial codes. We consider here a new class of methods based on a mathematical analysis of the detailed chemical-kinetic mechanisms, and the identification of a low-dimensional manifold that describes the slow dynamics of the chemical system. The mathematical reduction methods considered in this work are the Intrinsic Low Dimensional Manifold (ILDM) method proposed by Maas and Pope (1992), and the Singular Perturbation (PS) method proposed by Duchene and Rouchon (1996). The domain of validity of the ILDM or PS reduced schemes is limited to a high temperature domain T {>=} T{sub c}. This result suggests that ignition is out of the domain of application of reduced mechanisms. In the case of a CO/H{sub 2}/N{sub 2}-air combustion system, and using a two-dimensional slow manifold, we find T{sub c} {approx} 750 K. We also find that for that particular system, 2 progress variables are sufficient for an accurate description of the structure and the velocity of a laminar premixed flame. In the case of a CH{sub 4}-air combustion system, and using a two-dimensional slow manifold, we find T{sub c}{approx}1500 K. We also find that 2 progress variables are insufficient for an accurate description of the structure and the velocity of a laminar premixed flame. The study of the different NO formation mechanisms show that the thermal NO mechanism (the Zeldovich mechanism) is dominant for premixed configurations with lean or stoichiometric conditions ({phi}){>=}1.2), and for non-premixed configurations at high temperatures and high pressures (T{sub air}{>=}1000 K, P {>=} 10 bars). Under these conditions, the MPKIVA sub model used to describe NO formation in the IFP version of the KIVA code performs reasonably well. An

  13. A Stationary North-Finding Scheme for an Azimuth Rotational IMU Utilizing a Linear State Equality Constraint

    Directory of Open Access Journals (Sweden)

    Huapeng Yu

    2015-02-01

    Full Text Available The Kalman filter (KF has always been used to improve north-finding performance under practical conditions. By analyzing the characteristics of the azimuth rotational inertial measurement unit (ARIMU on a stationary base, a linear state equality constraint for the conventional KF used in the fine north-finding filtering phase is derived. Then, a constrained KF using the state equality constraint is proposed and studied in depth. Estimation behaviors of the concerned navigation errors when implementing the conventional KF scheme and the constrained KF scheme during stationary north-finding are investigated analytically by the stochastic observability approach, which can provide explicit formulations of the navigation errors with influencing variables. Finally, multiple practical experimental tests at a fixed position are done on a postulate system to compare the stationary north-finding performance of the two filtering schemes. In conclusion, this study has successfully extended the utilization of the stochastic observability approach for analytic descriptions of estimation behaviors of the concerned navigation errors, and the constrained KF scheme has demonstrated its superiority over the conventional KF scheme for ARIMU stationary north-finding both theoretically and practically.

  14. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  15. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  16. General calibration methodology for a combined Horton-SCS infiltration scheme in flash flood modeling

    Directory of Open Access Journals (Sweden)

    S. Gabellani

    2008-12-01

    Full Text Available Flood forecasting undergoes a constant evolution, becoming more and more demanding about the models used for hydrologic simulations. The advantages of developing distributed or semi-distributed models have currently been made clear. Now the importance of using continuous distributed modeling emerges. A proper schematization of the infiltration process is vital to these types of models. Many popular infiltration schemes, reliable and easy to implement, are too simplistic for the development of continuous hydrologic models. On the other hand, the unavailability of detailed and descriptive information on soil properties often limits the implementation of complete infiltration schemes. In this work, a combination between the Soil Conservation Service Curve Number method (SCS-CN and a method derived from Horton equation is proposed in order to overcome the inherent limits of the two schemes. The SCS-CN method is easily applicable on large areas, but has structural limitations. The Horton-like methods present parameters that, though measurable to a point, are difficult to achieve a reliable estimate at catchment scale. The objective of this work is to overcome these limits by proposing a calibration procedure which maintains the large applicability of the SCS-CN method as well as the continuous description of the infiltration process given by the Horton's equation suitably modified. The estimation of the parameters of the modified Horton method is carried out using a formal analogy with the SCS-CN method under specific conditions. Some applications, at catchment scale within a distributed model, are presented.

  17. A construction scheme of web page comment information extraction system based on frequent subtree mining

    Science.gov (United States)

    Zhang, Xiaowen; Chen, Bingfeng

    2017-08-01

    Based on the frequent sub-tree mining algorithm, this paper proposes a construction scheme of web page comment information extraction system based on frequent subtree mining, referred to as FSM system. The entire system architecture and the various modules to do a brief introduction, and then the core of the system to do a detailed description, and finally give the system prototype.

  18. Current use of impact models for agri-environment schemes and potential for improvements of policy design and assessment.

    Science.gov (United States)

    Primdahl, Jørgen; Vesterager, Jens Peter; Finn, John A; Vlahos, George; Kristensen, Lone; Vejre, Henrik

    2010-06-01

    Agri-Environment Schemes (AES) to maintain or promote environmentally-friendly farming practices were implemented on about 25% of all agricultural land in the EU by 2002. This article analyses and discusses the actual and potential use of impact models in supporting the design, implementation and evaluation of AES. Impact models identify and establish the causal relationships between policy objectives and policy outcomes. We review and discuss the role of impact models at different stages in the AES policy process, and present results from a survey of impact models underlying 60 agri-environmental schemes in seven EU member states. We distinguished among three categories of impact models (quantitative, qualitative or common sense), depending on the degree of evidence in the formal scheme description, additional documents, or key person interviews. The categories of impact models used mainly depended on whether scheme objectives were related to natural resources, biodiversity or landscape. A higher proportion of schemes dealing with natural resources (primarily water) were based on quantitative impact models, compared to those concerned with biodiversity or landscape. Schemes explicitly targeted either on particular parts of individual farms or specific areas tended to be based more on quantitative impact models compared to whole-farm schemes and broad, horizontal schemes. We conclude that increased and better use of impact models has significant potential to improve efficiency and effectiveness of AES. (c) 2009 Elsevier Ltd. All rights reserved.

  19. Energy conserving schemes for the simulation of musical instrument contact dynamics

    Science.gov (United States)

    Chatziioannou, Vasileios; van Walstijn, Maarten

    2015-03-01

    Collisions are an innate part of the function of many musical instruments. Due to the nonlinear nature of contact forces, special care has to be taken in the construction of numerical schemes for simulation and sound synthesis. Finite difference schemes and other time-stepping algorithms used for musical instrument modelling purposes are normally arrived at by discretising a Newtonian description of the system. However because impact forces are non-analytic functions of the phase space variables, algorithm stability can rarely be established this way. This paper presents a systematic approach to deriving energy conserving schemes for frictionless impact modelling. The proposed numerical formulations follow from discretising Hamilton's equations of motion, generally leading to an implicit system of nonlinear equations that can be solved with Newton's method. The approach is first outlined for point mass collisions and then extended to distributed settings, such as vibrating strings and beams colliding with rigid obstacles. Stability and other relevant properties of the proposed approach are discussed and further demonstrated with simulation examples. The methodology is exemplified through a case study on tanpura string vibration, with the results confirming the main findings of previous studies on the role of the bridge in sound generation with this type of string instrument.

  20. An effective fitting scheme for the dynamic structure of pure liquids

    International Nuclear Information System (INIS)

    Wax, J-F; Bryk, Taras

    2013-01-01

    A scheme of analysis for the dynamic structure functions in pure liquids is presented which can be implemented with both experimental and simulation data. Expressions for contributions of relaxing and propagating modes proposed earlier in the framework of the generalized collective modes approach are optimized in order to strictly fulfil three among the required sum-rules. The method is applied to simulation data for liquid cesium, the description of which appears to only require one relaxing and one propagating mode in the investigated wavevector range. These expressions are able to account for the dynamics in both the hydrodynamic and the kinetic regimes, being quantitatively accurate up to the onset of the first peak of the static structure factor and qualitatively beyond. Features of the modes can thus be obtained easily, without resorting to heavy formalism. The scheme of analysis can be straightforwardly extended to account for a higher number of relaxing and propagating modes. (paper)

  1. Aquatic environment as an occupational therapeutic scenario for the development of body scheme in Down syndrome

    Directory of Open Access Journals (Sweden)

    Chrystiane Maria Veras Pôrto

    2010-12-01

    Full Text Available Objective: To assess the effect of aquatic environment while an occupational therapeutic scenario in the development of body scheme of a child with Down Syndrome, considering the therapeutic properties of water. Description of the case: An interventionist research, with a qualitative and descriptive approach, conducted in an adapted pool of the Núcleo de Atenção Médica Integrada (NAMI of Fortaleza University (UNIFOR, Ceara, during the period of March to May, 2005. The subject of the study was a female child, aged 10 years old, diagnosed with Down Syndrome. Data collection had as instruments an interview guide for anamnesis, an evaluation form of psychomotor development, besides a field diary to record clinical observations during the sessions. This information was organized and analyzed based on clinical reasoning of occupational therapists and then described as a case study. We observed an evolution in the development of skills related to body scheme, such as the perception of fine parts of her own body, as well as large parts in someone else’s body, the imitation of positions, finishing with more active participation in activities of daily living. Final Considerations: We verified the effectiveness of occupational therapeutic activities conducted in aquatic environment for the development of the body scheme of the child in the study. This may be useful for conducting further research on the subject – whose literature is scarce – and contributing to the crescent update of occupational therapy practices.

  2. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  3. ITER ITA newsletter. No. 24, July 2005

    International Nuclear Information System (INIS)

    2005-08-01

    This issue of ITER ITA (ITER transitional Arrangements) newsletter contains concise information about the Ministerial Meeting on the ITER site selection (MMI-2) took place in Moscow, Russian Federation, on 28 June 2005. About one hundred participants from the Parties to the ITER Negotiations and the IAEA attended at the Meeting. Mr. A.Yu. Rumyantsev, Director of Rosatom, welcomed the participants and pointed out that the goal of the meeting was to resolve the most difficult issue: to select the site for implementation of the ITER project. Once this decision had been taken, one could expect a swift and successful accomplishment of negotiations and beginning of work on the ITER constriction. Mr. A. Yu. Rumyantsev, Director of Rosatom, welcomed the participants and pointed out that the goal of the meeting was to resolve the most difficult issue: to select the site for implementation of the ITER project. Once this decision had been taken, one could expect a swift and successful accomplishment of negotiations and beginning of work on the ITER construction. Mr. Rumyantsev invited the Heads of Delegations of Japan, the European Union, the People's Republic of China, the Republic of Korea and the United States of America to express the positions of their Parties on the choice of a site. Mr. N. Nakayama, Japanese Minister of Education, Culture, Sports, Science and Technology, recognized that three years had passed since the start of Negotiations on the site issue and that a consensus on the roles of the Host Party and the Non-Host Party had been reached. It was therefore not desirable that both Japan and the EU still advocate their own sites and allow the Negotiations to continue with no prospect of coming to a conclusion. So, considering that the ITER project should be started as soon as possible for the future benefit of humankind, that the six-Party-framework for implementing the ITER project should not be broken, that the ITER project starting smoothly will be a major

  4. National health insurance scheme: How receptive are the private healthcare practitioners in a local government area of Lagos state.

    Science.gov (United States)

    Christina, Campbell Princess; Latifat, Taiwo Toyin; Collins, Nnaji Feziechukwu; Olatunbosun, Abolarin Thaddeus

    2014-11-01

    National Health Insurance Scheme (NHIS) is one of the health financing options adopted by Nigeria for improved healthcare access especially to the low income earners. One of the key operators of the scheme is the health care providers, thus their uptake of the scheme is fundamental to the survival of the scheme. The study reviewed the uptake of the NHIS by private health care providers in a Local Government Area in Lagos State. To assess the uptake of the NHIS by private healthcare practitioners. This descriptive cross-sectional study recruited 180 private healthcare providers selected by multistage sampling technique with a response rate of 88.9%. Awareness, knowledge and uptake of NHIS were 156 (97.5%), 110 (66.8%) and 97 (60.6%), respectively. Half of the respondents 82 (51.3%) were dissatisfied with the operations of the scheme. Major reasons were failure of entitlement payment by Health Maintenance Organisations 13 (81.3%) and their incurring losses in participating in the scheme 8(50%). There was a significant association between awareness, level of education, knowledge of NHIS and registration into scheme by the respondents P-value NHIS were commendable among the private health care providers. Six out of 10 had registered with the NHIS but half of the respondents 82 (51.3%) were dissatisfied with the scheme and 83 (57.2%) regretted participating in the scheme. There is need to improve payment modalities and ensure strict adherence to laid down policies.

  5. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  6. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  7. A new hybrid scheme for simulations of highly collisional RF-driven plasmas

    International Nuclear Information System (INIS)

    Eremin, Denis; Hemke, Torben; Mussenbrock, Thomas

    2016-01-01

    This work describes a new 1D hybrid approach for modeling atmospheric pressure discharges featuring complex chemistry. In this approach electrons are described fully kinetically using particle-in-cell/Monte-Carlo (PIC/MCC) scheme, whereas the heavy species are modeled within a fluid description. Validity of the popular drift-diffusion approximation is verified against a ‘full’ fluid model accounting for the ion inertia and a fully kinetic PIC/MCC code for ions as well as electrons. The fluid models require knowledge of the momentum exchange frequency and dependence of the ion mobilities on the electric field when the ions are in equilibrium with the latter. To this end an auxiliary Monte-Carlo scheme is constructed. It is demonstrated that the drift-diffusion approximation can overestimate ion transport in simulations of RF-driven discharges with heavy ion species operated in the γ mode at the atmospheric pressure or in all discharge simulations for lower pressures. This can lead to exaggerated plasma densities and incorrect profiles provided by the drift-diffusion models. Therefore, the hybrid code version featuring the full ion fluid model should be favored against the more popular drift-diffusion model, noting that the suggested numerical scheme for the former model implies only a small additional computational cost. (paper)

  8. Quality Index Method (QIM) scheme developed for farmed Atlantic salmon ( Salmo salar )

    DEFF Research Database (Denmark)

    Sveinsdóttir, K.; Hyldig, Grethe; Martinsdóttir, E.

    2003-01-01

    The aim of the study was to develop 'Quality Index Method (QIM) scheme for raw, farmed Atlantic salmon (Salmo salar) and to evaluate the scheme. in a shelf life study. QIM is based on the evaluation of key parameters in the deterioration of seafood's. Demerit points are assigned to selected...... parameters according to their importance and a Quality Index (QI) is established by cumulating the resulting scores. The maximum storage time in ice was determined with Quantitative Descriptive Analysis (QDA) of the salmon after cooking and found to be 20-21 days. This was used as a reference to enable...... prediction of the remaining storage time of raw salmon in ice with QIM. The calculated QI evolved linearly with storage time in ice (QI=0.82x (days in ice)+0.18, R-2=0.97). Individual salmon varied in QI within each storage day. However, the multivariate analysis (PLS1) demonstrated that storage time could...

  9. Charge transfer through single molecule contacts: How reliable are rate descriptions?

    Directory of Open Access Journals (Sweden)

    Denis Kast

    2011-08-01

    Full Text Available Background: The trend for the fabrication of electrical circuits with nanoscale dimensions has led to impressive progress in the field of molecular electronics in the last decade. However, a theoretical description of molecular contacts as the building blocks of future devices is challenging, as it has to combine the properties of Fermi liquids in the leads with charge and phonon degrees of freedom on the molecule. Outside of ab initio schemes for specific set-ups, generic models reveal the characteristics of transport processes. Particularly appealing are descriptions based on transfer rates successfully used in other contexts such as mesoscopic physics and intramolecular electron transfer. However, a detailed analysis of this scheme in comparison with numerically exact solutions is still elusive.Results: We show that a formulation in terms of transfer rates provides a quantitatively accurate description even in domains of parameter space where strictly it is expected to fail, e.g., at lower temperatures. Typically, intramolecular phonons are distributed according to a voltage driven steady state that can only roughly be captured by a thermal distribution with an effective elevated temperature (heating. An extension of a master equation for the charge–phonon complex, to effectively include the impact of off-diagonal elements of the reduced density matrix, provides very accurate solutions even for stronger electron–phonon coupling.Conclusion: Rate descriptions and master equations offer a versatile model to describe and understand charge transfer processes through molecular junctions. Such methods are computationally orders of magnitude less expensive than elaborate numerical simulations that, however, provide exact solutions as benchmarks. Adjustable parameters obtained, e.g., from ab initio calculations allow for the treatment of various realizations. Even though not as rigorously formulated as, e.g., nonequilibrium Green’s function

  10. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  11. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  12. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  13. Which factors engage women in deprived neighbourhoods to participate in exercise referral schemes?

    Directory of Open Access Journals (Sweden)

    Nierkens Vera

    2008-10-01

    Full Text Available Abstract Background Exercise referral schemes (ERS have become a popular way of promoting physical activity. The aim of these schemes is to encourage high risk patients to exercise. In evaluating these schemes, little attention has been paid to lower socio-economic groups in a multi-ethnic urban setting. This study aimed to explore the socio-demographic and psychosocial characteristics of female participants in ERS located in deprived neighbourhoods. The second aim was to determine which elements of the intervention make it appealing to participate in the scheme. Methods A mixed method approach was utilized, combining a cross-sectional descriptive study and a qualitative component. In the quantitative part of the study, all female participants (n = 523 filled out a registration form containing questions about socio-demographic and psychosocial characteristics. Height and weight were also measured. In the qualitative part of the study, 38 of these 523 participants were interviewed. Results The majority of the participants had a migrant background, a low level of education, no paid job and a high body mass index. Although most participants were living sedentary lives, at intake they were quite motivated to start exercising. The ERS appealed to them because of its specific elements: facilitating role of the health professional, supportive environment, financial incentive, supervision and neighbourhood setting. Conclusion This study supports the idea that ERS interventions appeal to women from lower socio-economic groups, including ethnic minorities. The ERS seems to meet their contextual, economic and cultural needs. Since the elements that enabled the women to start exercising are specific to this ERS, we should become aware of whether this population continues to exercise after the end of the scheme.

  14. Numerical schemes for the hybrid modeling approach of gas-particle turbulent flows

    International Nuclear Information System (INIS)

    Dorogan, K.

    2012-01-01

    Hybrid Moments/PDF methods have shown to be well suitable for the description of poly-dispersed turbulent two-phase flows in non-equilibrium which are encountered in some industrial situations involving chemical reactions, combustion or sprays. They allow to obtain a fine enough physical description of the poly-dispersity, non-linear source terms and convection phenomena. However, their approximations are noised with the statistical error, which in several situations may be a source of a bias. An alternative hybrid Moments-Moments/PDF approach examined in this work consists in coupling the Moments and the PDF descriptions, within the description of the dispersed phase itself. This hybrid method could reduce the statistical error and remove the bias. However, such a coupling is not straightforward in practice and requires the development of accurate and stable numerical schemes. The approaches introduced in this work rely on the combined use of the up-winding and relaxation-type techniques. They allow to obtain stable unsteady approximations for a system of partial differential equations containing non-smooth external data which are provided by the PDF part of the model. A comparison of the results obtained using the present method with those of the 'classical' hybrid approach is presented in terms of the numerical errors for a case of a co-current gas-particle wall jet. (author)

  15. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  16. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  17. Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qianqian; Blohm, Andrew; Liu, Bo

    2017-04-01

    A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoff control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.

  18. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  19. Linking project-based mechanisms with domestic greenhouse gas emissions trading schemes

    International Nuclear Information System (INIS)

    Bygrave, S.; Bosi, M.

