WorldWideScience

Sample records for scheme regulation climatique

  1. Programme de bourses de recherche sur le changement climatique ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Une faculté d'adaptation limitée est souvent reconnue comme l'un des principaux facteurs de vulnérabilité aux changements climatiques. Le programme Adaptation aux changements climatiques en Afrique (ACCA) du CRDI vise à aider les sociétés africaines à faire face aux changements climatiques. Cette subvention ...

  2. Changements climatiques, innovation et technologies de l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  3. Changements climatiques | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    L'objectif du programme Changements climatiques consiste à appuyer des partenariats et des réseaux visant à rassembler des données probantes pour trouver des solutions et utiliser les technologies en vue d'obtenir des gains sociaux et économiques et d'atténuer les effets des changements climatiques pour l'avenir.

  4. Nouveau webinaire IWRA/CRDI sur les changements climatiques et ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    18 avr. 2018 ... Contrats d'options d'eau pour l'adaptation aux changements climatiques à Santiago (Chili);. • Adaptation aux changements climatiques dans les bassins hydrographiques en voie d'urbanisation rapide: enseignements issues d'une approche tenant compte des préoccupations et des facteurs de stress ...

  5. changement climatique, mécanisme actuel de prévention

    African Journals Online (AJOL)

    ACSS

    19 févr. 2015 ... Ainsi, dans un contexte des changements climatiques, cette étude vise ... Mots Clés: Adaptations, Banikoara, Bénin, changement climatique, ...... pastorale sahélienne: cas de l'arrondissement ... Global Environmental Politics.

  6. Irrigation et information climatique au Burkina Faso (CARA) | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les chercheurs évalueront la vulnérabilité des agriculteurs aux changements climatiques de même que les stratégies d'adaptation actuellement en oeuvre. À la lumière de ces évaluations, ils élaboreront des techniques agricoles adaptées au contexte local et visant à réduire les impacts des changements climatiques, ...

  7. Adaptation aux changements climatiques et résilience en Asie du Sud

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  8. Vulnérabilité et adaptation face aux changements climatiques et au ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  9. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  10. Une stratégie adaptive au changement climatique dans le Moyen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Des pratiques d'adaptation et de gestion de risques dans le secteur de l'eau sont en voie d'application dans différents pays et régions du monde à la lumière des impacts de changement climatique prévus. Dans la région MENA, la sensibilisation de toutes les parties prenantes sur la signification du changement climatique ...

  11. L'adaptation aux changements climatiques

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cathy Egan

    plus équitables et plus prospères. Centre de recherches pour le développement international, CP 8500, Ottawa (Ontario) Canada K1G 3H9. Tél. : 613-236-6163 • Télécopieur : 613-238-7230 • Courriel : info@crdi.ca. L'ADAPTATION AUX. CHANGEMENTS CLIMATIQUES. LE RECOURS AUX. ONDES. Les petits exploitants ...

  12. Perceptions locales du changement climatique et mesures d ...

    African Journals Online (AJOL)

    Perceptions locales du changement climatique et mesures d'adaptation dans la ... village, de l'importance représentée par le karité pour les groupes socioculturels. ... l'adaptation de nouvelles cultures en association, la protection des jeunes ...

  13. Vers une éthique climatique plus efficace : motivations et incitations

    Directory of Open Access Journals (Sweden)

    Michel Bourban

    2014-06-01

    Full Text Available Cet article vise à justifier, puis à appliquer une éthique climatique centrée sur les intérêts des acteurs économiques. Après avoir expliqué pourquoi le changement climatique pose un problème important de motivation, je montre pour quelles raisons les incitations peuvent au moins partiellement y remédier. Je développe ensuite deux possibilités d’institutionnalisation de l’éthique des incitations. La première consiste en une taxe internationale augmentant progressivement le coût des émissions de dioxyde de carbone, un dispositif auquel il convient d’ajouter des subsides pour la recherche, le développement et le déploiement des énergies renouvelables. La seconde consiste en un marché global du carbone qui vise également à décourager l’utilisation des combustibles fossiles et à encourager l’utilisation de sources alternatives d’énergie. L’objectif est de montrer qu’une éthique climatique prenant en compte le problème de la motivation est plus efficace qu’une position qui se limite aux devoirs moraux incombant aux consommateurs et producteurs, soit de réduire leurs émissions.