    2004-01-01

    Although there are a number of possible links between emission trading and project-based mechanisms, the focus of this paper is on linking domestic GHG emission trading schemes with: (1) domestic; and, (2) international (JI and CDM) GHG reduction project activities. The objective is to examine some of the challenges in linking DETs and project-based mechanisms, as well as some possible solutions to address these challenges. The link between JI / CDM and intergovernmental international emissions trading (i.e. Article 17 of the Kyoto Protocol) is defined by the Kyoto Protocol, and therefore is not covered in this paper. The paper is written in the context of: (a) countries adhering to the Kyoto Protocol and elaborating their strategies to meet their GHG emission commitments, including through the use of the emissions trading and project-based mechanisms. For example, the European Union (EU) will be commencing a GHG Emissions Trading Scheme in January 2005, and recently, the Council of ministers and the European Parliament agreed on a text for an EU Linking Directive allowing the use of JI and CDM emission units in the EU Emission Trading Scheme (EU-ETS); and (b) all countries (and/or regions within countries) with GHG emission obligations that may choose to use domestic emissions trading and project-based mechanisms to meet their GHG commitments. The paper includes the following elements: (1) an overview of the different flexibility mechanisms (i.e. GHG emissions trading and PBMs), including a brief description and comparisons between the mechanisms (Section 3); (2) an exploration of the issues that emerge when project-based mechanisms link with domestic emissions trading schemes, as well as possible solutions to address some of the challenges raised (Section 4); (3) a case study examining the EU-ETS and the EU Linking Directive on project-based mechanisms, in particular on how the EU is addressing in a practical context relevant linking issues (Section 5); (4) a

  20. Earlier introduction of aguitas is associated with higher risk of stunting in infants and toddlers in the Western Highlands of Guatemala.

    Science.gov (United States)

    Doak, Colleen M; van der Starre, Robine E; van Beusekom, Ilse; Campos Ponce, Maiza; Vossenaar, Marieke; Solomons, Noel W

    2013-03-01

    In many cultures, simple herbal infusions, thin gruels, or sweetened water (agüitas in Guatemalan parlance) are given to infants and toddlers. Formative research has shown that the use of agüitas in early child feeding is deeply embedded in Guatemalan culture. We examined the prevalence and timing of the introduction of agüitas during early life in a low-income population of metropolitan Quetzaltenango in relation to stunting in children. Responses from 456 mothers of children aged 5-23 mo were analyzed by using logistic regression to explore relations between linear growth (stunting), diarrhea, and age at the first introduction of agüitas. A total of 358 of 456 infants (79%) were agüita users independent of sex or ethnicity. Of infants given agüitas, one-fourth of subjects were introduced to agüitas within the first 2.9 wk of age, and one-half of subjects were introduced to agüitas within the first 9 wk of age. Subjects introduced to agüitas before 2.9 wk of age were 1.8 times more likely to be stunted (95% CI: 1.1, 2.8; P = 0.03) irrespective of ethnicity. Children who had ever been given agüitas were twice as likely to have also had diarrhea (OR: 2.1; 95% CI: 1.3, 3.3) and more likely to have needed medical attention for diarrhea (OR: 2.1; 95% CI: 1.1, 4.2), but diarrheal experience was independent of stunting. Because of the early introduction of agüitas and the high prevalence of stunting in Guatemala, longitudinal studies are urgently needed to clarify the causal relations. This trial was registered at Nederlands Trial register as NTR3273 for 5-mo-olds and Nederlands Trial register as NTR3292 for infants ≥6 mo.

  1. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  2. A soil-canopy scheme for use in a numerical model of the atmosphere: 1D stand-alone model

    Science.gov (United States)

    Kowalczyk, E. A.; Garratt, J. R.; Krummel, P. B.

    We provide a detailed description of a soil-canopy scheme for use in the CSIRO general circulation models (GCMs) (CSIRO-4 and CSIRO-9), in the form of a one-dimensional stand-alone model. In addition, the paper documents the model's ability to simulate realistic surface fluxes by comparison with mesoscale model simulations (involving more sophisticated soil and boundary-layer treatments) and observations, and the diurnal range in surface quantities, including extreme maximum surface temperatures. The sensitivity of the model to values of the surface resistance is also quantified. The model represents phase 1 of a longer-term plan to improve the atmospheric boundary layer (ABL) and surface schemes in the CSIRO GCMs.

  3. Tracking sharp interface of two fluids by the CIP (cubic-interpolated propagation) scheme

    International Nuclear Information System (INIS)

    Yabe, T.; Xiao, F.

    1993-01-01

    A method to treat a sharp discontinuity by the density function is proposed. The surface of the density function is described by one grid throughout the calculation even when the surface is largely distorted. This description is made possible by the CIP method combined with variable transformation. This scheme is applied to the linear wave propagation in one- and two-dimensions. In the nonlinear case, the injection of heavier fluid into lighter fluid his calculated and the winding of mushroom structure is successfully treated by the density function. (author)

  4. Description of the control and safety systems of the RA reactor

    International Nuclear Information System (INIS)

    Popovic, B.; Pesic, M.

    1962-01-01

    This report contains detailed description and scheme of the control and safety system of the RA reactor. It consists of interconnected five systems: for automated regulation; compensation rods; safety rods; power density measurement device; period meter; automated D 2 O level meter in the core. Automated regulation system is divided into two parts: basic system for reactor operation regime at power from 10kW - 10 MW and precise regulation system for operation at set-up power level up to 10 kW which is used occasionally

  5. A higher order space-time Galerkin scheme for time domain integral equations

    KAUST Repository

    Pray, Andrew J.

    2014-12-01

    Stability of time domain integral equation (TDIE) solvers has remained an elusive goal formany years. Advancement of this research has largely progressed on four fronts: 1) Exact integration, 2) Lubich quadrature, 3) smooth temporal basis functions, and 4) space-time separation of convolutions with the retarded potential. The latter method\\'s efficacy in stabilizing solutions to the time domain electric field integral equation (TD-EFIE) was previously reported for first-order surface descriptions (flat elements) and zeroth-order functions as the temporal basis. In this work, we develop the methodology necessary to extend the scheme to higher order surface descriptions as well as to enable its use with higher order basis functions in both space and time. These basis functions are then used in a space-time Galerkin framework. A number of results are presented that demonstrate convergence in time. The viability of the space-time separation method in producing stable results is demonstrated experimentally for these examples.

  6. A higher order space-time Galerkin scheme for time domain integral equations

    KAUST Repository

    Pray, Andrew J.; Beghein, Yves; Nair, Naveen V.; Cools, Kristof; Bagci, Hakan; Shanker, Balasubramaniam

    2014-01-01

    Stability of time domain integral equation (TDIE) solvers has remained an elusive goal formany years. Advancement of this research has largely progressed on four fronts: 1) Exact integration, 2) Lubich quadrature, 3) smooth temporal basis functions, and 4) space-time separation of convolutions with the retarded potential. The latter method's efficacy in stabilizing solutions to the time domain electric field integral equation (TD-EFIE) was previously reported for first-order surface descriptions (flat elements) and zeroth-order functions as the temporal basis. In this work, we develop the methodology necessary to extend the scheme to higher order surface descriptions as well as to enable its use with higher order basis functions in both space and time. These basis functions are then used in a space-time Galerkin framework. A number of results are presented that demonstrate convergence in time. The viability of the space-time separation method in producing stable results is demonstrated experimentally for these examples.

  7. 75 FR 34960 - Import Administration IA ACCESS Pilot Program

    Science.gov (United States)

    2010-06-21

    ... the Federal Register at 75 FR 32341. The reference to the Docket No. ITA- 2010-XXXX, which is provided... ``Docket No. ITA-2010-XXXX'' to read ``Docket No. ITA-2010-0002.'' Furthermore, in the same paragraph, that...

  8. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  9. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  10. The analysis of mechanical behaviour of reactor coolant system layout scheme with 60 degree angle for the second phase project of Qinshan NPP

    International Nuclear Information System (INIS)

    Yu Ruhong

    1993-01-01

    For the reactor coolant system of the second phase project of Qinshan NPP, the layout scheme with two loops and an angle of 60 degree is adopted. In this scheme, two loops are connected to reactor pressure vessel (RPV), and the angle included between the inlet and outlet nozzles of the RPV is 60 degree in a same loop. The issues involved in the analysis of mechanical behaviour of piping system to demonstrate the validity of such a scheme are described briefly in the paper, including the modelling technique adopted in establishing mathematical model, the methods used for structural analysis of piping system, stress and fatigue analysis in piping fittings. A brief description of the calculation results are given and the feasibility and rationality are discussed

  11. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  12. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  13. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  14. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  15. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  16. Enzymatic description of the anhydrofructose pathway of glycogen degradation. I

    DEFF Research Database (Denmark)

    Yu, Shukun; Refdahl, Charlotte; Lundt, Inge

    2004-01-01

    The anhydrofructose pathway describes the degradation of glycogen and starch to metabolites via 1,5-anhydro-D-fructose (1,5AnFru). The enzyme catalyzing the first reaction step of this pathway, i.e., a-1,4-glucan lyase (EC 4.2.1.13), has been purified, cloned and characterized from fungi and red...... possessed all enzymes needed for conversion of glycogen to APP, an a-1,4-glucan lyase from this fungus was isolated and partially sequenced. Based on this work, a scheme of the enzymatic description of the anhydrofructose pathway in A. melaloma was proposed. Keywords: Anhydrofructose pathway; Anthracobia...

  17. A conservative and a hybrid early rejection schemes for accelerating Monte Carlo molecular simulation

    KAUST Repository

    Kadoura, Ahmad Salim

    2014-03-17

    Molecular simulation could provide detailed description of fluid systems when compared to experimental techniques. They can also replace equations of state; however, molecular simulation usually costs considerable computational efforts. Several techniques have been developed to overcome such high computational costs. In this paper, two early rejection schemes, a conservative and a hybrid one, are introduced. In these two methods, undesired configurations generated by the Monte Carlo trials are rejected earlier than it would when using conventional algorithms. The methods are tested for structureless single-component Lennard-Jones particles in both canonical and NVT-Gibbs ensembles. The computational time reduction for both ensembles is observed at a wide range of thermodynamic conditions. Results show that computational time savings are directly proportional to the rejection rate of Monte Carlo trials. The proposed conservative scheme has shown to be successful in saving up to 40% of the computational time in the canonical ensemble and up to 30% in the NVT-Gibbs ensemble when compared to standard algorithms. In addition, it preserves the exact Markov chains produced by the Metropolis scheme. Further enhancement for NVT-Gibbs ensemble is achieved by combining this technique with the bond formation early rejection one. The hybrid method achieves more than 50% saving of the central processing unit (CPU) time.

  18. A field theory description of constrained energy-dissipation processes

    International Nuclear Information System (INIS)

    Mandzhavidze, I.D.; Sisakyan, A.N.

    2002-01-01

    A field theory description of dissipation processes constrained by a high-symmetry group is given. The formalism is presented in the example of the multiple-hadron production processes, where the transition to the thermodynamic equilibrium results from the kinetic energy of colliding particles dissipating into hadron masses. The dynamics of these processes is restricted because the constraints responsible for the colour charge confinement must be taken into account. We develop a more general S-matrix formulation of the thermodynamics of nonequilibrium dissipative processes and find a necessary and sufficient condition for the validity of this description; this condition is similar to the correlation relaxation condition, which, according to Bogolyubov, must apply as the system approaches equilibrium. This situation must physically occur in processes with an extremely high multiplicity, at least if the hadron mass is nonzero. We also describe a new strong-coupling perturbation scheme, which is useful for taking symmetry restrictions on the dynamics of dissipation processes into account. We review the literature devoted to this problem

  19. Proposed classification scheme for high-level and other radioactive wastes

    International Nuclear Information System (INIS)

    Kocher, D.C.; Croff, A.G.

    1986-01-01

    The Nuclear Waste Policy Act (NWPA) of 1982 defines high-level (radioactive) waste (HLW) as (A) the highly radioactive material resulting from the reprocessing of spent nuclear fuel...that contains fission products in sufficient concentrations; and (B) other highly radioactive material that the Commission...determines...requires permanent isolation. This paper presents a generally applicable quantitative definition of HLW that addresses the description in paragraph B. The approach also results in definitions of other wastes classes, i.e., transuranic (TRU) and low-level waste (LLW). The basic waste classification scheme that results from the quantitative definitions of highly radioactive and requires permanent isolation is depicted. The concentrations of radionuclides that correspond to these two boundaries, and that may be used to classify radioactive wastes, are given

  20. Development of an Urban Multilayer Radiation Scheme and Its Application to the Urban Surface Warming Potential

    Science.gov (United States)

    Aoyagi, Toshinori; Takahashi, Shunji

    2012-02-01

    To investigate how a three-dimensional structure such as an urban canyon can affect urban surface warming, we developed an urban multilayer radiation scheme. The complete consideration of multiple scattering of shortwave and longwave radiation using the radiosity method is an important feature of the present scheme. A brief description of this scheme is presented, followed by evaluations that compare its results with observations of the effective albedo and radiative temperature for urban blocks. Next, we calculate the urban surface warming potential (USWP), defined as the difference between the daily mean radiative temperature of urban surfaces (which are assumed to be black bodies), including their canyon effects and the daily mean temperature of a flat surface with the same material properties, under a radiative equilibrium state. Assuming standard material properties (albedo and emissivity of 0.4 and 0.9, respectively), we studied the sensitivity of the USWP to various aspect ratios of building heights to road widths. The results show that the temporally-averaged surface temperature of an urban area can be higher than that of a flat surface. In addition, we determined the overestimation of the effective temperature of urban surfaces induced by the overestimation of the radiation distribution to the walls when one uses a single-layer scheme for urban block arrays that have a low sky-view factor less than around 0.5.

  1. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  2. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  3. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  4. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  5. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  6. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  7. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  8. Interhemispheric Temperature Asymmetry in Historical Observations and Future Projections

    Science.gov (United States)

    Friedman, A. R.; Hwang, Y.; Chiang, J. C.; Frierson, D. M.

    2013-12-01

    The surface temperature contrast between the northern and southern hemispheres -- the interhemispheric temperature asymmetry (ITA) -- is an emerging indicator of global climate change, especially relevant to the latitude of the tropical rain bands. We investigate the ITA over historical observations and in Coupled Model Intercomparison Project phase 5 (CMIP5) historical simulations and future projections. We find that the uneven spatial impacts of greenhouse gas forcing cause amplified warming in the Arctic and northern landmasses, resulting in an increase of the ITA. However, anthropogenic sulfate aerosols, which are disproportionately emitted in the northern hemisphere, masked these effects on the ITA until around 1980. The implementation of air pollution regulations in North America and Europe combined with increased global emissions of greenhouse gases have resulted in a significant positive ITA trend since 1980. The CMIP5 historical multimodel ensembles simulate this positive ITA trend, though not its full magnitude. We explore how natural variability may account for some of the differences between the simulated and observed ITA. Future simulations project a substantial increase of the ITA over the twenty-first century, well outside its twentieth-century variability. This is largely in response to continued greenhouse gas emissions, though anthropogenic aerosol emissions are also important in some scenarios. We discuss the potential implications of this northern warming in causing a northward shift in tropical rainfall.

  9. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  10. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  11. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  12. National health insurance scheme: Are the artisans benefitting in Lagos state, Nigeria?

    Directory of Open Access Journals (Sweden)

    Princess C Campbell

    2016-01-01

    Full Text Available Background: Health insurance (HI can serve as a vital risk protection for families and small businesses and also increase access to priority health services. This study determined the knowledge, attitude of artisans toward HI as well as their health-seeking pattern and willingness to join the HI scheme. Methodology: This descriptive cross-sectional survey used a multistage sampling technique to recruit 260 participants, using self-designed, pretested, interviewer-administered questionnaire. Data were analyzed using Epi-info version 7.0. Chi-square test, Fisher′s exact test, and logistic regression were used for associations; the level of significance was set at 5%. Results: The respondents were predominantly male, i.e., 195 (75.0%, with a mean age of 32.36 + 6.20 years and mean income of N 29,000 + 5798.5 ($1 ~ N 161. Majority of the respondents, i.e., 226 (86.9% were not aware of HI. The overall knowledge was poor (6.5% and the main source of information was through radio/television (41.2%. Nearly, half of the respondents (33 out of 67 identified the concept of HI as a pool of contributors′ fund for only healthcare service. A high proportion of the respondents (27 out of 34 were aware of the benefits of HI, although majority, i.e., 27 (79.4% identified access to medication as the benefit. The majority of the respondents, i.e., 228 (87.7% expressed negative attitude toward the scheme; however, 76.5% were willing to join the HI scheme. Conclusion: The artisans had low awareness/poor knowledge of HI which translated to a negative attitude toward the scheme. There is need for an aggressive stakeholders′ enlightenment campaign for increasing coverage.

  13. The Function of Credit Scheme to Improve Family Income among Beef Cattle Farmers in Central Java Province

    Science.gov (United States)

    Prasetyo, E.; Ekowati, T.; Roessali, W.; Gayatri, S.

    2018-02-01

    The aims of study were: (i) identify of beef cattle fattening credit scheme, (ii) calculating and analyze of beef cattle farmers’ income, (iii) analyze of factors influencing beef cattle credit scheme towards farmer’s income. The research was held in five regencies in Central Java Province. Beef cattle fattening farm was standardized as an elementary unit. Survey method was used, while Two Stage Cluster Purposive Sampling was used for determining of sample. Data were analyzed using statistical method of quantitative descriptive and inferential statistics in term of income analysis and multiple linear regression models. The result showed that farmers used their own capital to run the farm. The average amount was IDR 10,769,871. Kredit Ketahanan Pangan dan Energi was credit scheme which was dominantly access by farmers. The average credit was IDR 23,312,200/farmer with rate of credit equal to 6.46%, the time of credit returning equal to 24.60 monthand the prediction of average collateral equal to IDR 35,800,00. The average of farmers’ income was IDR 4,361,611.60/2.96 head of beef cattle/fattening period. If the labour cost did not calculate as a cost production, hence the farmer’ income was IDR 7,608,630.41 or in other word the farmer’ income increase 74.44%. Factors of credit scheme which partially significant influence to the farmers’ income were number of own capital usage and value of credit collateral. Meanwhile, name of credit scheme, financing institution as a creditor, amount of credit, rate of credit scheme and time of returning credit were not significantly influence towards farmers’ income.

  14. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  15. Development and Validation of a New Prognostic System for Patients with Hepatocellular Carcinoma.

    Directory of Open Access Journals (Sweden)

    Fabio Farinati

    2016-04-01

    Full Text Available Prognostic assessment in patients with hepatocellular carcinoma (HCC remains controversial. Using the Italian Liver Cancer (ITA.LI.CA database as a training set, we sought to develop and validate a new prognostic system for patients with HCC.Prospective collected databases from Italy (training cohort, n = 3,628; internal validation cohort, n = 1,555 and Taiwan (external validation cohort, n = 2,651 were used to develop the ITA.LI.CA prognostic system. We first defined ITA.LI.CA stages (0, A, B1, B2, B3, C using only tumor characteristics (largest tumor diameter, number of nodules, intra- and extrahepatic macroscopic vascular invasion, extrahepatic metastases. A parametric multivariable survival model was then used to calculate the relative prognostic value of ITA.LI.CA tumor stage, Eastern Cooperative Oncology Group (ECOG performance status, Child-Pugh score (CPS, and alpha-fetoprotein (AFP in predicting individual survival. Based on the model results, an ITA.LI.CA integrated prognostic score (from 0 to 13 points was constructed, and its prognostic power compared with that of other integrated systems (BCLC, HKLC, MESIAH, CLIP, JIS. Median follow-up was 58 mo for Italian patients (interquartile range, 26-106 mo and 39 mo for Taiwanese patients (interquartile range, 12-61 mo. The ITA.LI.CA integrated prognostic score showed optimal discrimination and calibration abilities in Italian patients. Observed median survival in the training and internal validation sets was 57 and 61 mo, respectively, in quartile 1 (ITA.LI.CA score ≤ 1, 43 and 38 mo in quartile 2 (ITA.LI.CA score 2-3, 23 and 23 mo in quartile 3 (ITA.LI.CA score 4-5, and 9 and 8 mo in quartile 4 (ITA.LI.CA score > 5. Observed and predicted median survival in the training and internal validation sets largely coincided. Although observed and predicted survival estimations were significantly lower (log-rank test, p < 0.001 in Italian than in Taiwanese patients, the ITA.LI.CA score maintained

  16. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  17. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  18. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  19. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  20. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  1. Natural History of Moderate Coronary Artery Stenosis After Surgical Revascularization.

    Science.gov (United States)

    Raza, Sajjad; Blackstone, Eugene H; Houghtaling, Penny L; Olivares, Gabriel; Ravichandren, Kirthi; Koprivanac, Marijan; Bakaeen, Faisal G; Sabik, Joseph F

    2018-03-01

    It remains controversial whether grafting moderately stenosed coronary arteries (MSCAs) influences native-vessel disease progression and whether grafting may protect against late myocardial ischemia. From 1972 to 2011, 55,567 patients underwent primary isolated coronary artery bypass grafting (CABG); 1,902 had a single coronary artery with angiographically moderate (50% to 69%) stenosis and ≥1 postoperative angiogram. Disease progression was studied in 489 nongrafted, 371 internal thoracic artery (ITA)-grafted, and 957 saphenous vein (SV)-grafted MSCAs, as well as patency of 376 ITA and 1,016 SV grafts to these MSCAs. At 1, 5, 10, and 15 years, native-vessel disease progressed from moderate to severe stenosis/occlusion in 32%, 52%, 66%, and 72% of nongrafted MSCAs; 55%, 73%, 84%, and 87% of ITA-grafted MSCAs; and 67%, 82%, 90%, and 92% of SV-grafted MSCAs. After adjusting for patient characteristics, MSCA disease progressed 3.6 times faster with ITA and 10 times faster with SV grafting compared with nongrafting. At these same time points, occlusion of ITA grafts to MSCAs was 8%, 9%, 11%, and 15% and for SV grafts, 13%, 32%, 46%, and 56%; protection from myocardial ischemia by ITA-grafted versus nongrafted MSCAs was 29%, 47%, 59%, and 61%. Most MSCAs progress to severe stenosis or occlusion in the long term. Progression is faster in grafted than nongrafted MSCAs, more so with SV than ITA grafts. However, ITA grafts to such arteries have excellent patency, providing long-term protection from myocardial ischemia. Therefore, ITA grafting of MSCAs should be considered. Copyright © 2018 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  2. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  3. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  4. A food-manufacturing manager’s experiences and perceptions of the implementation of an incentive scheme

    Directory of Open Access Journals (Sweden)

    Celita Begbie

    2011-06-01

    Research purpose: Identifying the contributors to negative feelings and demotivation, or conversely, excitement and motivation, will ultimately assist managers to implement an incentive scheme to motivate staff and improve performance. Motivation for the study: There is little research on how participants perceive incentive schemes and whether or not they motivate employees and improve overall performance. Research design, approach and method: The researcher used a modernistic qualitative research approach and, more specifically, a case study. Main findings: The participants in the research were unaware of the performance goals they needed to achieve. They felt that there was no link between their performance and their earnings. They felt that some objectives were demeaning and insulting, as was the payment they received. They felt that achieving their goals was outside their control and influence. Practical/managerial implications: Participants felt excited and motivated to perform when their managers presented the department’s overall goals to them and asked the participants to set their own goals based on the department’s objectives. Contribution/value-add: Although this study is explorative and descriptive, it suggests that it is how departments implement an incentive scheme, rather than merely having one, that will motivate or demotivate employees to perform.

  5. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  6. A staging scheme for the development of the scuttle fly Megaselia abdita.

    Directory of Open Access Journals (Sweden)

    Karl R Wotton

    Full Text Available Model organisms, such as Drosophila melanogaster, provide powerful experimental tools for the study of development. However, approaches using model systems need to be complemented by comparative studies for us to gain a deeper understanding of the functional properties and evolution of developmental processes. New model organisms need to be established to enable such comparative work. The establishment of new model system requires a detailed description of its life cycle and development. The resulting staging scheme is essential for providing morphological context for molecular studies, and allows us to homologise developmental processes between species. In this paper, we provide a staging scheme and morphological characterisation of the life cycle for an emerging non-drosophilid dipteran model system: the scuttle fly Megaselia abdita. We pay particular attention to early embryogenesis (cleavage and blastoderm stages up to gastrulation, the formation and retraction of extraembryonic tissues, and the determination and formation of germ (pole cells. Despite the large evolutionary distance between the two species (approximately 150 million years, we find that M. abdita development is remarkably similar to D. melanogaster in terms of developmental landmarks and their relative timing.

  7. ARP: A PC-compatible scheme for generating ORIGEN-S cross section library

    International Nuclear Information System (INIS)

    Leal, L.C.; Hermann, O.W.; Parks, C.V.

    1995-01-01

    The SAS2H sequence of the SCALE code system has been widely used for treating problems related to the characterization of nuclear systems for disposal, storage, and shipment. The calculations, in general, consist of determining the isotope compositions of the different materials present in the problem as a function of time, which subsequently enable determination of the heat generation and radiation source terms. In the SAS2H scheme, time-dependent material concentrations are obtained using the ORIGEN-S code based on a point-depletion calculation that utilizes problem-dependent cross-section libraries generated by distinct codes of the SAS2H sequence. In this paper we will be concerned with the methodology utilized in the SAS2H control module to create cross-section libraries for point-depletion calculations with the ORIGEN-S code. A brief description of the SAS2H scheme will be given, and a new capability, the automatic rapid processing (ARP), for generating problem-dependent ORIGEN-S cross-section libraries will be presented. Use of ARP can enable execution of ORIGEN-S on a personal computer with identical accuracy to that obtained with SAS2H

  8. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  9. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  10. Subject categories and scope descriptions

    International Nuclear Information System (INIS)

    2002-01-01

    This document is one in a series of publications known as the ETDE/INIS Joint Reference Series. It defines the subject categories and provides the scope descriptions to be used for categorization of the nuclear literature for the preparation of INIS and ETDE input by national and regional centres. Together with the other volumes of the INIS Reference Series it defines the rules, standards and practices and provides the authorities to be used in the International Nuclear Information System and ETDE. A complete list of the volumes published in the INIS Reference Series may be found on the inside front cover of this publication. This INIS/ETDE Reference Series document is intended to serve two purposes: to define the subject scope of the International Nuclear Information System (INIS) and the Energy Technology Data Exchange (ETDE) and to define the subject classification scheme of INIS and ETDE. It is thus the guide to the inputting centres in determining which items of literature should be reported, and in determining where the full bibliographic entry and abstract of each item should be included in INIS or ETDE database. Each category is identified by a category code consisting of three alphanumeric characters. A scope description is given for each subject category. The scope of INIS is the sum of the scopes of all the categories. With most categories cross references are provided to other categories where appropriate. Cross references should be of assistance in finding the appropriate category; in fact, by indicating topics that are excluded from the category in question, the cross references help to clarify and define the scope of the category to which they are appended. A Subject Index is included as an aid to subject classifiers, but it is only an aid and not a means for subject classification. It facilitates the use of this document, but is no substitute for the description of the scope of the subject categories

  11. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  12. Martinický palác v Praze za vlastnictví Jiřího Bořity z Martinic a jeho následovníka Jaroslava Bořity z Martinic. Architektonická podoba a výzdoba

    OpenAIRE

    Poláčková, Daniela

    2011-01-01

    Bachelor thesis "Martinic palace in Prague during the ownership of George Bořita of Martinic and his follower Jaroslav Bořita of Martinic. Its architectural form and decoration" is based on the Martinic palace in the Hradčany square during the ownerships of George Bořita of Martinic and Jaroslav Bořita of Martinic. At the beginning you can find the list of the owners, who owned the palace, during this there appeared important changes not only architectural, but also in decoration. The first c...

  13. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  14. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  15. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  16. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  17. Simplified application of electronic data processing in a natural science and technology special library in combination with an improved literature description

    Energy Technology Data Exchange (ETDEWEB)

    Bretnuetz, E.

    1975-10-01

    A pilot project in a special library for natural science and technology to record bibliographic data on several kinds of literature within a simplified scheme and to process them in a computer by simple programs is described. The printout consists of several lists arranged according to several aspects. At the same time a relevant thesaurus is tested as to its suitability for an improved description of the literature. The results show that the literature handled is identified sufficiently within this simplified scheme. After supplementation by some special terms, the thesaurus can be used for a deeper analysis of the literature. (auth)

  18. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  19. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  20. Prompt neutrinos from atmospheric charm in the general-mass variable-flavor-number scheme

    International Nuclear Information System (INIS)

    Benzke, M.; Garzelli, M.V.; Kniehl, B.A.; Kramer, G.; Moch, S.; Sigl, G.

    2017-08-01

    We present predictions for the prompt-neutrino flux arising from the decay of charmed mesons and baryons produced by the interactions of high-energy cosmic rays in the Earth's atmosphere, making use of a QCD approach on the basis of the general-mass variable-flavor-number scheme for the description of charm hadroproduction at NLO, complemented by a consistent set of fragmentation functions. We compare the theoretical results to those already obtained by our and other groups with different theoretical approaches. We provide comparisons with the experimental results obtained by the IceCube Collaboration in two different analyses and we discuss the implications for parton distribution functions.

  1. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  2. Field description of coarse bioclastic fabrics

    Energy Technology Data Exchange (ETDEWEB)

    Kidwell, S.M.; Holland, S.M. (Univ. of Chicago, IL (United States))

    1991-08-01

    Shell- and bone-bearing rocks can be readily categorized into 9 macroscopic fabric types using semi-quantitative scales for close-packing and size-sorting of bioclasts greater than 2 mm in diameter. Although designed to describe fossiliferous siliciclastics and volcaniclastics, this system of field description can also be used to enlarge upon standard petrographic descriptions of fossiliferous carbonates. In cross-sectional bed views, coarse bioclasts may be densely packed. These coarse bioclasts (>2 mm) may be well sorted (central 80% of bioclasts lie within 1 or 2 adjacent phi size-classes), bimodal (well sorted but with a distinct second mode), or poorly sorted (central 80% of bioclasts distributed over 3 or more adjacent size-classes). Despite the complicating effects of bioclast shape, novices show 90% accuracy in estimating close-packing from photographs. They have only 60% accuracy in estimating size-sorting (the most common error is underestimating goodness of sorting), underscoring the importance of size-tallies to cross-check visual estimates when first using this scheme. This packing/sorting approach provides a good visual image of the fabric, and narrows the range of possible modes of origin more than alternative criteria such as volumetric percent-abundance (which shows no one-to-one equivalence with close-packing), orientation, and fragmentation. However, detailed interpretations of fabrics usually require more information on these and other features of the deposit, including bioclast condition, associated sedimentary structures, life-habits of bioclast-producers, and stratigraphic context.

  3. An Improved TA-SVM Method Without Matrix Inversion and Its Fast Implementation for Nonstationary Datasets.

    Science.gov (United States)

    Shi, Yingzhong; Chung, Fu-Lai; Wang, Shitong

    2015-09-01

    Recently, a time-adaptive support vector machine (TA-SVM) is proposed for handling nonstationary datasets. While attractive performance has been reported and the new classifier is distinctive in simultaneously solving several SVM subclassifiers locally and globally by using an elegant SVM formulation in an alternative kernel space, the coupling of subclassifiers brings in the computation of matrix inversion, thus resulting to suffer from high computational burden in large nonstationary dataset applications. To overcome this shortcoming, an improved TA-SVM (ITA-SVM) is proposed using a common vector shared by all the SVM subclassifiers involved. ITA-SVM not only keeps an SVM formulation, but also avoids the computation of matrix inversion. Thus, we can realize its fast version, that is, improved time-adaptive core vector machine (ITA-CVM) for large nonstationary datasets by using the CVM technique. ITA-CVM has the merit of asymptotic linear time complexity for large nonstationary datasets as well as inherits the advantage of TA-SVM. The effectiveness of the proposed classifiers ITA-SVM and ITA-CVM is also experimentally confirmed.

  4. Generic Schemes for Single-Molecule Kinetics. 3: Self-Consistent Pathway Solutions for Nonrenewal Processes.

    Science.gov (United States)

    Piephoff, D Evan; Cao, Jianshu

    2018-04-23

    We recently developed a pathway analysis framework (paper 1) for describing single-molecule kinetics for renewal (i.e., memoryless) processes based on the decomposition of a kinetic scheme into generic structures. In our approach, waiting time distribution functions corresponding to such structures are expressed in terms of self-consistent pathway solutions and concatenated to form measurable probability distribution functions (PDFs), affording a simple way to decompose and recombine a network. Here, we extend this framework to nonrenewal processes, which involve correlations between events, and employ it to formulate waiting time PDFs, including the first-passage time PDF, for a general kinetic network model. Our technique does not require the assumption of Poissonian kinetics, permitting a more general kinetic description than the usual rate approach, with minimal topological restrictiveness. To demonstrate the usefulness of this technique, we provide explicit calculations for our general model, which we adapt to two generic schemes for single-enzyme turnover with conformational interconversion. For each generic scheme, wherein the intermediate state(s) need not undergo Poissonian decay, the functional dependence of the mean first-passage time on the concentration of an external substrate is analyzed. When conformational detailed balance is satisfied, the enzyme turnover rate (related to the mean first-passage time) reduces to the celebrated Michaelis-Menten functional form, consistent with our previous work involving a similar scheme with all rate processes, thereby establishing further generality to this intriguing result. Our framework affords a general and intuitive approach for evaluating measurable waiting time PDFs and their moments, making it a potentially useful kinetic tool for a wide variety of single-molecule processes.

  5. High order well-balanced finite volume WENO schemes and discontinuous Galerkin methods for a class of hyperbolic systems with source terms

    International Nuclear Information System (INIS)

    Xing Yulong; Shu Chiwang

    2006-01-01

    Hyperbolic balance laws have steady state solutions in which the flux gradients are nonzero but are exactly balanced by the source term. In our earlier work [J. Comput. Phys. 208 (2005) 206-227; J. Sci. Comput., accepted], we designed a well-balanced finite difference weighted essentially non-oscillatory (WENO) scheme, which at the same time maintains genuine high order accuracy for general solutions, to a class of hyperbolic systems with separable source terms including the shallow water equations, the elastic wave equation, the hyperbolic model for a chemosensitive movement, the nozzle flow and a two phase flow model. In this paper, we generalize high order finite volume WENO schemes and Runge-Kutta discontinuous Galerkin (RKDG) finite element methods to the same class of hyperbolic systems to maintain a well-balanced property. Finite volume and discontinuous Galerkin finite element schemes are more flexible than finite difference schemes to treat complicated geometry and adaptivity. However, because of a different computational framework, the maintenance of the well-balanced property requires different technical approaches. After the description of our well-balanced high order finite volume WENO and RKDG schemes, we perform extensive one and two dimensional simulations to verify the properties of these schemes such as the exact preservation of the balance laws for certain steady state solutions, the non-oscillatory property for general solutions with discontinuities, and the genuine high order accuracy in smooth regions

  6. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  7. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  8. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  9. Rise and fall of HCV-related hepatocellular carcinoma in Italy: a long-term survey from the ITA.LI.CA centres.

    Science.gov (United States)

    Cazzagon, Nora; Trevisani, Franco; Maddalo, Gemma; Giacomin, Anna; Vanin, Veronica; Pozzan, Caterina; Poggio, Paolo Del; Rapaccini, Gianludovico; Nolfo, Anna M Di; Benvegnù, Luisa; Zoli, Marco; Borzio, Franco; Giannini, Edoardo G; Caturelli, Eugenio; Chiaramonte, Maria; Foschi, Francesco G; Cabibbo, Giuseppe; Felder, Martina; Ciccarese, Francesca; Missale, Gabriele; Baroni, Gianluca Svegliati; Morisco, Filomena; Pecorelli, Anna; Farinati, Fabio

    2013-10-01

    Hepatitis C virus (HCV) is the leading aetiological factor of HCC in the western world where, overall, its incidence is increasing, despite data suggesting an initial drop in some areas. The aim of this study was to evaluate epidemiology, clinical features and survival of HCV-related HCC (HCV-HCC) in a wide time range in Italy. Multicentre retrospective study including 3695 patients prospectively recruited by the ITA.LI.CA group. Patients were classified into three subgroups according to aetiology (Group A[GA], pure HCV; Group B[GB], HCV + cofactors; and Group C[GC], non-HCV) and in 5 time cohorts (5 years each), according to the year of diagnosis. Age, gender, Child-Pugh score, modality of diagnosis, stage, presence of thrombosis/metastases, type of treatment and survival were analysed. A total of 1801 GA patients, 445 GB and 1333 GC were recruited. The number of GA patients peaked in the 1996-2000, gradually dropping thereafter (P < 0.0001), as observed for GB (P < 0.0001). Age at diagnosis increased (P < 0.0001), while percentage of patients diagnosed during surveillance and stage improved only in GA (P = 0.02 and P = 0.003 respectively). The survival significantly increased over time particularly in GA (median 37 months) and was longer in GA than in GB and GC (P < 0.0001). The prevalence of HCC-HCV is decreasing in Italy since 2001. HCV-HCC patients are older, more frequently diagnosed under surveillance and in an earlier stage. HCC survival improved in the last 15 years and is significantly higher in patients with HCV-HCC. We therefore expect a further drop in both incidence and mortality for HCV-HCC in the years to come. © 2013 John Wiley & Sons A/S.

  10. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  11. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  12. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  13. Low energy description of quantum gravity and complementarity

    International Nuclear Information System (INIS)

    Nomura, Yasunori; Varela, Jaime; Weinberg, Sean J.

    2014-01-01

    We consider a framework in which low energy dynamics of quantum gravity is described preserving locality, and yet taking into account the effects that are not captured by the naive global spacetime picture, e.g. those associated with black hole complementarity. Our framework employs a “special relativistic” description of gravity; specifically, gravity is treated as a force measured by the observer tied to the coordinate system associated with a freely falling local Lorentz frame. We identify, in simple cases, regions of spacetime in which low energy local descriptions are applicable as viewed from the freely falling frame; in particular, we identify a surface called the gravitational observer horizon on which the local proper acceleration measured in the observer's coordinates becomes the cutoff (string) scale. This allows for separating between the “low-energy” local physics and “trans-Planckian” intrinsically quantum gravitational (stringy) physics, and allows for developing physical pictures of the origins of various effects. We explore the structure of the Hilbert space in which the proposed scheme is realized in a simple manner, and classify its elements according to certain horizons they possess. We also discuss implications of our framework on the firewall problem. We conjecture that the complementarity picture may persist due to properties of trans-Planckian physics.

  14. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  15. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  16. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  17. One-Stage and Two-Stage Schemes of High Performance Synchronous PWM with Smooth Pulses-Ratio Changing

    DEFF Research Database (Denmark)

    Oleschuk, V.; Blaabjerg, Frede

    2002-01-01

    This paper presents detailed description of one-stage and two-stage schemes of a novel method of synchronous, pulsewidth modulation (PWM) for voltage source inverters for ac drive application. The proposed control functions provide accurate realization of different versions of voltage space vector...... modulation with synchronization of the voltage waveform of the inverter and with smooth pulse-ratio changing. Voltage spectra do not contain even harmonic and sub-harmonics (combined harmonics) during the whole control range including the zone of overmodulation. Examples of determination of the basic control...

  18. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  19. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  20. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  1. A conservative numerical scheme for modeling nonlinear acoustic propagation in thermoviscous homogeneous media

    Science.gov (United States)

    Diaz, Manuel A.; Solovchuk, Maxim A.; Sheu, Tony W. H.

    2018-06-01

    A nonlinear system of partial differential equations capable of describing the nonlinear propagation and attenuation of finite amplitude perturbations in thermoviscous media is presented. This system constitutes a full nonlinear wave model that has been formulated in the conservation form. Initially, this model is investigated analytically in the inviscid limit where it has been found that the resulting flux function fulfills the Lax-Wendroff theorem, and the scheme can match the solutions of the Westervelt and Burgers equations numerically. Here, high-order numerical descriptions of strongly nonlinear wave propagations become of great interest. For that matter we consider finite difference formulations of the weighted essentially non-oscillatory (WENO) schemes associated with explicit strong stability preserving Runge-Kutta (SSP-RK) time integration methods. Although this strategy is known to be computationally demanding, it is found to be effective when implemented to be solved in graphical processing units (GPUs). As we consider wave propagations in unbounded domains, perfectly matching layers (PML) have been also considered in this work. The proposed system model is validated and illustrated by using one- and two-dimensional benchmark test cases proposed in the literature for nonlinear acoustic propagation in homogeneous thermoviscous media.

  2. [Wound information management system: a standardized scheme for acquisition, storage and management of wound information].