  14. Interactions variations climatiques – insectes ravageurs et ...

    African Journals Online (AJOL)

    ... calamistis et de E. saccharina. De plus l'analyse de la perception des agriculteurs indique l'apparition de «nouveaux» ravageurs tels que les termites, le criquet puant Zonocerus variegatus et une recrudescence des ravageurs de stock. Mots clés: Changements climatiques, Sesamia calamistis, maïs, générations, termites.

  15. Recherche sur l'adaptation aux changements climatiques

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    consortiums travaillent dans des zones vulnérables aux changements climatiques en Afrique et en Asie, notamment dans les bassins hydrographiques alimentés .... Le projet de recherche Pathways to Resilience in Semi-Arid Economies (PRISE) vise à réduire les risques et à opti- miser les possibilités de développement ...

  16. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 août 2011 ... Les eaux grises et la culture en serre augmentent la production alimentaire en Tunisie ... Des chercheurs insistent sur l'importance de favoriser la résilience aux ... Vulnérabilité et adaptation aux changements climatiques des ...

  17. Jean-Baptiste Comby, La Question climatique. Genèse et dépolitisation d’un problème public (Raisons d’Agir, 2015)

    OpenAIRE

    Tasset, Cyprien

    2016-01-01

    Une sociologie de la dépolitisation du changement climatique La radicalité climatique Comment se fait-il que la question du réchauffement climatique, qui est portée à l’attention publique dans les démocraties occidentales depuis de nombreuses années maintenant, n’ait pas abouti à des changements politiques proportionnés à l’extrême gravité que lui prêtent les scientifiques ? Dans La Question climatique, issu d’une thèse en information-communication soutenue en 2008, Jean-Baptiste Comby propos...

  18. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 août 2011 ... À La Soukra, en Tunisie, des centaines de familles à faible revenu vivent des produits de la terre qu'elles cultivent. Or, depuis quelques décennies, ce mode de vie est menacé par l'urbanisation et les changements climatiques.

  19. Changements climatiques | Page 39 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le Moyen-Orient et l'Afrique du Nord connaissent une urbanisation effrénée qui entraîne un grave stress hydrique et nuit à la production alimentaire. Mais la recherche montre comment l'expansion urbaine et la croissance agricole peuvent aller de pair. Axe de recherche. Examiner en quoi les changements climatiques et ...

  20. Vulnérabilité des troupeaux transhumants aux mutations climatiques ...

    African Journals Online (AJOL)

    Vulnérabilité des troupeaux transhumants aux mutations climatiques : analyse des perceptions et adaptations locales dans le bassin de la Sota à Malanville. S Zakari, BAH Tente, I Yabi, IT Imorou, T Tabou, F Afouda, B n'Bessa ...

  1. Des données locales sur les changements climatiques assurent la ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    13 mai 2015 ... Les changements climatiques et la variabilité du climat représentent une menace importante pour l'agriculture, la sécurité alimentaire et les moyens de subsistance en Afrique subsaharienne.

  2. PERCEPTIONS DE LA vARIABILITÉ CLIMATIqUE ET STRATÉGIES ...

    African Journals Online (AJOL)

    pas suivie d'une restauration écologique (Waziri,. 2014). Depuis cette décennie, le Sahel connaît de profonds changements liés à l'environnement climatique et .... l'érosion éolienne. .... la vente du bois énergie et de la vulgarisation des.

  3. Impact des changements climatiques sur l’agriculture dans la plaine de Jeffara sud-est tunisien

    Directory of Open Access Journals (Sweden)

    Houcine Jeder

    2013-12-01

    Full Text Available Cette étude évalue la vulnérabilité de l’agriculture dans la plaine de Jeffera sud-est tunisien aux changements climatiques en utilisant la méthode Ricardienne. Cette méthode consiste à exprimer les revenus nets agricoles en fonction des variables climatiques, édaphiques et socio-économiques. Ces modèles ricardiens ont été testés sur la base des données d’une enquête réalisée dans le cadre de projet de développement dans la plaine Jeffera pour la compagne agricole 2002-2003.  Ces modèles ont permis d’exprimer d’une part la relation qui existe entre le revenu agricole et les variables climatiques (température et précipitation et d’autre part, d’analyser la sensibilité des revenus agricoles par rapport à ces variables climatiques. Des simulations ont été faites sur la base de scenario A2 résultat de la projection faite par le modèle HadCM3 à l’échelle nationale et régionale de la Tunisie.Les résultats de l’étude ont montré que la relation entre le revenu agricole et le climat est non linéaire. De même, les effets négatifs de certaines options d’adaptation ont montré que  l’agriculture dans la plaine de Jeffera est une agriculture paysanne basée sur le travail familial qui nécessite aujourd’hui un capital financier important et une marge de modernisation afin d’améliorer l’activité agricole dans les années futures. Tandis que les effets positifs de certaines autres options peuvent être servir comme des points de réflexion dans l’élaboration des stratégies d’adaptation aux changements climatiques comme l’utilisation des nouvelles technologies d’irrigation et l’intégration de l’activité de l’élevage dans l’exploitation agricole.