    Science.gov (United States)

    Liu, Hu; Su, Rong-jia; Wu, Min-jie; Zhang, Yi; Qiu, Xiang-jun; Feng, Jian-gang; Xie, Ting; Lu, Shu-liang

    2012-06-01

    To form a wound information management scheme with objectivity, standardization, and convenience by means of wound information management system. A wound information management system was set up with the acquisition terminal, the defined wound description, the data bank, and related softwares. The efficacy of this system was evaluated in clinical practice. The acquisition terminal was composed of the third generation mobile phone and the software. It was feasible to get access to the wound information, including description, image, and therapeutic plan from the data bank by mobile phone. During 4 months, a collection of a total of 232 wound treatment information was entered, and accordingly standardized data of 38 patients were formed automatically. This system can provide standardized wound information management by standardized techniques of acquisition, transmission, and storage of wound information. It can be used widely in hospitals, especially primary medical institutions. Data resource of the system makes it possible for epidemiological study with large sample size in future.

  3. Supervised segmentation of phenotype descriptions for the human skeletal phenome using hybrid methods.

    Science.gov (United States)

    Groza, Tudor; Hunter, Jane; Zankl, Andreas

    2012-10-15

    Over the course of the last few years there has been a significant amount of research performed on ontology-based formalization of phenotype descriptions. In order to fully capture the intrinsic value and knowledge expressed within them, we need to take advantage of their inner structure, which implicitly combines qualities and anatomical entities. The first step in this process is the segmentation of the phenotype descriptions into their atomic elements. We present a two-phase hybrid segmentation method that combines a series individual classifiers using different aggregation schemes (set operations and simple majority voting). The approach is tested on a corpus comprised of skeletal phenotype descriptions emerged from the Human Phenotype Ontology. Experimental results show that the best hybrid method achieves an F-Score of 97.05% in the first phase and F-Scores of 97.16% / 94.50% in the second phase. The performance of the initial segmentation of anatomical entities and qualities (phase I) is not affected by the presence / absence of external resources, such as domain dictionaries. From a generic perspective, hybrid methods may not always improve the segmentation accuracy as they are heavily dependent on the goal and data characteristics.

  4. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  5. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  6. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  7. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  8. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  9. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  10. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  11. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  12. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  13. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  14. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  15. Some issues linked to the description of systems in strong interaction

    International Nuclear Information System (INIS)

    Theussl, L.

    2001-06-01

    In the first part of this work we have dealt with some issues that are relevant in the area of nucleonic resonances within different constituent quark models. In this context we have concentrated on the theoretical description of Pi and Nu decays for N and Delta resonances. The results obtained point to the necessity of a more microscopic description of the dynamics which is at the same time responsible for the binding of quarks inside baryons and the decay of the latter ones. In the second part we have contributed to the study of crossed two-boson exchanges in the Bethe-Salpeter equation as well as to the investigation of different three-dimensional approaches that follow from the Bethe-Salpeter equation in a certain non-relativistic reduction scheme. These one include in particular an equation whose interaction depends on the total energy of the system. It was shown that such an equation is able to account for a certain number of properties of Bethe-Salpeter equation, in particular, that there also arise abnormal solutions in such an approach. (author)

  16. TECHNOLOGICAL CLUSTERING IN SÃO JOSE DOS CAMPOS: TRAJECTORIES AND IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Isabel Cristina dos Santos

    2013-08-01

    Full Text Available This article analyses the relationship among entrepreneurship, innovation and growth path regarding the technological cluster in São Jose dos Campos, state of São Paulo. This is an exploratory and descriptive study, supported by documental research and questionnaires applied in a non-probabilistic sample. The results show a relevant social reorganization since CTA/ITA were implemented, in the early Fifties’, which coincides with the arrival of international companies, attracted by the Geographic aspects, high qualified manpower availability and tax benefits. Since then, the municipality has experienced an intense migratory flow of professionals, professors, civil and military students. CTA and ITA generate a considerable level of technological knowledge spillover. Due to it, a number of new companies have started-up operations locally in fields such as Aeronautics, Airspace, Automobile and Petrochemical, which promoted a remarkable social and economic development. Nevertheless, the small and medium technology-based enterprises seem to show high dependence of the core companies in the region that leads to initial stages of internationalization.

  17. Challenges to the scale-up of the Nigerian National Health Insurance Scheme: Public knowledge and opinions in urban Kano, Nigeria

    OpenAIRE

    U M Lawan; Z Iliyasu; Abba Maryam Daso

    2012-01-01

    Background : This study examined the challenges in the implementation and scale-up of the National Health insurance Scheme (NHIS) in Nigeria. Materials and Methods : We designed this descriptive cross-sectional study to investigate the knowledge and opinions of 150 randomly selected adults in urban Kano regarding the NHIS. Data was analyzed using Epi Info™ 3.2.05 statistical software. Respondents′ knowledge of NHIS was scored and graded using a system adapted from previous studies. Results : ...

  18. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  19. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  20. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  1. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  2. Compensating Injury to Autonomy in English Negligence Law: Inconsistent Recognition.

    Science.gov (United States)

    Keren-Paz, Tsachi

    2018-04-10

    Recently in Shaw v Kovac, the Court of Appeal seemed to have rejected a standalone injury to autonomy (ITA) as actionable in negligence, in an informed consent case. In this article, I argue that Shaw can be explained away, and that English law recognizes ITA as actionable in a series of cases, some of which-Bhamra, Tracey, and Yearworth-were not hitherto understood to do so. However, the under-theorization in the cases leads to inconsistencies. Like cases (Rees/Yearworth; Chester/Tracey) are not treated alike; ITA is misunderstood to be about 'religious offence' (Bhamra) and property loss (Yearworth) and worse still, the more serious type 2 ITA (Rees) gives rise to a weaker remedy (of exceptional nature aside) than the less serious type 1 injury (Chester). A better understanding of the different manifestations of ITA will lead to results which are both more consistent and more justified on the merit.

  3. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  4. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  5. Evaluating statistical cloud schemes: What can we gain from ground-based remote sensing?

    Science.gov (United States)

    Grützun, V.; Quaas, J.; Morcrette, C. J.; Ament, F.

    2013-09-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based remote sensing such as lidar, microwave, and radar to evaluate prognostic distribution moments using the "perfect model approach." This means that we employ a high-resolution weather model as virtual reality and retrieve full three-dimensional atmospheric quantities and virtual ground-based observations. We then use statistics from the virtual observation to validate the modeled 3-D statistics. Since the data are entirely consistent, any discrepancy occurring is due to the method. Focusing on total water mixing ratio, we find that the mean ratio can be evaluated decently but that it strongly depends on the meteorological conditions as to whether the variance and skewness are reliable. Using some simple schematic description of different synoptic conditions, we show how statistics obtained from point or line measurements can be poor at representing the full three-dimensional distribution of water in the atmosphere. We argue that a careful analysis of measurement data and detailed knowledge of the meteorological situation is necessary to judge whether we can use the data for an evaluation of higher moments of the humidity distribution used by a statistical cloud scheme.

  6. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1998-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed

  7. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  8. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  9. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  10. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  11. The insider threat to cybersecurity: how group process and ignorance affect analyst accuracy and promptitude

    OpenAIRE

    Kelly, Ryan F.

    2017-01-01

    Approved for public release; distribution is unlimited The recent increase in high-profile insider cyber exploits indicates that current insider threat analysis (ITA) is insufficient to handle the growing insider threat problem. Well-established academic literature agrees that information overload is a problem ITA must overcome because ITA remains a human-intensive task. Two conceptual strategies to overcome information overload include reducing information and distributing information amo...

  12. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  13. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  14. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  15. Descriptive Research

    DEFF Research Database (Denmark)

    Wigram, Anthony Lewis

    2003-01-01

    Descriptive research is described by Lathom-Radocy and Radocy (1995) to include Survey research, ex post facto research, case studies and developmental studies. Descriptive research also includes a review of the literature in order to provide both quantitative and qualitative evidence of the effect...... starts will allow effect size calculations to be made in order to evaluate effect over time. Given the difficulties in undertaking controlled experimental studies in the creative arts therapies, descriptive research methods offer a way of quantifying effect through descriptive statistical analysis...

  16. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  17. DYNSUB: A high fidelity coupled code system for the evaluation of local safety parameters – Part II: Comparison of different temporal schemes

    International Nuclear Information System (INIS)

    Gomez-Torres, Armando Miguel; Sanchez-Espinoza, Victor Hugo; Ivanov, Kostadin; Macian-Juan, Rafael

    2012-01-01

    Highlights: ► A fixed point iteration (FPI) is implemented in DYNSUB. ► Comparisons between the explicit scheme and the FPI are done. ► The FPI scheme allows moving from one time step to the other with converged solution. ► FPI allows the use of larger time steps without compromising the accuracy of results. ► FPI results are promising and represent an option in order to optimize calculations. -- Abstract: DYNSUB is a novel two-way pin-based coupling of the simplified transport (SP 3 ) version of DYN3D with the subchannel code SUBCHANFLOW. The new coupled code system allows for a more realistic description of the core behaviour under steady state and transients conditions, and has been widely described in Part I of this paper. Additionally to the explicit coupling developed and described in Part I, a nested loop iteration or fixed point iteration (FPI) is implemented in DYNSUB. A FPI is not an implicit scheme but approximates it by adding an iteration loop to the current explicit scheme. The advantage of the method is that it allows the use of larger time steps; however the nested loop iteration could take much more time in getting a converged solution that could be less efficient than the explicit scheme with small time steps. A comparison of the two temporal schemes is performed. The results using FPI are very promising and represent a very good option in order to optimize computational times without losing accuracy. However it is also shown that a FPI scheme can produce inaccurate results if the time step is not chosen in agreement with the analyzed transient.

  18. Description os surface quadrupole oscillations of heateU spherical nuclei in the Brownian movement approximation

    International Nuclear Information System (INIS)

    Svin'in, I.R.

    1982-01-01

    Description of collective phenomena in heated nuclei within the framework of the Brownian approximation may be conditionally divided into two parts: 1) solution of the problem for some realization of a random force, 2) averaging in a set of all the possible realizations. Results of the present work are setted the first part of the problem in the case of surface quadrupole oscillations of spherical heated nuclei. Quadrupole surface oscillations of heated spherical nuclei are considered in the Brownian motion approximation. The integrals of motion are constructed taking into account the energy and angular momentum conservations for the nucleus in the process of relaxation of the collective excitations. Wave functions are obtained for states having definite values of the integrals of motion in the phonon representation. It is noted that the description scheme developed is easily used with respect to other multipolarity oscillations

  19. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  20. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  1. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  2. Schemes for fibre-based entanglement generation in the telecom band

    International Nuclear Information System (INIS)

    Chen, Jun; Lee, Kim Fook; Li Xiaoying; Voss, Paul L; Kumar, Prem

    2007-01-01

    We investigate schemes for generating polarization-entangled photon pairs in standard optical fibres. The advantages of a double-loop scheme are explored through comparison with two other schemes, namely, the Sagnac-loop scheme and the counter-propagating scheme. Experimental measurements with the double-loop scheme verify the predicted advantages

  3. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  4. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  5. Modifications to the Rules of the CERN Health Insurance Scheme

    CERN Multimedia

    HR Department

    2010-01-01

    On the proposal of the CHIS Board, and following examination by the Standing Concertation Committee on 29 April 2010, the Director-General has approved the new Rules of the CERN Health Insurance Scheme, which will come into effect on 1 June 2010. The Rules will shortly be available on the CHIS web site. As the Rules had not been revised since 2003, it had become necessary to make certain changes in order to bring them into line with other texts (such as the Staff Rules and Regulations and Administrative Circulars) and to clarify some practices. The new Rules do not introduce any new benefits or remove any existing ones. The following changes will affect all insured members:   Description of change Articles in the new Rules Time limit for claiming reimbursement The time period is measured from the invoice date (instead of the date of treatment). ...

  6. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  7. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  8. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  9. The relationship between leadership style and provision of the first Danish publicly reimbursed cognitive pharmaceutical service--a qualitative multicase study.

    Science.gov (United States)

    Kaae, Susanne; Søndergaard, Birthe; Haugbølle, Lotte Stig; Traulsen, Janine Morgall

    2011-06-01

    Evidence suggests that leadership style is important to the sustainability of cognitive pharmaceutical services, yet only scarce literature on the relationship exists. Support of the sustainability of the first publicly reimbursed cognitive service in Denmark, the Inhaler Technique Assessment Service (ITAS), was ascertained through a qualitative study to explore how leadership style shapes the implementation process of the service. Sustainability in this project was defined as the state where those asthma patients whose symptom status is negatively clinically affected (as defined by Global Initiative for Asthma guidelines) by inappropriate inhalation technique are identified and offered the service by pharmacy staff. The study was an exploratory qualitative multicase study that used triangulation of both data sources and methods. A theoretical framework of Bolman and Deal inspired the analysis of how leadership style influenced the local process of implementation of the ITAS. Four pharmacies were selected for the analysis because they differed in terms of leadership actions in their implementation process and achievement of ITAS sustainability. The analysis was inductive and linked factors that influence ITAS provision as perceived by employees with the interpreted leadership style of the owner. Three main themes emerged: (1) the alignment of the owner and staff values, (2) whether owners perceived ITAS development as being under their own control, and (3) whether owners explicated the responsibilities of employees in the implementation process. The themes were interrelated. Pharmacy owner's leadership style was significant to sustainability of the ITAS. A strong wish by the owner to have ITAS implemented was important, followed by aligning the owner's values and visions with those of the employees. The widespread perception by owners that experienced users are not interested in the ITAS needs to be addressed to achieve sustainability. Copyright © 2011 Elsevier

  10. SMAFS, Steady-state analysis Model for Advanced Fuel cycle Schemes

    International Nuclear Information System (INIS)

    LEE, Kwang-Seok

    2006-01-01

    1 - Description of program or function: The model was developed as a part of the study, 'Advanced Fuel Cycles and Waste Management', which was performed during 2003-2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down the cost analysis results. All the fuel cycle schemes considered in the model are represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high-level waste along time are included in the model and can be displayed. The user can modify easily the values of mass flows and/or cost parameters and see the corresponding changes in the results. The model calculates: front-end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs. It performs Monte Carlo simulations with changing the values of all unit costs within their respective ranges (from lower to upper bounds). 2 - Methods: In Monte Carlo simulation, it is assumed that all unit costs follow a triangular probability distribution function, i.e., the probability that the unit cost has a value increases linearly from its lower bound to the nominal value and then decreases linearly to its upper bound. 3 - Restrictions on the complexity of the problem: The limit for the Monte Carlo iterations is the one of an Excel worksheet, i.e. 65,536

  11. Graphic Description: The Mystery of Ibn Khafaja\\'s Success in Description

    Directory of Open Access Journals (Sweden)

    جواد رنجبر

    2009-12-01

    Full Text Available Graphic Description:   The Mystery of Ibn Khafaja's Success in Description    Ali Bagher Taheriniya *  Javad Ranjbar **      Abstract Ibn Khafaja is one of the poets and men of letters in Spain. He is titled to Sanobari of Spain. He is one of the masters of description. Hence, the analysis of successful techniques he has used in the descriptive art could illuminate the way for others. Al-Taswir al-harfi (graphic description is a term which denotes the highest and most detailed poems. On this basis, the best descriptive poem is one which is closer to a painting. He has used some elements called conforming elements of description which contain: imagination, feeling, faculty, and dialogue as well as three other elements: to be inborn in description, enchanting nature and convenient life. This article is going to give an analysis of the reasons for Ibn Khafaja’s success in description and portrait making.   Key words: Ibn Khafaja, poetry, description, portrait   * Associate Professor, Bu Ali Sina University of Hamadan E-mail: bTaheriniya@yahoo.com  ** M.A. in Arabic Language and Literature

  12. Expanding health insurance scheme in the informal sector in Nigeria: awareness as a potential demand-side tool.

    Science.gov (United States)

    Adewole, David Ayobami; Akanbi, Saidat Abisola; Osungbade, Kayode Omoniyi; Bello, Segun

    2017-01-01

    The implementation and expansion of a health insurance scheme in the informal sector, particularly in developing countries, is a challenge. With the aid of an innovative Information-Education and Communication model, titled 'Understanding the concept of health insurance: An innovative social marketing tool', an assessment of the awareness and perception of the scheme among market women was carried out. This is a cross-sectional descriptive survey, carried out among market women in Ibadan, Nigeria. In a multi-stage sampling technique, a total of 351 women were interviewed using an interviewer-administered, semi-structured questionnaire. The data was analysed using SPSS version 16. Chi-square test was used to test associations between selected variables of interest. Logistic regression model was used to determine predictors of awareness of the National Health Insurance Scheme (NHIS). A model controlling for participants' enrolment status was built and Adjusted Odds Ratio (AOR) reported. Level of statistical significance was set at p market women aged 18 years and above participated in the study, a response rate of 98.0%. Respondents' educational status was the only predictor significantly associated with awareness of the NHIS. Respondents with post-primary education had 10 times the odds of being aware of the NHIS than respondents with no education or only primary education (Adjusted Odds Ratio = 10.3; 95% CI = 4.1-26.0). Innovative models to enable potential beneficiaries, especially among the informal sector, to better comprehend and accept the concept of prepayment methods of financing healthcare costs is important in efforts to implement and expand a social health insurance scheme.

  13. The National Health Insurance Scheme (NHIS): a survey of knowledge and opinions of Nigerian dentists' in Lagos.

    Science.gov (United States)

    Adeniyi, A A; Onajole, A T

    2010-03-01

    This study was designed to assess the knowledge and perceptions of Nigerian dentists to the National Health Insurance scheme (NHIS). A cross-sectional descriptive survey was conducted amongst 250 dentists employed in private and public dental clinics in Lagos State, Nigeria. The survey instrument was a self-administered questionnaire designed to assess their knowledge and attitudes towards the scheme. Data analysis was done using the Epi-Info statistical software (version 6.04). Statistical tools used included measures of central tendency, frequency distribution and chi-square test. A total of 216 dentists (response rate of 82.4%) participated in this study. Most 132 (61.1%) of the respondents had a fair knowledge of the NHIS, while 22 (10.2%) and 62 (28.7%) had poor and good knowledge respectively. Majority (70.4%) viewed the NHIS as a good idea that will succeed if properly implemented. Most (76.6%) respondents also believed that the scheme will improve access to oral health services, affordability of services (71.4%), availability of the services (68.3%) and recognition of dentistry as a profession (62.4%). Most of the respondents (66.2%) considered oral health care as not properly positioned in the NHIS and 154 respondents (74.4%) found the current position of oral health on the NHIS unacceptable. A good number of the respondents (77.3%) would like dentistry to operate at the primary care level on the NHIS. Majority of the dentists involved in this study had some knowledge of the NHIS and were generally positively disposed towards the scheme and viewed it as a good idea.

  14. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  15. Employing Picture Description to Assess the Students' Descriptive Paragraph Writing

    Directory of Open Access Journals (Sweden)

    Ida Ayu Mega Cahyani

    2018-03-01

    Full Text Available Writing is considered as an important skill in learning process which is needed to be mastered by the students. However, in teaching learning process at schools or universities, the assessment of writing skill is not becoming the focus of learning process and the assessment is administered inappropriately. In this present study, the researcher undertook the study which dealt with assessing descriptive paragraph writing ability of the students through picture description by employing an ex post facto as the research design. The present study was intended to answer the research problem dealing with the extent of the students’ achievement of descriptive paragraph writing ability which is assessed through picture description. The samples under the study were 40 students determined by means of random sampling technique with lottery system. The data were collected through administering picture description as the research instrument. The obtained data were analyzed by using norm-reference measure of five standard values. The results of the data analysis showed that there were 67.50% samples of the study were successful in writing descriptive paragraph, while there were 32.50% samples were unsuccessful in writing descriptive paragraph which was assessed by administering picture description test

  16. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  17. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  18. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  19. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  20. Performance comparison of renewable incentive schemes using optimal control

    International Nuclear Information System (INIS)

    Oak, Neeraj; Lawson, Daniel; Champneys, Alan

    2014-01-01

    Many governments worldwide have instituted incentive schemes for renewable electricity producers in order to meet carbon emissions targets. These schemes aim to boost investment and hence growth in renewable energy industries. This paper examines four such schemes: premium feed-in tariffs, fixed feed-in tariffs, feed-in tariffs with contract for difference and the renewable obligations scheme. A generalised mathematical model of industry growth is presented and fitted with data from the UK onshore wind industry. The model responds to subsidy from each of the four incentive schemes. A utility or ‘fitness’ function that maximises installed capacity at some fixed time in the future while minimising total cost of subsidy is postulated. Using this function, the optimal strategy for provision and timing of subsidy for each scheme is calculated. Finally, a comparison of the performance of each scheme, given that they use their optimal control strategy, is presented. This model indicates that the premium feed-in tariff and renewable obligation scheme produce the joint best results. - Highlights: • Stochastic differential equation model of renewable energy industry growth and prices, using UK onshore wind data 1992–2010. • Cost of production reduces as cumulative installed capacity of wind energy increases, consistent with the theory of learning. • Studies the effect of subsidy using feed-in tariff schemes, and the ‘renewable obligations’ scheme. • We determine the optimal timing and quantity of subsidy required to maximise industry growth and minimise costs. • The premium feed-in tariff scheme and the renewable obligations scheme produce the best results under optimal control

  1. The First Organ-Based Ontology for Arthropods (Ontology of Arthropod Circulatory Systems - OArCS) and its Integration into a Novel Formalization Scheme for Morphological Descriptions.