  4. Objectif : les zones cruciales au regard des changements climatiques

    International Development Research Centre (IDRC) Digital Library (Canada)

    ruissellement et les phénomènes climatiques extrêmes constituent des menaces pour les deltas en. Afrique et en Asie du Sud, où sont situées quelques-unes des plus grandes villes de la planète. Des centaines de millions de personnes sont exposées, et tout particulièrement celles qui vivent dans des établissements.

  5. La gestion des risques climatiques en Afrique du Sud

    International Development Research Centre (IDRC) Digital Library (Canada)

    CRDI

    ou une variabilité à court terme, mais la plupart des scénarios de changements climatiques prévoient une hausse de leur fréquence. Selon Peter Johnston, du .... Une planification plus éclairée contribuera à sauvegarder des emplois dans le secteur agricole commercial et à réduire les risques pour les agriculteurs démunis.

  6. Aquaculture intérieure et adaptation aux changements climatiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet porte sur l'élevage du tilapia dans de petits étangs fermiers ou des cages flottantes dans les rivières et les réservoirs du nord de la Thaïlande. Les chercheurs exploreront des façons d'adapter les pratiques aquacoles aux changements climatiques et analyseront la valeur de l'aquaculture comme stratégie ...

  7. 118 Variabilité climatique et son incidence sur les ressources en ...

    African Journals Online (AJOL)

    MARTINE

    particulièrement fortes et touchent de nombreux secteurs d'activité. Le changement ... économique était basé sur l'agriculture est très sensible au contexte climatique [8,9]. ..... rupture. 3-2-6 Calcul du coefficient de tarissement : loi de Maillet.

  8. Communication des risques reliés aux changements climatiques en ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    1 janv. 2012 ... Il incombe bien sûr aux gouvernements locaux et nationaux de prendre les décisions relatives à l'adaptation aux changements climatiques; ils doivent toutefois les communiquer aux ménages, aux groupes communautaires et aux entreprises privées afin que ceux-ci prennent les décisions qui s'imposent ...

  9. Impacts économiques et sociaux des changements climatiques sur l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le projet étudiera l'attribution de l'eau dans les divers secteurs productifs des trois bassins et estimera la demande d'eau pour l'agriculture, l'industrie et la consommation domestique. La recherche identifiera les groupes vulnérables touchés par le stress hydrique engendré par les changements climatiques. On fera appel à ...

  10. Le littoral face aux changements climatiques

    OpenAIRE

    Mulot, Vanessa; Vigneron, Anne-Laure; Lambert-Hadid, Marie-Laure

    2011-01-01

    Le changement climatique et l’anthropisation du littoral accentuent le risque de submersion marine sur l’ensemble des côtes. Malgré l’élévation en cours du niveau des mers, l’attractivité du littoral ne décroît pas malgré la connaissance du risque. Ce risque aggravera dans les années à venir les enjeux liés à la submersion marine, parmi lesquels le danger pour les vies humaines, comme l’a malheureusement illustré l’actualité (Xynhia), mais aussi la question de la propriété des biens et des te...

  11. Comparing welfare effects of different regulation schemes: An application to the electricity distribution industry

    International Nuclear Information System (INIS)

    Kopsakangas-Savolainen, Maria; Svento, Rauli

    2010-01-01

    We compare the welfare effects of different regulation schemes of electricity distribution utilities. The compared regulation schemes are Fixed Price regulation, Cost of Service regulation, Menu of Cost-Contingent Contracts and Simple Menu of Contracts. In our calculations we utilize the information of a firm's potential to improve cost efficiency. The firm-specific cost information of Finnish electricity distribution utilities is obtained by using various Stochastic Frontier models. Our basic result is that welfare can be improved by changing the Cost of Service regulation scheme to the Menu of Contracts regulation. Welfare also increases in the case of Fixed Price regulation and Simple Menu of Contract regulation. There is however, a significant difference among regulation regimes on how this improved welfare is distributed to consumers and producers.