    Science.gov (United States)

    Wirkner, Christian S; Göpel, Torben; Runge, Jens; Keiler, Jonas; Klussmann-Fricke, Bastian-Jesper; Huckstorf, Katarina; Scholz, Stephan; Mikó, István; J Yoder, Matthew; Richter, Stefan

    2017-09-01

    Morphology, the oldest discipline in the biosciences, is currently experiencing a renaissance in the field of comparative phenomics. However, morphological/phenotypic research still suffers on various levels from a lack of standards. This shortcoming, first highlighted as the "linguistic problem of morphology", concerns the usage of terminology and also the need for formalization of morphological descriptions themselves, something of paramount importance not only to the field of morphology but also when it comes to the use of phenotypic data in systematics and evolutionary biology. We therefore argue, that for morphological descriptions, the basis of all systematic and evolutionary interpretations, ontologies need to be utilized which are based exclusively on structural qualities/properties and which in no case include statements about homology and/or function. Statements about homology and function constitute interpretations on a different or higher level. Based on these "anatomy ontologies", further ontological dimensions (e.g., referring to functional properties or homology) may be exerted for a broad use in evolutionary phenomics. To this end we present the first organ-based ontology for the most species-rich animal group, the Arthropoda. Our Ontology of Arthropod Circulatory Systems (OArCS) contains a comprehensive collection of 383 terms (i.e., labels) tied to 296 concepts (i.e., definitions) collected from the literature on phenotypic aspects of circulatory organ features in arthropods. All of the concepts used in OArCS are based exclusively on structural features, and in the context of the ontology are independent of homology and functional assumptions. We cannot rule out that in some cases, terms are used which in traditional usage and previous accounts might have implied homology and/or function (e.g. heart, sternal artery). Concepts are composed of descriptive elements that are used to classify observed instances into the organizational framework of the

  2. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  3. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  4. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  5. Supervised segmentation of phenotype descriptions for the human skeletal phenome using hybrid methods

    Directory of Open Access Journals (Sweden)

    Groza Tudor

    2012-10-01

    Full Text Available Abstract Background Over the course of the last few years there has been a significant amount of research performed on ontology-based formalization of phenotype descriptions. In order to fully capture the intrinsic value and knowledge expressed within them, we need to take advantage of their inner structure, which implicitly combines qualities and anatomical entities. The first step in this process is the segmentation of the phenotype descriptions into their atomic elements. Results We present a two-phase hybrid segmentation method that combines a series individual classifiers using different aggregation schemes (set operations and simple majority voting. The approach is tested on a corpus comprised of skeletal phenotype descriptions emerged from the Human Phenotype Ontology. Experimental results show that the best hybrid method achieves an F-Score of 97.05% in the first phase and F-Scores of 97.16% / 94.50% in the second phase. Conclusions The performance of the initial segmentation of anatomical entities and qualities (phase I is not affected by the presence / absence of external resources, such as domain dictionaries. From a generic perspective, hybrid methods may not always improve the segmentation accuracy as they are heavily dependent on the goal and data characteristics.

  6. Finite Difference Schemes as Algebraic Correspondences between Layers

    Science.gov (United States)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  7. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  8. A New Scheme for Considering Soil Water-Heat Transport Coupling Based on Community Land Model: Model Description and Preliminary Validation

    Science.gov (United States)

    Wang, Chenghai; Yang, Kai

    2018-04-01

    Land surface models (LSMs) have developed significantly over the past few decades, with the result that most LSMs can generally reproduce the characteristics of the land surface. However, LSMs fail to reproduce some details of soil water and heat transport during seasonal transition periods because they neglect the effects of interactions between water movement and heat transfer in the soil. Such effects are critical for a complete understanding of water-heat transport within a soil thermohydraulic regime. In this study, a fully coupled water-heat transport scheme (FCS) is incorporated into the Community Land Model (version 4.5) to replaces its original isothermal scheme, which is more complete in theory. Observational data from five sites are used to validate the performance of the FCS. The simulation results at both single-point and global scale show that the FCS improved the simulation of soil moisture and temperature. FCS better reproduced the characteristics of drier and colder surface layers in arid regions by considering the diffusion of soil water vapor, which is a nonnegligible process in soil, especially for soil surface layers, while its effects in cold regions are generally inverse. It also accounted for the sensible heat fluxes caused by liquid water flow, which can contribute to heat transfer in both surface and deep layers. The FCS affects the estimation of surface sensible heat (SH) and latent heat (LH) and provides the details of soil heat and water transportation, which benefits to understand the inner physical process of soil water-heat migration.

  9. Towards the ultimate variance-conserving convection scheme

    International Nuclear Information System (INIS)

    Os, J.J.A.M. van; Uittenbogaard, R.E.

    2004-01-01

    In the past various arguments have been used for applying kinetic energy-conserving advection schemes in numerical simulations of incompressible fluid flows. One argument is obeying the programmed dissipation by viscous stresses or by sub-grid stresses in Direct Numerical Simulation and Large Eddy Simulation, see e.g. [Phys. Fluids A 3 (7) (1991) 1766]. Another argument is that, according to e.g. [J. Comput. Phys. 6 (1970) 392; 1 (1966) 119], energy-conserving convection schemes are more stable i.e. by prohibiting a spurious blow-up of volume-integrated energy in a closed volume without external energy sources. In the above-mentioned references it is stated that nonlinear instability is due to spatial truncation rather than to time truncation and therefore these papers are mainly concerned with the spatial integration. In this paper we demonstrate that discretized temporal integration of a spatially variance-conserving convection scheme can induce non-energy conserving solutions. In this paper the conservation of the variance of a scalar property is taken as a simple model for the conservation of kinetic energy. In addition, the derivation and testing of a variance-conserving scheme allows for a clear definition of kinetic energy-conserving advection schemes for solving the Navier-Stokes equations. Consequently, we first derive and test a strictly variance-conserving space-time discretization for the convection term in the convection-diffusion equation. Our starting point is the variance-conserving spatial discretization of the convection operator presented by Piacsek and Williams [J. Comput. Phys. 6 (1970) 392]. In terms of its conservation properties, our variance-conserving scheme is compared to other spatially variance-conserving schemes as well as with the non-variance-conserving schemes applied in our shallow-water solver, see e.g. [Direct and Large-eddy Simulation Workshop IV, ERCOFTAC Series, Kluwer Academic Publishers, 2001, pp. 409-287

  10. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  11. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  12. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  13. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  14. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  15. Feasible Teleportation Schemes with Five-Atom Entangled State

    Institute of Scientific and Technical Information of China (English)

    XUE Zheng-Yuan; YI You-Min; CAO Zhuo-Liang

    2006-01-01

    Teleportation schemes with a five-atom entangled state are investigated. In the teleportation scheme Bell state measurements (BSMs) are difficult for physical realization, so we investigate another strategy using separate measurements instead of BSM based on cavity quantum electrodynamics techniques. The scheme of two-atom entangled state teleportation is a controlled and probabilistic one. For the teleportation of the three-atom entangled state, the scheme is a probabilistic one. The fidelity and the probability of the successful teleportation are also obtained.

  16. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  17. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  18. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  19. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  20. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  1. Distinguishing Features and Similarities Between Descriptive Phenomenological and Qualitative Description Research.

    Science.gov (United States)

    Willis, Danny G; Sullivan-Bolyai, Susan; Knafl, Kathleen; Cohen, Marlene Z

    2016-09-01

    Scholars who research phenomena of concern to the discipline of nursing are challenged with making wise choices about different qualitative research approaches. Ultimately, they want to choose an approach that is best suited to answer their research questions. Such choices are predicated on having made distinctions between qualitative methodology, methods, and analytic frames. In this article, we distinguish two qualitative research approaches widely used for descriptive studies: descriptive phenomenological and qualitative description. Providing a clear basis that highlights the distinguishing features and similarities between descriptive phenomenological and qualitative description research will help students and researchers make more informed choices in deciding upon the most appropriate methodology in qualitative research. We orient the reader to distinguishing features and similarities associated with each approach and the kinds of research questions descriptive phenomenological and qualitative description research address. © The Author(s) 2016.

  2. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  3. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  4. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  5. NWTS conceptual reference repository description (CRRD). Volume 1. Summary

    International Nuclear Information System (INIS)

    1981-05-01

    This report is a Conceptual Reference Repository Description (CRRD) for the terminal storage of spent, unreprocessed fuel assemblies and low-level transuranic waste. It is based on the following three previously prepared conceptual design reports: National Waste Terminal Storage in a Bedded Salt Formation for Spent Unreprocessed Fuel (NWTS-R2), prepared by Kaiser Engineers; National Waste Terminal Storage Repository Number 1 (NWTS-R1), prepared by Stearns-Roger; Spent Fuel Receiving and Packaging Facility Conceptual Design, prepared by Rockwell Hanford Operations and Kaiser Engineers. The CRRD is not itself a conceptual design report, but combines the key features of the above three reports into a description of a reference repository. This description is to be used as a basis for the preparation of a preliminary information report for the repositories. The CRRD discusses from a conceptual engineering standpoint the structures, systems, equipment, and operations necessary to (1) receive unreprocessed spent fuel assemblies via standard shipping casks, (2) offload these assemblies, (3) place the assemblies in canisters, (4) transport the canisters to underground storage locations in the salt dome, and (5) place these canisters in terminal storage. The CRRD also elaborates on the concepts for the retrieval and recovery of the spent fuel after burial; describes the development of the shafts and the underground areas,as well as the supporting operational utility and administrative features of the repository; and discusses the impacts on the reference repository of (1) changes in the waste package concept, (2) dry receiving and dry temporary storage of waste, (3) terminal storage of reprocessing waste, and (4) alternative underground development schemes

  6. A New Shape Description Method Using Angular Radial Transform

    Science.gov (United States)

    Lee, Jong-Min; Kim, Whoi-Yul

    Shape is one of the primary low-level image features in content-based image retrieval. In this paper we propose a new shape description method that consists of a rotationally invariant angular radial transform descriptor (IARTD). The IARTD is a feature vector that combines the magnitude and aligned phases of the angular radial transform (ART) coefficients. A phase correction scheme is employed to produce the aligned phase so that the IARTD is invariant to rotation. The distance between two IARTDs is defined by combining differences in the magnitudes and aligned phases. In an experiment using the MPEG-7 shape dataset, the proposed method outperforms existing methods; the average BEP of the proposed method is 57.69%, while the average BEPs of the invariant Zernike moments descriptor and the traditional ART are 41.64% and 36.51%, respectively.

  7. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  8. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  9. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  10. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  11. A repeat-until-success quantum computing scheme

    International Nuclear Information System (INIS)

    Beige, A; Lim, Y L; Kwek, L C

    2007-01-01

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes

  12. Variable flavor scheme for final state jets

    International Nuclear Information System (INIS)

    Pietrulewicz, P.

    2014-01-01

    In this thesis I describe a setup to treat mass effects from secondary radiation of heavy quark pairs in inclusive hard scattering processes with various dynamical scales. The resulting variable flavor number scheme (VFNS) generalizes a well-known scheme for massive initial state quarks which has been developed for deep inelastic scattering (DIS) in the classical region 1 - x ⁓ O(1) and which will be also discussed here. The setup incorporated in the formalism of Soft-Collinear Effective Theory (SCET) consistently takes into account the effects of massive quark loops and allows to deal with all hierarchies between the mass scale and the involved kinematic scales corresponding to collinear and soft radiation. It resums all large logarithms due to flavor number dependent evolution, achieves both decoupling for very large masses and the correct massless behavior for very small masses, and provides a continuous description in between. In the bulk of this work I will concentrate on DIS in the endpoint region x → 1 serving mainly as a showcase for the concepts and on the thrust distribution for e + e - -collisions in the dijet limit as a phenomenologically relevant example for an event shape. The computations of the corrections to the structures in the factorization theorems are described explicitly for the singular terms at O(α s 2 C F T F ) arising from secondary radiation of massive quarks through gluon splitting. Apart from the soft function for thrust, which requires a dedicated calculation, these results are directly obtained from the corresponding results for the radiation of a massive gauge boson with vector coupling at O(α s ) with the help of dispersion relations, and most of the relevant conceptual and technical issues can be dealt with already at this level. Finally, to estimate the impact of the corrections I carry out a numerical analysis for secondary massive bottom and top quarks on thrust distributions at different center-of-mass energies

  13. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  14. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. On doublet composite schemes of leptons and quarks

    International Nuclear Information System (INIS)

    Pirogov, Yu.F.

    1981-01-01

    All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru

  16. 75 FR 36356 - Announcement of Changes to the Membership of the Performance Review Board

    Science.gov (United States)

    2010-06-25

    ..., ITA (new). 4. Edward C. Yang, Senior Director, China Non-Market Economy Compliance Unit, ITA. 5. Joel... Management, OS. Dated: June 18, 2010. Susan Boggs, Director, Office of Staffing, Recruitment and...

  17. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  18. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  19. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  20. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  1. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  2. What is the optimal myocardial preservation strategy at re-operation for aortic valve replacement in the presence of a patent internal thoracic artery?

    Science.gov (United States)

    Park, Chan B; Suri, Rakesh M; Burkhart, Harold M; Greason, Kevin L; Dearani, Joseph A; Schaff, Hartzell V; Sundt, Thoralf M

    2011-06-01

    The optimal myocardial preservation strategy at re-operation for aortic valve replacement (AVR) after prior coronary artery bypass grafting (CABG) in the presence of a patent internal thoracic artery (ITA) remains undefined. Patients undergoing AVR after prior CABG at our institution between 1 January 1996 and 31 December 2007 were identified; operative notes and outcomes were reviewed. Of 628 patients with prior CABG undergoing AVR with or without concomitant procedures, 427 patients had a patent ITA. In 390, management of the ITA was detailed in the operative note, including 251 in whom it was clamped and 139 in whom it was left uncontrolled. Groups were demographically similar, although re-operative CABG was more frequent in the clamped group (42% vs 23%, poptimal perfusion temperature when the ITA was left uncontrolled. Efforts to control the patent ITA at re-operation for AVR after prior CABG increase risk of injury and may actually increase operative mortality rate compared with leaving this critical graft open and perfusing the heart. Copyright © 2010 European Association for Cardio-Thoracic Surgery. All rights reserved.

  3. Formal description of the jumpstart just-in-time signaling protocol using EFSM

    Science.gov (United States)

    Zaim, A. H.; Baldine, Ilia; Cassada, Mark; Rouskas, George N.; Perros, Harry G.; Stevenson, Daniel S.

    2002-07-01

    We present a formal protocol description for a Just-In-Time (JIT) signaling scheme running over a core dWDM network which utilizes Optical Burst Switches (OBS). We apply an eight-tuple extended finite state machine (EFSM) model to formally specify the protocol. Using the EFSM model, we define the communication between a source client node and a destination client node through an ingress and one or multiple intermediate switches. We worked on single burst connections that means setting up the connection just before sending a single burst and then closing the connection as soon as the burst is sent. The communication between the EFSMs is handled through message transfer between protocol entities.

  4. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  5. Convergent Difference Schemes for Hamilton-Jacobi equations

    KAUST Repository

    Duisembay, Serikbolsyn

    2018-05-07

    In this thesis, we consider second-order fully nonlinear partial differential equations of elliptic type. Our aim is to develop computational methods using convergent difference schemes for stationary Hamilton-Jacobi equations with Dirichlet and Neumann type boundary conditions in arbitrary two-dimensional domains. First, we introduce the notion of viscosity solutions in both continuous and discontinuous frameworks. Next, we review Barles-Souganidis approach using monotone, consistent, and stable schemes. In particular, we show that these schemes converge locally uniformly to the unique viscosity solution of the first-order Hamilton-Jacobi equations under mild assumptions. To solve the scheme numerically, we use Euler map with some initial guess. This iterative method gives the viscosity solution as a limit. Moreover, we illustrate our numerical approach in several two-dimensional examples.

  6. Viscous Corrections of the Time Incremental Minimization Scheme and Visco-Energetic Solutions to Rate-Independent Evolution Problems

    Science.gov (United States)

    Minotti, Luca; Savaré, Giuseppe

    2018-02-01

    We propose the new notion of Visco-Energetic solutions to rate-independent systems {(X, E,} d) driven by a time dependent energy E and a dissipation quasi-distance d in a general metric-topological space X. As for the classic Energetic approach, solutions can be obtained by solving a modified time Incremental Minimization Scheme, where at each step the dissipation quasi-distance d is incremented by a viscous correction {δ} (for example proportional to the square of the distance d), which penalizes far distance jumps by inducing a localized version of the stability condition. We prove a general convergence result and a typical characterization by Stability and Energy Balance in a setting comparable to the standard energetic one, thus capable of covering a wide range of applications. The new refined Energy Balance condition compensates for the localized stability and provides a careful description of the jump behavior: at every jump the solution follows an optimal transition, which resembles in a suitable variational sense the discrete scheme that has been implemented for the whole construction.

  7. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  8. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  9. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  10. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  11. Scheme and scale dependences of leading electroweak corrections

    International Nuclear Information System (INIS)

    Kniehl, B.A.; Sirlin, A.

    1996-01-01

    The scheme and scale dependences of leading M t -dependent contributions to Δρ, Δr, and τ, which arise because of the truncation of the perturbative series, are investigated by comparing expressions in the on-shell and MS schemes of renormalization, and studying their scale variations. Starting from the conventional on-shell formulae, we find rather large scheme and scale dependences. We then propose a simple, physically motivated modification of the conventional expressions and show that it leads to a sharp reduction in the scheme and scale dependences. Implications for electroweak physics are discussed. (orig.)

  12. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  13. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  14. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    Science.gov (United States)

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  15. A novel grain cluster-based homogenization scheme

    International Nuclear Information System (INIS)

    Tjahjanto, D D; Eisenlohr, P; Roters, F

    2010-01-01

    An efficient homogenization scheme, termed the relaxed grain cluster (RGC), for elasto-plastic deformations of polycrystals is presented. The scheme is based on a generalization of the grain cluster concept. A volume element consisting of eight (= 2 × 2 × 2) hexahedral grains is considered. The kinematics of the RGC scheme is formulated within a finite deformation framework, where the relaxation of the local deformation gradient of each individual grain is connected to the overall deformation gradient by the, so-called, interface relaxation vectors. The set of relaxation vectors is determined by the minimization of the constitutive energy (or work) density of the overall cluster. An additional energy density associated with the mismatch at the grain boundaries due to relaxations is incorporated as a penalty term into the energy minimization formulation. Effectively, this penalty term represents the kinematical condition of deformation compatibility at the grain boundaries. Simulations have been performed for a dual-phase grain cluster loaded in uniaxial tension. The results of the simulations are presented and discussed in terms of the effective stress–strain response and the overall deformation anisotropy as functions of the penalty energy parameters. In addition, the prediction of the RGC scheme is compared with predictions using other averaging schemes, as well as to the result of direct finite element (FE) simulation. The comparison indicates that the present RGC scheme is able to approximate FE simulation results of relatively fine discretization at about three orders of magnitude lower computational cost

  16. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  17. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  18. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  19. "Rohkem naisest kui näitlejast..." / Meelis Kapstas

    Index Scriptorium Estoniae

    Kapstas, Meelis, 1963-

    2006-01-01

    Ilmus Ita Everi elulooraamat "Ita Ever. Elu suuruses". Näitlejannad Viire Valdma, Mari-Liis Lill, Ülle Kaljuste, Britta Vahur, Elina Reinold, Kersti Kreismann, Merle Palmiste ja Ülle Ulla avaldavad oma esmamulje raamatust

  20. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  1. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  2. Adaptive Image Transmission Scheme over Wavelet-Based OFDM System

    Institute of Scientific and Technical Information of China (English)

    GAOXinying; YUANDongfeng; ZHANGHaixia

    2005-01-01

    In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.