  12. Adaptation aux changements climatiques grâce à une gestion ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cette équipe évaluera les problèmes de disponibilité de l'eau et de gestion du bassin versant dans le bassin du Tensift, notamment sur les plans biophysique, écologique, climatique et socio-économique. Elle utilisera des modèles pour estimer les futurs schémas d'utilisation des ressources hydriques afin de déterminer ...

  13. Changement climatique et domaines skiables: simulation en Savoie et Haute-Savoie à l’horizon 2015

    Directory of Open Access Journals (Sweden)

    Jean-Christophe Loubier

    2007-03-01

    Full Text Available Les domaines skiables et le changement climatique posent des questions importantes et nouvelles pour les espaces montagnards. Dans les hautes vallées où ces domaines sont souvent le moteur principal du développement local, on peut s'interroger sur la pérennité du modèle économique de l'or blanc à moyen terme quand les modèles de simulation du climat tablent sur une élévation de la température moyenne comprise entre 1,5° et 5° en 2100. Nous avons tenté de simuler les effets du changement climatique à l'horizon 2015, sur les domaines skiables de Savoie et Haute Savoie.

  14. Les changements climatiques brouillent les prédictions des faiseurs ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    8 oct. 2010 ... Depuis des générations, les autochtones de l'ouest du Kenya comptent sur les pouvoirs mystiques que possèdent les « faiseurs de pluie » du clan Nganyi pour prédire la météo. Cependant, le temps instable amené par les changements climatiques brouille les indices grâce auxquels les faiseurs de pluie ...

  15. Developpement D'un Modele Climatique Regional: Fizr Simulation des Conditions de Janvier de la Cote Ouest Nord Americaine

    Science.gov (United States)

    Goyette, Stephane

    1995-11-01

    Le sujet de cette these concerne la modelisation numerique du climat regional. L'objectif principal de l'exercice est de developper un modele climatique regional ayant les capacites de simuler des phenomenes de meso-echelle spatiale. Notre domaine d'etude se situe sur la Cote Ouest nord americaine. Ce dernier a retenu notre attention a cause de la complexite du relief et de son controle sur le climat. Les raisons qui motivent cette etude sont multiples: d'une part, nous ne pouvons pas augmenter, en pratique, la faible resolution spatiale des modeles de la circulation generale de l'atmosphere (MCG) sans augmenter a outrance les couts d'integration et, d'autre part, la gestion de l'environnement exige de plus en plus de donnees climatiques regionales determinees avec une meilleure resolution spatiale. Jusqu'alors, les MCG constituaient les modeles les plus estimes pour leurs aptitudes a simuler le climat ainsi que les changements climatiques mondiaux. Toutefois, les phenomenes climatiques de fine echelle echappent encore aux MCG a cause de leur faible resolution spatiale. De plus, les repercussions socio-economiques des modifications possibles des climats sont etroitement liees a des phenomenes imperceptibles par les MCG actuels. Afin de circonvenir certains problemes inherents a la resolution, une approche pratique vise a prendre un domaine spatial limite d'un MCG et a y imbriquer un autre modele numerique possedant, lui, un maillage de haute resolution spatiale. Ce processus d'imbrication implique alors une nouvelle simulation numerique. Cette "retro-simulation" est guidee dans le domaine restreint a partir de pieces d'informations fournies par le MCG et forcee par des mecanismes pris en charge uniquement par le modele imbrique. Ainsi, afin de raffiner la precision spatiale des previsions climatiques de grande echelle, nous developpons ici un modele numerique appele FIZR, permettant d'obtenir de l'information climatique regionale valide a la fine echelle spatiale

  16. Adaptation aux changements climatiques au Malawi grâce à l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    28 avr. 2016 ... Depuis 2001, le programme Écosystèmes et santé humaine du CRDI finance au Malawi des recherches centrées sur les liens entre la fertilité des sols, ... L'équipe examine la façon dont la recherche participative peut guider l'élaboration de stratégies d'adaptation aux changements climatiques, dans un ...