  3. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  4. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  5. Color encryption scheme based on adapted quantum logistic map

    Science.gov (United States)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  6. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  7. Closed loop identification using a modified Hansen scheme

    DEFF Research Database (Denmark)

    Sekunda, André Krabdrup; Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2015-01-01

    in closed loop [4], and one such method is the Hansen scheme [1]. Standard identification using Hansen scheme demands generating the identification signals indirectly. In this paper it is instead proposed to use the relationship between the Youla factorization of a plant and its stabilizing controller...... in order to keep the system stable. Furthermore because the dynamics of such a system depends on the rotational speed it is needed to conduct an identification while the system is part of a closed loop scheme. The authors believe the paper able to contribute towards a simpler and more direct way...... of identifying closed loop plants using Hansen scheme....

  8. The SS-SCR Scheme for Dynamic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Vinay Thumar

    2012-01-01

    Full Text Available We integrate the two models of Cognitive Radio (CR, namely, the conventional Sense-and-Scavenge (SS Model and Symbiotic Cooperative Relaying (SCR. The resultant scheme, called SS-SCR, improves the efficiency of spectrum usage and reliability of the transmission links. SS-SCR is enabled by a suitable cross-layer optimization problem in a multihop multichannel CR network. Its performance is compared for different PU activity patterns with those schemes which consider SS and SCR separately and perform disjoint resource allocation. Simulation results depict the effectiveness of the proposed SS-SCR scheme. We also indicate the usefulness of cloud computing for a practical deployment of the scheme.

  9. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  10. Fierz transformations and renormalization schemes for fourquark operators

    Directory of Open Access Journals (Sweden)

    Garron Nicolas

    2018-01-01

    Full Text Available It has been shown that the choice of renormalization scheme is crucial for four-quark operators, in particular for neutral kaon mixing beyond the Standard Model. In the context of SMOM schemes, the choice of projector is not unique and is part of the definition of the renormalisation scheme. I present the non-diagonal Fierz relations which relate some of these projectors.

  11. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  12. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  13. The detailed snowpack scheme Crocus and its implementation in SURFEX v7.2

    Science.gov (United States)

    Vionnet, V.; Brun, E.; Morin, S.; Boone, A.; Faroux, S.; Le Moigne, P.; Martin, E.; Willemet, J.-M.

    2012-05-01

    Detailed studies of snow cover processes require models that offer a fine description of the snow cover properties. The detailed snowpack model Crocus is such a scheme, and has been run operationally for avalanche forecasting over the French mountains for 20 yr. It is also used for climate or hydrological studies. To extend its potential applications, Crocus has been recently integrated within the framework of the externalized surface module SURFEX. SURFEX computes the exchanges of energy and mass between different types of surface and the atmosphere. It includes in particular the land surface scheme ISBA (Interactions between Soil, Biosphere, and Atmosphere). It allows Crocus to be run either in stand-alone mode, using a time series of forcing meteorological data or in fully coupled mode (explicit or fully implicit numerics) with atmospheric models ranging from meso-scale models to general circulation models. This approach also ensures a full coupling between the snow cover and the soil beneath. Several applications of this new simulation platform are presented. They range from a 1-D stand-alone simulation (Col de Porte, France) to fully-distributed simulations in complex terrain over a whole mountain range (Massif des Grandes Rousses, France), or in coupled mode such as a surface energy balance and boundary layer simulation over the East Antarctic Ice Sheet (Dome C).

  14. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  15. Space-Time Transformation in Flux-form Semi-Lagrangian Schemes

    Directory of Open Access Journals (Sweden)

    Peter C. Chu Chenwu Fan

    2010-01-01

    Full Text Available With a finite volume approach, a flux-form semi-Lagrangian (TFSL scheme with space-time transformation was developed to provide stable and accurate algorithm in solving the advection-diffusion equation. Different from the existing flux-form semi-Lagrangian schemes, the temporal integration of the flux from the present to the next time step is transformed into a spatial integration of the flux at the side of a grid cell (space for the present time step using the characteristic-line concept. The TFSL scheme not only keeps the good features of the semi-Lagrangian schemes (no Courant number limitation, but also has higher accuracy (of a second order in both time and space. The capability of the TFSL scheme is demonstrated by the simulation of the equatorial Rossby-soliton propagation. Computational stability and high accuracy makes this scheme useful in ocean modeling, computational fluid dynamics, and numerical weather prediction.

  16. Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows.

    Science.gov (United States)

    Li, Q; Luo, K H; Li, X J

    2012-07-01

    The pseudopotential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudoepotential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudopotential LB model. First, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme [Shan and Chen, Phys. Rev. E 47, 1815 (1993)] and the exact-difference-method forcing scheme [Kupershtokh et al., Comput. Math. Appl. 58, 965 (2009)]. The nature of these two schemes and their recovered macroscopic equations will be shown. Second, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudopotential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach to achieving thermodynamic consistency in the pseudopotential LB model.

  17. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  18. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  19. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  20. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  1. Patterns of agri-environmental scheme participation in Europe

    DEFF Research Database (Denmark)

    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren Bech Pilgaard

    2016-01-01

    This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... areas with marginal potential for agriculture. Motives for non-participation were also found to be dependent on the level of farming engagement and on case-area landscape types.......This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... geographical particularities and on subjective factors, farmers' individualities, different rural cultures, landscape types, EU and national policies and special needs of the study areas—all areas where agricultural production is increasingly marginalized, for different reasons. Subsidy scheme participation...

  2. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  3. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  4. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  5. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  6. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  7. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  8. The detailed snowpack scheme Crocus and its implementation in SURFEX v7

    Science.gov (United States)

    Vionnet, V.; Brun, E.; Morin, S.; Boone, A.; Faroux, S.; Le Moigne, P.; Martin, E.; Willemet, J.-M.

    2011-09-01

    Detailed studies of snow cover processes require models that offer a fine description of the snow cover properties. The detailed snowpack model Crocus is such a scheme, and has been run operationally for avalanche forecasting over the French mountains for 20 years. It is also used for climate or hydrological studies. To extend its potential applications, Crocus has been recently integrated within the framework of the externalized surface module SURFEX. SURFEX computes the exchanges of energy and mass between different types of surface, and the atmosphere and includes in particular the land surface scheme ISBA (Interactions between Soil, Biosphere, and Atmosphere). It allows Crocus to be run either in stand-alone mode, using a time series of forcing meteorological data or in fully coupled mode (explicit or fully implicit numerics) with atmospheric models ranging from meso-scale models to general circulation models. This approach also insures a full coupling between the snow cover and the soil beneath. Several applications of this new simulation platform are presented. They range from a 1D stand-alone simulation (Col de Porte, France) to fully-distributed simulations in complex terrain, either in forced mode over a whole mountain range (Massif des Grandes Rousses, France), or in coupled mode such as a snow transport simulation (Col du Lac Blanc, France), or a surface energy balance and boundary layer simulation over a polar ice cap (Dome C, Antarctica).

  9. A tale of CIN--the Cannabis infringement notice scheme in Western Australia.

    Science.gov (United States)

    Lenton, Simon; Allsop, Steve

    2010-05-01

    To describe the development and enactment of the Western Australian (WA) Cannabis Infringement Notice scheme and reflect on the lessons for researchers and policy-makers interested in the translation of policy research to policy practice. An insiders' description of the background research, knowledge transfer strategies and political and legislative processes leading to the enactment and implementation of the WA Cannabis Control Act 2003. Lenton and Allsop were involved centrally in the process as policy-researcher and policy-bureaucrat. In March 2004, Western Australia became the fourth Australian jurisdiction to adopt a 'prohibition with civil penalties' scheme for possession and cultivation of small amounts of cannabis. We reflect upon: the role of research evidence in the policy process; windows for policy change; disseminating findings when apparently no one is listening; the risks and benefits of the researcher as advocate; the differences between working on the inside and outside of government; and the importance of relationships, trust and track record. There was a window of opportunity and change was influenced by research that was communicated by a reliable and trusted source. Those who want to conduct research that informs policy need to understand the policy process more clearly, look for and help create emerging windows that occur in the problem and political spheres, and make partnerships with key stakeholders in the policy arena. The flipside of the process is that, when governments change, policy born in windows of opportunity can be a casualty.

  10. Verifying atom entanglement schemes by testing Bell's inequality

    International Nuclear Information System (INIS)

    Angelakis, D.G.; Knight, P.L.; Tregenna, B.; Munro, W.J.

    2001-01-01

    Recent experiments to test Bell's inequality using entangled photons and ions aimed at tests of basic quantum mechanical principles. Interesting results have been obtained and many loopholes could be closed. In this paper we want to point out that tests of Bell's inequality also play an important role in verifying atom entanglement schemes. We describe as an example a scheme to prepare arbitrary entangled states of N two-level atoms using a leaky optical cavity and a scheme to entangle atoms inside a photonic crystal. During the state preparation no photons are emitted, and observing a violation of Bell's inequality is the only way to test whether a scheme works with a high precision or not. (orig.)

  11. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  12. Effect of Electrocautery on Endothelial Integrity of the Internal Thoracic Artery: Ultrastructural Analysis with Transmission Electron Microscopy

    OpenAIRE

    Onan, Burak; Yeniterzi, Mehmet; Onan, Ismihan Selen; Ersoy, Burak; Gonca, Suheyla; Gelenli, Elif; Solakoglu, Seyhun; Bakir, Ihsan

    2014-01-01

    The internal thoracic artery (ITA) is typically harvested from the chest wall by means of conventional electrocautery. We investigated the effects of electrocautery on endothelial-cell and vessel-wall morphology at the ultrastructural level during ITA harvesting.

  13. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  14. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  15. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  16. [Occlusal schemes of complete dentures--a review of the literature].

    Science.gov (United States)

    Tarazi, E; Ticotsky-Zadok, N

    2007-01-01

    Occlusal scheme is defined as the form and the arrangement of the occlusal contacts in natural and artificial dentition. The choice of an occlusal scheme will determine the pattern of occlusal contacts between opposing teeth during centric relation and functional movement of the mandible. With dentures, the quantity and the intensity of these contacts determine the amount and the direction of the forces that are transmitted through the bases of the denture to the residual ridges. That is why the occlusal scheme is an important factor in the design of complete dentures. Three occlusal schemes are viewed in this review: bilateral balanced occlusion, monplane occlusion, and linear occlusion scheme. Each scheme represents a different concept of occlusion. Comparisons between these schemes are also reviewed and analyzed. The reasoning underlying the bilateral balanced occlusion scheme is that stability of the dentures is attained when bilateral contacts exist throughout all dynamic and static states of the denture during function. Anatomic teeth are used: the upper anterior teeth are set to satisfy aesthetics, and the posterior teeth are arranged in a compensatory curve and a medial curve. This scheme is adequate for well developed residual ridges, with skeletal class I relation. With highly resorbed residual ridges, the vectors of force that are transmitted through anatomic cusps will dislodge the lower denture and thus impair the comfort and efficiency of mastication experienced by the patient. In order to accommodate to the special needs posed by highly resorbed residual ridges and skeletal relations that are not class I, the monoplane scheme of occlusion was designed. This scheme consists of non anatomic (cuspless) teeth, which are set so that the anterior teeth provide the aesthetics, the premolars and the first molars are used for chewing, and the second molars do not occlude (although sometimes they are specifically used to establish bilateral contacts in lateral

  17. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  18. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings......, facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination...

  19. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    Science.gov (United States)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  20. A Hybrid Single-Carrier/Multicarrier Transmission Scheme with Power Allocation

    Directory of Open Access Journals (Sweden)

    Luc Féty

    2007-11-01

    Full Text Available We propose a flexible transmission scheme which easily allows to switch between cyclic-prefixed single-carrier (CP-SC and cyclic-prefixed multicarrier (CP-MC transmissions. This scheme takes advantage of the best characteristic of each scheme, namely, the low peak-to-average power ratio (PAPR of the CP-SC scheme and the robustness to channel selectivity of the CP-MC scheme. Moreover, we derive the optimum power allocation for the CP-SC transmission considering a zero-forcing (ZF and a minimum mean-square error (MMSE receiver. By taking the PAPR into account, we are able to make a better analysis of the overall system and the results show the advantage of the CP-SC-MMSE scheme for flat and mild selective channels due to their low PAPR and that the CP-MC scheme is more advantageous for a narrow range of channels with severe selectivity.

  1. An efficient and provable secure revocable identity-based encryption scheme.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  2. Lattice-Boltzmann scheme for natural convection in porous media

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    1997-01-01

    A lattice-Boltzmann scheme for natural convection in porous media is developed and applied to the heat transfer problem of a 1000 kg potato packaging. The scheme has features new to the field of LB schemes. It is mapped on a orthorhombic lattice instead of the traditional cubic lattice. Furthermore

  3. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  4. An extrapolation scheme for solid-state NMR chemical shift calculations

    Science.gov (United States)

    Nakajima, Takahito

    2017-06-01

    Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.

  5. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  6. Linear source approximation scheme for method of characteristics

    International Nuclear Information System (INIS)

    Tang Chuntao

    2011-01-01

    Method of characteristics (MOC) for solving neutron transport equation based on unstructured mesh has already become one of the fundamental methods for lattice calculation of nuclear design code system. However, most of MOC codes are developed with flat source approximation called step characteristics (SC) scheme, which is another basic assumption for MOC. A linear source (LS) characteristics scheme and its corresponding modification for negative source distribution were proposed. The OECD/NEA C5G7-MOX 2D benchmark and a self-defined BWR mini-core problem were employed to validate the new LS module of PEACH code. Numerical results indicate that the proposed LS scheme employs less memory and computational time compared with SC scheme at the same accuracy. (authors)

  7. Nonoscillatory shock capturing scheme using flux limited dissipation

    International Nuclear Information System (INIS)

    Jameson, A.

    1985-01-01

    A method for modifying the third order dissipative terms by the introduction of flux limiters is proposed. The first order dissipative terms can then be eliminated entirely, and in the case of a scalar conservation law the scheme is converted into a total variation diminishing scheme provided that an appropriate value is chosen for the dissipative coefficient. Particular attention is given to: (1) the treatment of the scalar conservation law; (2) the treatment of the Euler equations for inviscid compressible flow; (3) the boundary conditions; and (4) multistage time stepping and multigrid schemes. Numerical results for transonic flows suggest that a central difference scheme augmented by flux limited dissipative terms can lead to an effective nonoscillatory shock capturing method. 20 references

  8. Explicit TE/TM scheme for particle beam simulations

    International Nuclear Information System (INIS)

    Dohlus, M.; Zagorodnov, I.

    2008-10-01

    In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)

  9. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  10. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  11. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  12. Type monotonic allocation schemes for multi-glove games

    OpenAIRE

    Brânzei, R.; Solymosi, T.; Tijs, S.H.

    2007-01-01

    Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...

  13. A fast iterative scheme for the linearized Boltzmann equation

    Science.gov (United States)

    Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.

    2017-06-01

    Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference

  14. Role of exact exchange in thermally-assisted-occupation density functional theory: A proposal of new hybrid schemes.

    Science.gov (United States)

    Chai, Jeng-Da

    2017-01-28

    We propose hybrid schemes incorporating exact exchange into thermally assisted-occupation-density functional theory (TAO-DFT) [J.-D. Chai, J. Chem. Phys. 136, 154104 (2012)] for an improved description of nonlocal exchange effects. With a few simple modifications, global and range-separated hybrid functionals in Kohn-Sham density functional theory (KS-DFT) can be combined seamlessly with TAO-DFT. In comparison with global hybrid functionals in KS-DFT, the resulting global hybrid functionals in TAO-DFT yield promising performance for systems with strong static correlation effects (e.g., the dissociation of H 2 and N 2 , twisted ethylene, and electronic properties of linear acenes), while maintaining similar performance for systems without strong static correlation effects. Besides, a reasonably accurate description of noncovalent interactions can be efficiently achieved through the inclusion of dispersion corrections in hybrid TAO-DFT. Relative to semilocal density functionals in TAO-DFT, global hybrid functionals in TAO-DFT are generally superior in performance for a wide range of applications, such as thermochemistry, kinetics, reaction energies, and optimized geometries.

  15. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  16. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  17. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  18. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  19. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  20. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  1. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-11-01

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000. Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC, and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure schemes.

  2. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  3. Morphology and function in the Cambrian Burgess Shale megacheiran arthropod Leanchoilia superlata and the application of a descriptive matrix

    Directory of Open Access Journals (Sweden)

    Haug Joachim T

    2012-08-01

    Full Text Available Abstract Background Leanchoilia superlata is one of the best known arthropods from the middle Cambrian Burgess Shale of British Columbia. Here we re-describe the morphology of L. superlata and discuss its possible autecology. The re-description follows a standardized scheme, the descriptive matrix approach, designed to provide a template for descriptions of other megacheiran species. Results Our findings differ in several respects from previous interpretations. Examples include a more slender body; a possible hypostome; a small specialised second appendage, bringing the number of pairs of head appendages to four; a further sub-division of the great appendage, making it more similar to that of other megacheirans; and a complex joint of the exopod reflecting the arthropod’s swimming capabilities. Conclusions Different aspects of the morphology, for example, the morphology of the great appendage and the presence of a basipod with strong median armature on the biramous appendages indicate that L. superlata was an active and agile necto-benthic predator (not a scavenger or deposit feeder as previously interpreted.

  4. On some Approximation Schemes for Steady Compressible Viscous Flow

    Science.gov (United States)

    Bause, M.; Heywood, J. G.; Novotny, A.; Padula, M.

    This paper continues our development of approximation schemes for steady compressible viscous flow based on an iteration between a Stokes like problem for the velocity and a transport equation for the density, with the aim of improving their suitability for computations. Such schemes seem attractive for computations because they offer a reduction to standard problems for which there is already highly refined software, and because of the guidance that can be drawn from an existence theory based on them. Our objective here is to modify a recent scheme of Heywood and Padula [12], to improve its convergence properties. This scheme improved upon an earlier scheme of Padula [21], [23] through the use of a special ``effective pressure'' in linking the Stokes and transport problems. However, its convergence is limited for several reasons. Firstly, the steady transport equation itself is only solvable for general velocity fields if they satisfy certain smallness conditions. These conditions are met here by using a rescaled variant of the steady transport equation based on a pseudo time step for the equation of continuity. Another matter limiting the convergence of the scheme in [12] is that the Stokes linearization, which is a linearization about zero, has an inevitably small range of convergence. We replace it here with an Oseen or Newton linearization, either of which has a wider range of convergence, and converges more rapidly. The simplicity of the scheme offered in [12] was conducive to a relatively simple and clearly organized proof of its convergence. The proofs of convergence for the more complicated schemes proposed here are structured along the same lines. They strengthen the theorems of existence and uniqueness in [12] by weakening the smallness conditions that are needed. The expected improvement in the computational performance of the modified schemes has been confirmed by Bause [2], in an ongoing investigation.

  5. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  6. Simulating deep convection with a shallow convection scheme

    Directory of Open Access Journals (Sweden)

    C. Hohenegger

    2011-10-01

    Full Text Available Convective processes profoundly affect the global water and energy balance of our planet but remain a challenge for global climate modeling. Here we develop and investigate the suitability of a unified convection scheme, capable of handling both shallow and deep convection, to simulate cases of tropical oceanic convection, mid-latitude continental convection, and maritime shallow convection. To that aim, we employ large-eddy simulations (LES as a benchmark to test and refine a unified convection scheme implemented in the Single-column Community Atmosphere Model (SCAM. Our approach is motivated by previous cloud-resolving modeling studies, which have documented the gradual transition between shallow and deep convection and its possible importance for the simulated precipitation diurnal cycle.

    Analysis of the LES reveals that differences between shallow and deep convection, regarding cloud-base properties as well as entrainment/detrainment rates, can be related to the evaporation of precipitation. Parameterizing such effects and accordingly modifying the University of Washington shallow convection scheme, it is found that the new unified scheme can represent both shallow and deep convection as well as tropical and mid-latitude continental convection. Compared to the default SCAM version, the new scheme especially improves relative humidity, cloud cover and mass flux profiles. The new unified scheme also removes the well-known too early onset and peak of convective precipitation over mid-latitude continental areas.

  7. Development of new NDT certification scheme in Singapore

    International Nuclear Information System (INIS)

    Wong, B.S.; Prabhakaran, K.G.; Babu, S.K.; Kuppuswamy, N.

    2009-01-01

    Nondestructive testing plays a vital role in Singapore Industry either it is construction or it it oil and gas. To cope up with the future demands for nondestructive testing personnel and cater to the local industry needs for qualified and certified NDT operators, Nondestructive Testing Society (Singapore)-NDTSS launched the SGNDT Certification Scheme. The aim of the organization is to promote and standardize the quality of NDT through education and training based on a scheme that is on par with internationally recognized 3rd party certifications. The certification also provides a greater confidence to the clients and end users who utilize the NDT test results provided by the certified operators. NDE certification in Singapore varies from industries and currently relies on the in-house certification scheme based on SNT-TC-1A where organizations find it difficult to standardize the skill and reliability of operators. NDE Certification system varies globally from countries to countries. A proper certification system is required to produce successful NDT Practitioners to suit the local industry. This paper outlines the development of Singapore NDT Certification Scheme (SGNDT), the operations, levels of qualification, the method of operation and control measures. The Training and Certification committee, Quality Management system within the certification scheme and the current system practiced in Singapore are discussed in this paper. The paper also highlights the importance of third party certification scheme. (author)

  8. A robust trust establishment scheme for wireless sensor networks.

    Science.gov (United States)

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  9. Possibilities for marker-assisted selection in aquaculture breeding schemes

    International Nuclear Information System (INIS)

    Sonesson, A.K.

    2007-01-01

    FAO estimates that there are around 200 species in aquaculture. However, only a few species have ongoing selective breeding programmes. Marker-assisted selection (MAS) is not used in any aquaculture breeding scheme today. The aim of this chapter, therefore, is to review briefly the current status of aquaculture breeding schemes and to evaluate the possibilities for MAS of aquaculture species. Genetic marker maps have been published for some species in culture. The marker density of these maps is, in general, rather low and the maps are composed of many amplified fragment length polymorphism (AFLP) markers anchored to few microsatellites. Some quantitative trait loci (QTL) have been identified for economically important traits, but they are not yet mapped at a high density. Computer simulations of within-family MAS schemes show a very high increase in genetic gain compared with conventional family-based breeding schemes, mainly due to the large family sizes that are typical for aquaculture breeding schemes. The use of genetic markers to identify individuals and their implications for breeding schemes with control of inbreeding are discussed. (author)

  10. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  11. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  12. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  13. Monotonicity Conditions for Multirate and Partitioned Explicit Runge-Kutta Schemes

    KAUST Repository

    Hundsdorfer, Willem

    2013-01-01

    Multirate schemes for conservation laws or convection-dominated problems seem to come in two flavors: schemes that are locally inconsistent, and schemes that lack mass-conservation. In this paper these two defects are discussed for one-dimensional conservation laws. Particular attention will be given to monotonicity properties of the multirate schemes, such as maximum principles and the total variation diminishing (TVD) property. The study of these properties will be done within the framework of partitioned Runge-Kutta methods. It will also be seen that the incompatibility of consistency and mass-conservation holds for ‘genuine’ multirate schemes, but not for general partitioned methods.

  14. Schemes for Greenberger-Horne-Zeilinger and cluster state preparation

    International Nuclear Information System (INIS)

    Song Jie; Xia Yan; Song Heshan

    2008-01-01

    Schemes to generate Greenberger-Horne-Zeilinger (GHZ) and cluster states of three atoms are proposed in a two-mode cavity. The advantages of the schemes are their robustness against decoherence due to spontaneous emission of the excited states and decay of the cavity modes. Moreover, the schemes can be generalized to generate N-atom entangled states

  15. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Directory of Open Access Journals (Sweden)

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  16. Hybrid flux splitting schemes for numerical resolution of two-phase flows

    Energy Technology Data Exchange (ETDEWEB)

    Flaatten, Tore

    2003-07-01

    This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)

  17. Progress with multigrid schemes for hypersonic flow problems

    International Nuclear Information System (INIS)

    Radespiel, R.; Swanson, R.C.

    1995-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10 6 and Mach numbers up to 25. 32 refs., 31 figs., 1 tab

  18. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  19. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    Science.gov (United States)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  20. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  1. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  2. Additive Difference Schemes for Filtration Problems in Multilayer Systems

    CERN Document Server

    Ayrjan, E A; Pavlush, M; Fedorov, A V

    2000-01-01

    In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.

  3. Computerized calculation scheme for toric intraocular lenses.

    Science.gov (United States)

    Langenbucher, Achim; Seitz, Berthold

    2004-06-01

    While a number of intraocular lens (IOL) power prediction formulae are well established for determination of spherical lenses, no common strategy has been published for the computation of toric IOLs. The purpose of this study is to describe a paraxial computing scheme for tracing an axial pencil of rays through the 'optical system eye' containing astigmatic refractive surfaces with their axes at random. The capabilities of this computing scheme are demonstrated with clinical examples. Based on a schematic model eye with spherocylindric surfaces, we use two alternative notations for description of vergences or prescriptions: (1) standard notation (refraction in both cardinal meridians and axis), and (2) component notation (spherical equivalent and cylindric component in 0 degrees and 45 degrees. Refractive surfaces are added to the vergence in component notation, whereas the transformation of the vergence through media is performed in the standard notation for both cardinal meridians. For calculation of the toric lens implant, a pencil of rays is traced through the spectacle and the cornea to the estimated lens position as well as backwards from the retina to the estimated lens position. For calculation of residual spectacle refraction, a pencil of rays is traced backwards from the retina through the toric lens implant and the cornea to the spectacle plane. In example 1 we calculate a 'thin toric lens' for compensation of a corneal astigmatism to achieve a spherical target refraction. In example 2 we compute a 'thick toric lens', which has to compensate for an oblique corneal astigmatism and rotate the spectacle cylinder to the against the rule position to enhance near vision. In example 3 we estimate the residual refraction at the corneal plane after implantation of a thick toric lens, when the cylinder of the lens implant is compensating the corneal cylinder in part and the axis of implantation is not fully aligned with the axis of the corneal astigmatism. This

  4. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  5. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  6. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  7. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  8. Electronic Excitations in Solution: The Interplay between State Specific Approaches and a Time-Dependent Density Functional Theory Description.

    Science.gov (United States)

    Guido, Ciro A; Jacquemin, Denis; Adamo, Carlo; Mennucci, Benedetta

    2015-12-08

    We critically analyze the performances of continuum solvation models when coupled to time-dependent density functional theory (TD-DFT) to predict solvent effects on both absorption and emission energies of chromophores in solution. Different polarization schemes of the polarizable continuum model (PCM), such as linear response (LR) and three different state specific (SS) approaches, are considered and compared. We show the necessity of introducing a SS model in cases where large electron density rearrangements are involved in the excitations, such as charge-transfer transitions in both twisted and quadrupolar compounds, and underline the very delicate interplay between the selected polarization method and the chosen exchange-correlation functional. This interplay originates in the different descriptions of the transition and ground/excited state multipolar moments by the different functionals. As a result, the choice of both the DFT functional and the solvent polarization scheme has to be consistent with the nature of the studied electronic excitation.

  9. Differences exist across insurance schemes in China post-consolidation.

    Directory of Open Access Journals (Sweden)

    Yang Li

    Full Text Available In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance, URBMI (Urban Resident Basic Medical Insurance, and NCMS (New Cooperative Medical Scheme, across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation.A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket cost, and insurance reimbursement rate.Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate.Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  10. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  11. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  12. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  13. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  14. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  15. Factors affecting sustainability of rural water schemes in Swaziland

    Science.gov (United States)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  16. A multi-criteria evaluation framework for tradable white certificate schemes

    International Nuclear Information System (INIS)

    Mundaca, Luis; Neij, Lena

    2009-01-01

    Recent years have witnessed regained political momentum on energy efficiency and interest in establishing markets is growing. As a result, Tradable White Certificate (TWC) schemes of differing design have been implemented in Great Britain, Italy and France. Much attention is being paid to justifying and evaluating such schemes. In this paper, we develop and apply a multi-criteria framework for evaluating TWC schemes-an approach that attempts to cover their individual design features. A broad evaluation is conducted regarding energy-saving and environmental effectiveness, economic efficiency, cost-effectiveness, transaction costs, political feasibility, administrative burden and technical change. The results show the design and performance of TWC schemes to be case and context-specific, and generalisations are thus inappropriate. This evaluation supports the cost-effectiveness modelled for the British scheme and the assumption that a TWC scheme is an economically efficient policy instrument. For the other, more complex TWC schemes, more data and experience are needed to judge their ex-post merit. On the whole, the proposed multi-criteria evaluation requires considerable data and complementary methods. However, the framework improves the understanding of the broad effects and attributes of TWC schemes. It deals with various empirical and normative aspects that can be applied in their evaluation.

  17. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  18. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  19. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  20. Conservative numerical schemes for Euler-Lagrange equations

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, L. [Universidad Complutense, Madrid (Spain). Dept. de Matematica Aplicada; Jimenez, S. [Universidad Alfonso X El Sabio, Madrid (Spain). Dept. de Matematica Aplicada

    1999-05-01

    As a preliminary step to study magnetic field lines, the authors seek numerical schemes that reproduce at discrete level the significant feature of the continuous model, based on an underling Lagrangian structure. The resulting scheme give discrete counterparts of the variation law for the energy as well of as the Euler-Lagrange equations and their symmetries.

  1. The importance of the ligation of the inferior thyroid artery in parathyroid function after subtotal thyroidectomy

    Directory of Open Access Journals (Sweden)

    Araujo Filho Vergilius José Furtado de

    2000-01-01

    Full Text Available We prospectively studied the effects of the ligation of the inferior thyroid artery (ITA on postoperative hypoparathyroidism in 48 patients who underwent functional subtotal thyroidectomy. Patients were randomized into two groups: A, with bilateral ligation of the ITA and B, without ligation of the ITA. Parathyroid function was checked preoperatively and after surgery by clinical examination and measurement of total calcium, intact PTH, urinary calcium, and AMPc. RESULTS: A significant incidence of postoperative hypocalcemia occurred: 17% in group A and 13% in B on the 4th postoperative day. Six months later, the incidence was 5% in Group A and 0% in Group B. These differences were not statistically significant between the two groups, and neither were any of the other clinical and laboratory observations. CONCLUSION: The ligation of the ITA was not an important causal factor for the occurrence of postoperative hypocalcemia after subtotal thyroidectomy.

  2. Construction of a knowledge classification scheme for sharing and usage of knowledge

    International Nuclear Information System (INIS)

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  3. An improved biometrics-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  4. Privacy preserving cloud computation using Domingo-Ferrer scheme

    Directory of Open Access Journals (Sweden)

    Abdulatif Alabdulatif

    2016-01-01

    Full Text Available Homomorphic encryption system (HES schemes are anticipated to play a significant role in cloud-based applications. Moving to cloud-based storage and analytic services securely are two of the most important advantages of HES. Several HES schemes have been recently proposed. However, the majority of them either have limited capabilities or are impractical in real-world applications. Various HES schemes provide the ability to perform computations for statistical analysis (e.g. average, mean and variance on encrypted data. Domingo-Ferrer is one scheme that has privacy homomorphism properties to perform the basic mathematical operations (addition, subtraction and multiplication in a convenient and secure way. However, it works only in the positive numbers’ range which is considered as a limitation because several applications require both positive and negative ranges in which to work, especially those that have to implement analytical services in cloud computing. In this paper, we extend Domingo-Ferrer’s scheme to be able to perform arithmetic operations for both positive and negative numbers. We also propose using a lightweight data aggregation function to compute both maximum and minimum values of the aggregated data that works for both positive and negative numbers.

  5. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  6. Time-division-multiplex control scheme for voltage multiplier rectifiers

    Directory of Open Access Journals (Sweden)

    Bin-Han Liu

    2017-03-01

    Full Text Available A voltage multiplier rectifier with a novel time-division-multiplexing (TDM control scheme for high step-up converters is proposed in this study. In the proposed TDM control scheme, two full-wave voltage doubler rectifiers can be combined to realise a voltage quadrupler rectifier. The proposed voltage quadrupler rectifier can reduce transformer turn ratio and transformer size for high step-up converters and also reduce voltage stress for the output capacitors and rectifier diodes. An N-times voltage rectifier can be straightforwardly produced by extending the concepts from the proposed TDM control scheme. A phase-shift full-bridge (PSFB converter is adopted in the primary side of the proposed voltage quadrupler rectifier to construct a PSFB quadrupler converter. Experimental results for the PSFB quadrupler converter demonstrate the performance of the proposed TDM control scheme for voltage quadrupler rectifiers. An 8-times voltage rectifier is simulated to determine the validity of extending the proposed TDM control scheme to realise an N-times voltage rectifier. Experimental and simulation results show that the proposed TDM control scheme has great potential to be used in high step-up converters.

  7. An Efficient V2I Authentication Scheme for VANETs

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  8. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  9. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  10. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  11. Scheme for generating Greenberger-Horne-Zeilinger-type states of n photons

    International Nuclear Information System (INIS)

    Sagi, Yoav

    2003-01-01

    In this paper we propose a scheme for creating a three photons Greenberger-Horne-Zeilinger-type (GHZ) state using only linear optics elements and single-photon detectors. We furthermore generalize the scheme for producing any GHZ-like state of n photons. The input state of the scheme consists of a nonentangled state of n photons. Experimental aspects regarding the implementation of the scheme are presented. Finally, the role of such schemes in quantum information processing with photons is discussed

  12. Description of surface systems. Preliminary site description. Forsmark area Version 1.2

    Energy Technology Data Exchange (ETDEWEB)

    Lindborg, Tobias [ed.

    2005-06-01

    Swedish Nuclear Fuel and Waste Management Co (SKB) started site investigations for a deep repository for spent nuclear fuel in 2002 at two different sites in Sweden, Forsmark and Oskarshamn. The investigations should provide necessary information for a license application aimed at starting underground exploration. For this reason, ecosystem data need to be interpreted and assessed into site descriptive models, which in turn are used for safety assessment studies and for environmental impact assessment. Descriptions of the surface system are also needed for further planning of the site investigations. This report describes the surface ecosystems of the Forsmark site (e.g. hydrology, Quaternary deposits, chemistry, vegetation, animals and the human land use). The ecosystem description is an integration of the site and its regional setting, covering the current state of the biosphere as well as the ongoing natural processes affecting the longterm development. Improving the descriptions is important during both the initial and the complete site investigation phase. Before starting of the initial phase in Forsmark, version 0 of the site descriptive model was developed. The results of the initial site investigation phase is compiled into a preliminary site description of Forsmark (version 1.2) in June 2005. This report provides the major input and background to the biosphere description, in the 1.2 version of the Forsmark site description. The basis for this interim version is quality-assured field data from the Forsmark sub area and regional area, available in the SKB SICADA, and GIS data bases as of July 31th 2004 as well as version 1.1 of the Site Descriptive Model. To achieve an ecosystem site description there is a need to develop discipline-specific models by interpreting and analysing primary data. The different discipline-specific models are then integrated into a system describing interactions and flows and stocks of matter between and within functional units in

  13. Description of surface systems. Preliminary site description. Forsmark area Version 1.2

    International Nuclear Information System (INIS)

    Lindborg, Tobias

    2005-06-01

    Swedish Nuclear Fuel and Waste Management Co (SKB) started site investigations for a deep repository for spent nuclear fuel in 2002 at two different sites in Sweden, Forsmark and Oskarshamn. The investigations should provide necessary information for a license application aimed at starting underground exploration. For this reason, ecosystem data need to be interpreted and assessed into site descriptive models, which in turn are used for safety assessment studies and for environmental impact assessment. Descriptions of the surface system are also needed for further planning of the site investigations. This report describes the surface ecosystems of the Forsmark site (e.g. hydrology, Quaternary deposits, chemistry, vegetation, animals and the human land use). The ecosystem description is an integration of the site and its regional setting, covering the current state of the biosphere as well as the ongoing natural processes affecting the longterm development. Improving the descriptions is important during both the initial and the complete site investigation phase. Before starting of the initial phase in Forsmark, version 0 of the site descriptive model was developed. The results of the initial site investigation phase is compiled into a preliminary site description of Forsmark (version 1.2) in June 2005. This report provides the major input and background to the biosphere description, in the 1.2 version of the Forsmark site description. The basis for this interim version is quality-assured field data from the Forsmark sub area and regional area, available in the SKB SICADA, and GIS data bases as of July 31th 2004 as well as version 1.1 of the Site Descriptive Model. To achieve an ecosystem site description there is a need to develop discipline-specific models by interpreting and analysing primary data. The different discipline-specific models are then integrated into a system describing interactions and flows and stocks of matter between and within functional units in

  14. 3D Architecture of Trabecular Bone in the Pig Mandible and Femur: Inter-Trabecular Angle Distributions.

    Science.gov (United States)

    Ben-Zvi, Yehonatan; Reznikov, Natalie; Shahar, Ron; Weiner, Steve

    2017-09-01

    Cancellous bone is an intricate network of interconnected trabeculae, to which analysis of network topology can be applied. The inter-trabecular angle (ITA) analysis - an analysis of network topological parameters and regularity of network-forming nodes, was previously carried out on human proximal femora and showed that trabecular bone follows two main principles: sparsity of the network connectedness (prevalence of nodes with low connectivity in the network) and maximal space spanning (angular offset of connected elements is maximal for their number and approximates the values of geometrically symmetric shapes). These observations suggest that 3D organization of trabecular bone, irrespective of size and shape of individual elements, reflects a tradeoff between minimal metabolic cost of maintenance and maximal network stability under conditions of multidirectional loading. In this study we validate the ITA application using additional 3D structures (cork and 3D-printed metal lattices), analyze the ITA parameters in porcine proximal femora and mandibles and carry out a spatial analysis of the most common node type in the porcine mandibular condyle. The validation shows that the ITA application reliably detects designed or evolved topological parameters. The ITA parameters of porcine trabecular bones are similar to those of human bones. We demonstrate functional adaptation in the pig mandibular condyle by showing that the planar nodes with 3 edges are preferentially aligned in relation to the muscle forces that are applied to the condyle. We conclude that the ITA topological parameters are remarkable conserved, but locally do adapt to applied stresses.

  15. 3D Architecture of Trabecular Bone in the Pig Mandible and Femur: Inter-Trabecular Angle Distributions

    Directory of Open Access Journals (Sweden)

    Yehonatan Ben-Zvi

    2017-09-01

    Full Text Available Cancellous bone is an intricate network of interconnected trabeculae, to which analysis of network topology can be applied. The inter-trabecular angle (ITA analysis—an analysis of network topological parameters and regularity of network-forming nodes—was previously carried out on human proximal femora and showed that trabecular bone follows two main principles: sparsity of the network connectedness (prevalence of nodes with low connectivity in the network and maximal space spanning (angular offset of connected elements is maximal for their number and approximates the values of geometrically symmetric shapes. These observations suggest that 3D organization of trabecular bone, irrespective of size and shape of individual elements, reflects a tradeoff between minimal metabolic cost of maintenance and maximal network stability under conditions of multidirectional loading. In this study, we validate the ITA application using additional 3D structures (cork and 3D-printed metal lattices, analyze the ITA parameters in porcine proximal femora and mandibles, and carry out a spatial analysis of the most common node type in the porcine mandibular condyle. The validation shows that the ITA application reliably detects designed or evolved topological parameters. The ITA parameters of porcine trabecular bones are similar to those of human bones. We demonstrate functional adaptation in the pig mandibular condyle by showing that the planar nodes with three edges are preferentially aligned in relation to the muscle forces that are applied to the condyle. We conclude that the ITA topological parameters are remarkably conserved, but locally do adapt to applied stresses.

  16. Effect of electrocautery on endothelial integrity of the internal thoracic artery: ultrastructural analysis with transmission electron microscopy.