  17. Régulation en génie climatique froid, climatisation, chauffage

    CERN Document Server

    Desmons, Jean

    2010-01-01

    Après un rappel des bases de l'électronique et de l'hydraulique nécessaires en régulation climatique, cet ouvrage donne tous les éléments méthodologiques et technologiques pour : concevoir les systèmes de régulation adaptés aux installations de froid, de climatisation et de chauffage ; mettre en oeuvre les régulateurs (entrées / sorties, réglage, paramétrage, dépannage, repérage et contrôle) ; pratiquer la maintenance des installations. Il regroupe notamment plusieurs cas pratiques de régulation d'installations réelles : groupe à eau glacée, bloc opératoire, pompes à chaleur, régulation numérique, détente directe, alimentation en fluide frigoporteur. Cette seconde édition révisée et mise à jour s'enrichit également d'une section sur les installations photovoltaïques et d'un nouveau chapitre sur la régulation numérique et les systèmes informatiques. Cet ouvrage constitue un outil de travail indispensable aux ingénieurs et techniciens en froid et génie climatique et en régu...

  18. Protection des régions semi-arides contre les chocs climatiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 avr. 2016 ... Définition de mésadaptation. Elizabeth Carabine, chercheuse à ... Elle a soutenu que l'inaction délibérée devrait être considérée comme une mésadaptation si elle contribue à augmenter les risques climatiques et les résultats négatifs pour les gens et les collectivités. Selon elle, il faudrait se pencher ...

  19. Variabilité climatique et production maraîchère dans la plaine ...

    African Journals Online (AJOL)

    Cependant, dans les pays au Sud du Sahara, la variabilité climatique représente une grande menace pour la croissance et le développement durable. ... le maraîchage se traduisent entre autres par les inondations, les sécheresses, la baisse des rendements agricoles et le bouleversement du calendrier agricole classique.

  20. Caractérisation de la variabilité climatique : cas du bassin versant ...

    African Journals Online (AJOL)

    DK

    Cette étude présente l'intérêt de certaines méthodes statistiques, pour interpréter la variabilité spatiotemporelle ... Mots-clés : Sécheresse - Variabilité climatique - Fraction pluviométrique - Bassin versant Medjerda - Est de .... global actuel, aussi bien l'espérance ...... de l'Afrique de l'Ouest non sahélienne entre 1950-1989.

  1. La vulnérabilité aux changements climatiques, une expérience ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 avr. 2011 ... Madagascar, la quatrième plus grande île au monde, héberge une multitude de formes de vie qu'on ne trouve nulle part ailleurs sur la planète. Dans la plupart des cas, cette biodiversité est extrêmement vulnérable aux changements climatiques, tout comme l'agriculture pluviale, la pêche et la foresterie, ...

  2. Lutte contre le changement climatique et maîtrise de la demande d’énergie : introduction au dossier thématique

    OpenAIRE

    Aubrée, Loïc; Calvo-Mendieta, Iratxe

    2017-01-01

    Cet article constitue l’introduction du dossier thématique consacré à la lutte contre le changement climatique et la maîtrise de la demande d’énergie. Après un dossier de la Revue Développement Durable et Territoires, paru en décembre 2015 et en juillet 2016, abordant la question du climat sous l’angle de l’adaptation, les articles de ce dossier s’intéressent aux politiques, aux programmes et aux instruments qui contribuent à l’atténuation du changement climatique. L’objectif est la diminutio...

  3. Inventaire des cartes climatiques conservées à la cartothèque de l' IGN

    Directory of Open Access Journals (Sweden)

    Bernadette Joseph

    2010-12-01

    Full Text Available Cet inventaire présente la liste des cartes climatiques étrangères, conservées à la cartothèque de l' IGN. Ce fonds très riche en cartes thématiques n'est actuellement pas répertorié dans les catalogues SUDOC ou OPALE. Il n'est accessible qu'en interne sur fichiers papier.