    Science.gov (United States)

    Onan, Burak; Yeniterzi, Mehmet; Onan, Ismihan Selen; Ersoy, Burak; Gonca, Suheyla; Gelenli, Elif; Solakoglu, Seyhun; Bakir, Ihsan

    2014-10-01

    The internal thoracic artery (ITA) is typically harvested from the chest wall by means of conventional electrocautery. We investigated the effects of electrocautery on endothelial-cell and vessel-wall morphology at the ultrastructural level during ITA harvesting. Internal thoracic artery specimens from 20 patients who underwent elective coronary artery bypass grafting were investigated in 2 groups. The ITA grafts were sharply dissected with use of a scalpel and clips in the control group (n=10) and were harvested by means of electrocautery in the study group (n=10). Each sample was evaluated for intimal, elastic-tissue, muscular-layer, and adventitial changes. Free flow was measured intraoperatively. Light microscopic examinations were performed after hematoxylin-eosin and Masson's trichrome staining. Transmission electron microscopy was used to evaluate ultrastructural changes in the endothelial cells and vessel walls of each ITA. In the sharp-dissection group, the endothelial surfaces were lined with normal amounts of original endothelium, endothelial cells were distinctly attached to the basal lamina, cytoplasmic organelles were evident, and intercellular junctional complexes were intact. Conversely, in the electrocautery group, the morphologic integrity of endothelial cells was distorted, with some cell separations and splits, contracted cells, numerous large cytoplasmic vacuoles, and no visible cytoplasmic organelles. The subendothelial layer exhibited disintegration. Free ITA flow was higher in the sharp-dissection group (P=0.04). The integrity of endothelial cells can be better preserved when the ITA is mobilized by means of sharp dissection, rather than solely by electrocautery; we recommend a combined approach.

  17. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  18. An efficient quantum scheme for Private Set Intersection

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  19. A progressive diagonalization scheme for the Rabi Hamiltonian

    International Nuclear Information System (INIS)

    Pan, Feng; Guan, Xin; Wang, Yin; Draayer, J P

    2010-01-01

    A diagonalization scheme for the Rabi Hamiltonian, which describes a qubit interacting with a single-mode radiation field via a dipole interaction, is proposed. It is shown that the Rabi Hamiltonian can be solved almost exactly using a progressive scheme that involves a finite set of one variable polynomial equations. The scheme is especially efficient for the lower part of the spectrum. Some low-lying energy levels of the model with several sets of parameters are calculated and compared to those provided by the recently proposed generalized rotating-wave approximation and a full matrix diagonalization.

  20. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  1. Self-adjusting entropy-stable scheme for compressible Euler equations

    International Nuclear Information System (INIS)

    Cheng Xiao-Han; Nie Yu-Feng; Cai Li; Feng Jian-Hu; Luo Xiao-Yu

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, which is based on entropy variables, is employed to make the numerical diffusion term be automatically added around discontinuities. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy. (paper)

  2. Generalized quantization scheme for two-person non-zero sum games

    International Nuclear Information System (INIS)

    Nawaz, Ahmad; Toor, A H

    2004-01-01

    We proposed a generalized quantization scheme for non-zero sum games which can be reduced to the two existing quantization schemes under an appropriate set of parameters. Some other important situations are identified which are not apparent in the two existing quantization schemes

  3. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  4. Load shedding scheme in the south/southeastern interconnected system

    Energy Technology Data Exchange (ETDEWEB)

    Vieira Filho, Xisto; Couri, J J.G.; Gomes, P; Almeida, P C [ELETROBRAS, Rio de Janeiro, RJ (Brazil)

    1988-12-31

    This paper presents some characteristics of the Brazilian interconnected system and discusses the load shedding scheme in its different stages considering the beginning of operation of the Itaipu power plant. The present situation of the South and Southeastern load shedding scheme combination is also commented. Finally, the interconnected system evolution and the effects on the load shedding schemes are discussed. 4 refs., 5 figs., 2 tabs.

  5. Hardware description languages

    Science.gov (United States)

    Tucker, Jerry H.

    1994-01-01

    Hardware description languages are special purpose programming languages. They are primarily used to specify the behavior of digital systems and are rapidly replacing traditional digital system design techniques. This is because they allow the designer to concentrate on how the system should operate rather than on implementation details. Hardware description languages allow a digital system to be described with a wide range of abstraction, and they support top down design techniques. A key feature of any hardware description language environment is its ability to simulate the modeled system. The two most important hardware description languages are Verilog and VHDL. Verilog has been the dominant language for the design of application specific integrated circuits (ASIC's). However, VHDL is rapidly gaining in popularity.

  6. A Computer Oriented Scheme for Coding Chemicals in the Field of Biomedicine.

    Science.gov (United States)

    Bobka, Marilyn E.; Subramaniam, J.B.

    The chemical coding scheme of the Medical Coding Scheme (MCS), developed for use in the Comparative Systems Laboratory (CSL), is outlined and evaluated in this report. The chemical coding scheme provides a classification scheme and encoding method for drugs and chemical terms. Using the scheme complicated chemical structures may be expressed…

  7. Boudot's Range-Bounded Commitment Scheme Revisited

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    Checking whether a committed integer lies in a specific interval has many cryptographic applications. In Eurocrypt'98, Chan et al. proposed an instantiation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt'2000. Both CFT Proof and Boudot Proof are based on the encryption E(x, r)=g^xh^r mod n, where n is an RSA modulus whose factorization is unknown by the prover. They did not use a single base as usual. Thus an increase in cost occurs. In this paper, we show that it suffices to adopt a single base. The cost of the modified Boudot Proof is about half of that of the original scheme. Moreover, the key restriction in the original scheme, i.e., both the discrete logarithm of g in base h and the discrete logarithm of h in base g are unknown by the prover, which is a potential menace to the Boudot Proof, is definitely removed.

  8. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  9. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  10. A description of the PISC project

    International Nuclear Information System (INIS)

    1979-01-01

    This report, written as an historical review of the Plate Inspection Steering Committee project, records the background of the project and refers in general to the reasons why decisions were made during the four years the project has been running. Details are given in further reports, of which the full list, issued by the Commission of the European Communities, is as follows: Report no.1 - A description of the PISC project. Report no.2 - Ultrasonic examination of the PVRC plates nos. 50/52, 51/53 and 204. Report no.3 - Destructive examination of the PVRC plates nos. 50/52, 51/53 and 204. Report no.4 - Analysis scheme of the PISC trials results. Report no.5 - Evaluation of the PISC trials results. A list of all participants is given. Data and results of the test programme are detailed in the other reports above, but to maintain confidentiality of data the individual teams have been allocated a code number known only to the team and the PISC management. Data are only identified against code numbers. A report on conclusions and recommendations of the whole PISC programme will be published by the OECD-Committee on the Safety of Nuclear Installations (CSNI) and presented at its annual meeting 1979

  11. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  12. Convexity-preserving Bernstein–Bézier quartic scheme

    Directory of Open Access Journals (Sweden)

    Maria Hussain

    2014-07-01

    Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.

  13. Harmonisation between National and International Tradeable Permit Schemes. CATEP Synthesis Paper

    International Nuclear Information System (INIS)

    Haites, E.

    2003-01-01

    It is technically possible to link national emissions trading schemes with widely divergent designs. Where design differences create potential problems, technical solutions are available. The greater the similarity of their designs, the easier schemes are to link. During the 2005 - 2007 period the EU Directive, if it is adopted, will lead to the establishment of at least 25 national emissions trading schemes. The Directive specifies many of the design features of these schemes, but leaves the allocation of allowances, rules for banking allowances into the commitment period, use of the opt-out provision, and a few other design features to Member States. The resulting differences among Member State schemes are unlikely to undermine the links between the schemes established by the Directive. The Community may enter into agreements with non-members for mutual recognition of allowances between their emissions trading schemes, but few, if any, links of this type are expected prior to 2008 for practical reasons. Beginning in 2008, Article 17 of the Kyoto Protocol establishes an international emissions trading scheme that can link the national trading schemes of Annex I Parties. It imposes no requirements for harmonisation on the national emissions trading schemes linked. Some design differences could create technical problems, although solutions are available and at least one of the governments involved has an incentive to solve the problem. Adverse competitiveness impacts due to differences in the distribution of allowances across national schemes may need to be addressed through institutions such as the WTO. Most of the national trading schemes will also be subject to the EU Directive and be subject to greater harmonisation after 2008. The result is likely to be a progressive expansion and integration of greenhouse gas allowance markets over the next decade

  14. On CSM classes via Chern-Fulton classes of f-schemes

    OpenAIRE

    Fullwood, James; Wang, Dongxu

    2015-01-01

    The Chern-Fulton class is a generalization of Chern class to the realm of arbitrary embeddable schemes. While Chern-Fulton classes are sensitive to non-reduced scheme structure, they are not sensitive to possible singularities of the underlying support, thus at first glance are not interesting from a singularity theory viewpoint. However, we introduce a class of formal objects which we think of as `fractional schemes', or f-schemes for short, and then show that when one broadens the domain of...

  15. A beacon interval shifting scheme for interference mitigation in body area networks.

    Science.gov (United States)

    Kim, Seungku; Kim, Seokhwan; Kim, Jin-Woo; Eom, Doo-Seop

    2012-01-01

    This paper investigates the issue of interference avoidance in body area networks (BANs). IEEE 802.15 Task Group 6 presented several schemes to reduce such interference, but these schemes are still not proper solutions for BANs. We present a novel distributed TDMA-based beacon interval shifting scheme that reduces interference in the BANs. A design goal of the scheme is to avoid the wakeup period of each BAN coinciding with other networks by employing carrier sensing before a beacon transmission. We analyze the beacon interval shifting scheme and investigate the proper back-off length when the channel is busy. We compare the performance of the proposed scheme with the schemes presented in IEEE 802.15 Task Group 6 using an OMNeT++ simulation. The simulation results show that the proposed scheme has a lower packet loss, energy consumption, and delivery-latency than the schemes of IEEE 802.15 Task Group 6.

  16. Balanced Central Schemes for the Shallow Water Equations on Unstructured Grids

    Science.gov (United States)

    Bryson, Steve; Levy, Doron

    2004-01-01

    We present a two-dimensional, well-balanced, central-upwind scheme for approximating solutions of the shallow water equations in the presence of a stationary bottom topography on triangular meshes. Our starting point is the recent central scheme of Kurganov and Petrova (KP) for approximating solutions of conservation laws on triangular meshes. In order to extend this scheme from systems of conservation laws to systems of balance laws one has to find an appropriate discretization of the source terms. We first show that for general triangulations there is no discretization of the source terms that corresponds to a well-balanced form of the KP scheme. We then derive a new variant of a central scheme that can be balanced on triangular meshes. We note in passing that it is straightforward to extend the KP scheme to general unstructured conformal meshes. This extension allows us to recover our previous well-balanced scheme on Cartesian grids. We conclude with several simulations, verifying the second-order accuracy of our scheme as well as its well-balanced properties.

  17. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  18. Nonstandard approximation schemes for lower dimensional quantum field theories

    International Nuclear Information System (INIS)

    Fitzpatrick, D.A.

    1981-01-01

    The purpose of this thesis has been to apply two different nonstandard approximation schemes to a variety of lower-dimensional schemes. In doing this, we show their applicability where (e.g., Feynman or Rayleigh-Schroedinger) approximation schemes are inapplicable. We have applied the well-known mean-field approximation scheme by Guralnik et al. to general lower dimensional theories - the phi 4 field theory in one dimension, and the massive and massless Thirring models in two dimensions. In each case, we derive a bound-state propagator and then expand the theory in terms of the original and bound-state propagators. The results obtained can be compared with previously known results thereby show, in general, reasonably good convergence. In the second half of the thesis, we develop a self-consistent quantum mechanical approximation scheme. This can be applied to any monotonic polynomial potential. It has been applied in detail to the anharmonic oscillator, and the results in several analytical domains are very good, including extensive tables of numerical results

  19. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Ansari, Imran Shafique; Pan, Gaofeng; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  20. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang

    2017-08-09

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  1. Applying regional planning schemes in East Jutland, Denmark

    DEFF Research Database (Denmark)

    Grunfelder, Julien; Fertner, Christian

    2010-01-01

    landscapes. A common regional planning scheme is discussed for a while, but nothing is agreed on yet. Our objective is to apply three interesting spatial schemes to our case study region. The three planning schemes are well known for their simple and clear approach: The Fingerplan of Copenhagen urban region...... a development aligned along mass-transport corridors. In the Montpellier case, the planning scheme has the particularity of having a “sight inversion”. Thus, the landscape is presented as an integrated part of the reflection on regional development. In other words, it protects natural and agricultural areas......In the eastern part of Jutland, Denmark, a polycentric urban region is emerging. Besides Århus, the second biggest city of Denmark, several medium-sized cities are located in the area. The region is expected to experience further urbanisation which might result in urban sprawl and threaten valuable...

  2. The National Health Insurance Scheme (NHIS) in the Dormaa Municipality, Ghana: why some residents remain uninsured?

    Science.gov (United States)

    Amo, Thompson

    2014-02-21

    The paper presents a quantitative investigation on the national health insurance scheme (nhis) in dormaa municipality, Ghana: why some residents remain uninsured? Since its implementation has been a little over a decade now. The aim is to identify the obstacles to enrollment by the public which would enable policy direction to ensure that all residents are registered with the scheme. A descriptive and cross-sectional study was conducted between May and July, 2013. Both purposive and simple random sampling technique were used to select 210 respondents and data obtained through self-administered and face-to-face interviews guided by structured questionnaire. chi square (X2) test of independence was adopted to show the association between socioeconomic and demographic features and membership. Findings from the research suggest that residents' decision to enrol have significant associated with gender, education, number of children, place of residence, employment and income. It was also observed that membership is highly affected by premium level. The discussion of the findings and recommendations offered, if incorporated into the policy guideline of NHIS could maintain and at the same time increase enrollment level which would guarantee quality, accessible and affordable basic health care protection for the good people of Ghana.

  3. Market behavior and performance of different strategy evaluation schemes

    OpenAIRE

    Yongjoo Baek; Sang Hoon Lee; Hawoong Jeong

    2010-01-01

    Strategy evaluation schemes are a crucial factor in any agent-based market model, as they determine the agents' strategy preferences and consequently their behavioral pattern. This study investigates how the strategy evaluation schemes adopted by agents affect their performance in conjunction with the market circumstances. We observe the performance of three strategy evaluation schemes, the history-dependent wealth game, the trend-opposing minority game, and the trend-following majority game,...

  4. Mitarbeiteranreizsysteme und Innovationserfolg (Employee suggestion schemes and innovation success)

    OpenAIRE

    Czarnitzki, Dirk; Kraft, Kornelius

    2008-01-01

    "We discuss the determinants of a successful implementation of an employee suggestion scheme and other measures to stimulate innovation success. Subsequently the effects of the employee suggestion schemes are investigated empirically. We analyse the realisation of cost reductions and alternatively sales expansion due to quality improvements. It turns out that employee suggestion schemes have a positive effect on cost efficiency and sales growth. Delegation of decision authority reduces produc...

  5. Accurate adiabatic singlet-triplet gaps in atoms and molecules employing the third-order spin-flip algebraic diagrammatic construction scheme for the polarization propagator

    Energy Technology Data Exchange (ETDEWEB)

    Lefrancois, Daniel; Dreuw, Andreas, E-mail: dreuw@uni-heidelberg.de [Interdisciplinary Center for Scientific Computing, Ruprecht-Karls University, Im Neuenheimer Feld 205, 69120 Heidelberg (Germany); Rehn, Dirk R. [Departments of Physics, Chemistry and Biology, Linköping University, SE-581 83 Linköping (Sweden)

    2016-08-28

    For the calculation of adiabatic singlet-triplet gaps (STG) in diradicaloid systems the spin-flip (SF) variant of the algebraic diagrammatic construction (ADC) scheme for the polarization propagator in third order perturbation theory (SF-ADC(3)) has been applied. Due to the methodology of the SF approach the singlet and triplet states are treated on an equal footing since they are part of the same determinant subspace. This leads to a systematically more accurate description of, e.g., diradicaloid systems than with the corresponding non-SF single-reference methods. Furthermore, using analytical excited state gradients at ADC(3) level, geometry optimizations of the singlet and triplet states were performed leading to a fully consistent description of the systems, leading to only small errors in the calculated STGs ranging between 0.6 and 2.4 kcal/mol with respect to experimental references.

  6. A factorial assessment of the sensitivity of the BATS land-surface parameterization scheme. [BATS (Biosphere-Atmosphere Transfer Scheme)

    Energy Technology Data Exchange (ETDEWEB)

    Henderson-Sellers, A. (Macquarie Univ., North Ryde, New South Wales (Australia))

    1993-02-01

    Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.

  7. Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.

    Science.gov (United States)

    Ullah, Azmat; Malik, Suheel Abdullah; Alimgeer, Khurram Saleem

    2018-01-01

    In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA) with Interior Point Algorithm (IPA) is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.

  8. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  9. A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

    Science.gov (United States)

    Chen, Zhigang; Wang, Jian; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212

  10. Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.

    Directory of Open Access Journals (Sweden)

    Azmat Ullah

    Full Text Available In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA with Interior Point Algorithm (IPA is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.

  11. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  12. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  13. A classification scheme for LWR fuel assemblies

    International Nuclear Information System (INIS)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs

  14. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  15. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  16. Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems

    Directory of Open Access Journals (Sweden)

    Nasir Salh Almisbah

    2012-06-01

    Full Text Available Abstract: Orthogonal Frequency Division Multiplexing (OFDM is an emerging multi-carrier modulation scheme, which has been adopted for several wireless standards such as IEEE 802.11a and HiperLAN2. In OFDM systems, the performance is very sensitive to subcarrier frequency errors (offset. This paper shows the analysis and derivations of intercarrier interference (ICI complex gain that used in self-cancellation scheme and its dependence on subcarrier frequency offset. Simulation shows that better improvement in performance is achieved for systems that use this cancellation scheme. Moreover, analysis and simulation show that theoretical carrier-to-interference ratio (CIR for OFDM with cancellation scheme is greater than conventional one by more than 14dB.

  17. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  18. Improving multivariate Horner schemes with Monte Carlo tree search

    Science.gov (United States)

    Kuipers, J.; Plaat, A.; Vermaseren, J. A. M.; van den Herik, H. J.

    2013-11-01

    Optimizing the cost of evaluating a polynomial is a classic problem in computer science. For polynomials in one variable, Horner's method provides a scheme for producing a computationally efficient form. For multivariate polynomials it is possible to generalize Horner's method, but this leaves freedom in the order of the variables. Traditionally, greedy schemes like most-occurring variable first are used. This simple textbook algorithm has given remarkably efficient results. Finding better algorithms has proved difficult. In trying to improve upon the greedy scheme we have implemented Monte Carlo tree search, a recent search method from the field of artificial intelligence. This results in better Horner schemes and reduces the cost of evaluating polynomials, sometimes by factors up to two.

  19. Interpolation-free scanning and sampling scheme for tomographic reconstructions

    International Nuclear Information System (INIS)

    Donohue, K.D.; Saniie, J.

    1987-01-01

    In this paper a sampling scheme is developed for computer tomography (CT) systems that eliminates the need for interpolation. A set of projection angles along with their corresponding sampling rates are derived from the geometry of the Cartesian grid such that no interpolation is required to calculate the final image points for the display grid. A discussion is presented on the choice of an optimal set of projection angles that will maintain a resolution comparable to a sampling scheme of regular measurement geometry, while minimizing the computational load. The interpolation-free scanning and sampling (IFSS) scheme developed here is compared to a typical sampling scheme of regular measurement geometry through a computer simulation

  20. Optimized difference schemes for multidimensional hyperbolic partial differential equations

    Directory of Open Access Journals (Sweden)

    Adrian Sescu

    2009-04-01

    Full Text Available In numerical solutions to hyperbolic partial differential equations in multidimensions, in addition to dispersion and dissipation errors, there is a grid-related error (referred to as isotropy error or numerical anisotropy that affects the directional dependence of the wave propagation. Difference schemes are mostly analyzed and optimized in one dimension, wherein the anisotropy correction may not be effective enough. In this work, optimized multidimensional difference schemes with arbitrary order of accuracy are designed to have improved isotropy compared to conventional schemes. The derivation is performed based on Taylor series expansion and Fourier analysis. The schemes are restricted to equally-spaced Cartesian grids, so the generalized curvilinear transformation method and Cartesian grid methods are good candidates.