  4. Les ecarts de financement en matiere d'adaptation aux changements climatiques - avec la perspective des CPDN

    DEFF Research Database (Denmark)

    Olhoff, Anne; Bee, Skylar; Puig, Daniel

    En 2014, le Programme des Nations Unies pour l’Environnement (PNUE) a publié son premier rapport sur les écarts entre besoins et perspectives en matière d’adaptation (AGR 2014) (PNUE, 2014), lequel a permis de poser un cadre préliminaire pour évaluer ces écarts et d’établir une évaluation...... rapport sur les écarts financiers et les options permettant de les combler. Le rapport sera publié au printemps 2016. Cette mise à jour doit contribuer aux débats lors de la 21ème session de la Conférence des Parties (COP 21) à la Convention-Cadre des Nations Unies sur les Changements Climatiques (CCNUCC...... les besoins de financement présentes dans les composantes adaptation des Contributions Prévues Déterminées au niveau National (CPDN) (INDC) – soit les engagements post 2020 que les pays se proposent mettre en oeuvre dans le cadre d’un nouvel accord mondial sur les changements climatiques....

  5. La modélisation intégrée des changements climatiques et les liens ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les changements climatiques influencent la fréquence et l'intensité des phénomènes météorologiques extrêmes, exposant à la fois les populations et les économies à des pertes de vie, de productivité et de propriété. Ce projet aidera les planificateurs et les responsables des politiques à réagir de manière plus efficace en ...

  6. Impact de la variabilité climatique sur le régime des cours d'eau du ...

    African Journals Online (AJOL)

    ... pluies de la “saison sèche” d'été (juillet et août) sont plus élevées depuis quelques décennies, ce qui entretient vraisemblablement une humidité du sol plus élevée favorable au ruissellement au début de la crue d'automne. Mots clefs : changement climatique ; climat équatorial ; séries chronologiques ; Sud Cameroun.

  7. Conférence extérieure - Université de Genève: La modélisation numérique des extrêmes climatiques: Projections pour l'Europe et la Suisse d'ici 2100 - French version only

    CERN Document Server

    2006-01-01

    Université de Genève Ecole de physique 24 quai Ernest Ansermet 1211 Genève 4 Tél : + 41 22 379 63 83 (secrétariat) Tél : + 41 22 379 62 56 (réception) Fax: + 41 22 379 69 22 Lundi 15 janvier 2007 17 heures - Auditoire Stueckelberg La modélisation numérique des extrêmes climatiques: Projections pour l'Europe et la Suisse d'ici 2100 Prof. Martin Beniston / Chaire de Climatologie de l'Université de Genève Les nombreuses catastrophes liées au climat (canicule 2003 en Europe; inondations en Suisse en 2005; sécheresse en Australie; ouragans Katrina, etc.) donnent l'impression que les catastrophes climatiques qui touchent de nombreuses parties du monde sont la preuve du réchauffement climatique. A voir... Pourtant, les changements climatiques représentent l'un des thèmes de préoccupation majeure de ce début du 21e siècle, du moins pour les scientifiques sinon pour le monde politique. Car si l'ampleur, et surtout la rapidité du changement, sont aussi importants que ce que laissent entrevoi...

  8. A logic scheme for regulating safe operation of research reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, E E [Reactor Department, Nuclear Research Center, Atomic Energy Authority, Cairo (Egypt); Effat, A; Rahman, F A [Operational Saety Dept, National Center of Nuclear Safety and Radiation Control Atomic Energy Authority, Cairo (Egypt)

    1997-12-31

    This investigation presents a logic scheme for regulating the safe operation of research reactor in accordance with the new revision of SS-35 and revised by the 10 CFR. It emphasizes the regulatory inspection and enforcement (RI end E) during the reactor operation phase. IT is developed to provide information, guidance and recommendations to be taken when constructing the RI and E program that could be applied to the operational phase of the egyptian Research Reactors. In the operational phase, the regulatory inspection (RI) means an examination, observation, measurement, or test undertaken or on behalf of the nuclear regulatory body (NRB) during operation to verify that the nuclear materials, components, systems and structures as well operational activities, processes, procedures and personnel competence and performance are in accordance with the requirements established or the provisions approved by NRB or specified in the operational license or contained in regulations. Regulatory inspection includes both routine and non-routine ones. Any of them may be announced or unannounced. The problems identified by the RI must be resolved by the proper RE actions. The RE actions include investigative and corrective RE actions. These RI and E procedures for regulating safe operation of research reactors are presented as flow charts and then developed as a computer logic scheme. The software program is very efficient, very friendly, very simple and is interactive in nature such that the program asks the user certain questions about essential steps that guide the (RI and E) for research reactors, and user responds. The program proceeds based on this response until all the necessary steps for (RI and E) are accomplished. 5 figs.

  9. Etude du processus de changement vecu par des familles ayant decide d'adopter volontairement des comportements d'attenuation des changements climatiques

    Science.gov (United States)

    Leger, Michel T.

    Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une

  10. Effet des conditions climatiques sur le niveau du lac Sidi Ali (Moyen Atlas, Maroc)

    OpenAIRE

    Sayad, Ahmed; Chakiri, Saïd; Martin, Claude; Bejjaji, Zohra; Echarfaoui, Hassan

    2012-01-01

    Le lac Sidi Ali est un lac naturel d'altitude (2070-2080 m), sans exutoire superficiel, déterminé par le barrage d'une coulée basaltique. Doté d'un bassin versant apparent de 15,6 km2, il est alimenté par des eaux de ruissellement et par des sources karstiques. Son niveau subit des variations très fortes, annuelles et interannuelles, sous le contrôle des conditions climatiques, et en particulier des pluies et de l'évapotranspiration. Les périodes de sécheresse qui ont marqué les trois dernièr...

  11. Modelisation de l'erosion et des sources de pollution dans le bassin versant Iroquois/Blanchette dans un contexte de changements climatiques

    Science.gov (United States)

    Coulibaly, Issa

    Principale source d'approvisionnement en eau potable de la municipalite d'Edmundston, le bassin versant Iroquois/Blanchette est un enjeu capital pour cette derniere, d'ou les efforts constants deployes pour assurer la preservation de la qualite de son eau. A cet effet, plusieurs etudes y ont ete menees. Les plus recentes ont identifie des menaces de pollution de diverses origines dont celles associees aux changements climatiques (e.g. Maaref 2012). Au regard des impacts des modifications climatiques annonces a l'echelle du Nouveau-Brunswick, le bassin versant Iroquois/Blanchette pourrait etre fortement affecte, et cela de diverses facons. Plusieurs scenarios d'impacts sont envisageables, notamment les risques d'inondation, d'erosion et de pollution a travers une augmentation des precipitations et du ruissellement. Face a toutes ces menaces eventuelles, l'objectif de cette etude est d'evaluer les impacts potentiels des changements climatiques sur les risques d'erosion et de pollution a l'echelle du bassin versant Iroquois/Blanchette. Pour ce faire, la version canadienne de l'equation universelle revisee des pertes en sol RUSLE-CAN et le modele hydrologique SWAT ( Soil and Water Assessment Tool) ont ete utilises pour modeliser les risques d'erosion et de pollution au niveau dans la zone d'etude. Les donnees utilisees pour realiser ce travail proviennent de sources diverses et variees (teledetections, pedologiques, topographiques, meteorologiques, etc.). Les simulations ont ete realisees en deux etapes distinctes, d'abord dans les conditions actuelles ou l'annee 2013 a ete choisie comme annee de reference, ensuite en 2025 et 2050. Les resultats obtenus montrent une tendance a la hausse de la production de sediments dans les prochaines annees. La production maximale annuelle augmente de 8,34 % et 8,08 % respectivement en 2025 et 2050 selon notre scenario le plus optimiste, et de 29,99 % en 2025 et 29,72 % en 2050 selon le scenario le plus pessimiste par rapport a celle

  12. Connecting Payments for Ecosystem Services and Agri-Environment Regulation: An Analysis of the Welsh Glastir Scheme

    Science.gov (United States)

    Wynne-Jones, Sophie

    2013-01-01

    Policy debates in the European Union have increasingly emphasised "Payments for Ecosystem Services" (PES) as a model for delivering agri-environmental objectives. This paper examines the Glastir scheme, introduced in Wales in 2009, as a notable attempt to move between long standing models of European agri-environment regulation and…

  13. Effet des conditions climatiques sur le niveau du lac Sidi Ali (Moyen Atlas, Maroc

    Directory of Open Access Journals (Sweden)

    Claude Martin

    2011-11-01

    Full Text Available Le lac Sidi Ali est un lac naturel d'altitude (2070-2080 m, sans exutoire superficiel, déterminé par le barrage d'une coulée basaltique. Doté d'un bassin versant apparent de 15,6 km2, il est alimenté par des eaux de ruissellement et par des sources karstiques. Son niveau subit des variations très fortes, annuelles et interannuelles, sous le contrôle des conditions climatiques, et en particulier des pluies et de l'évapotranspiration. Les périodes de sécheresse qui ont marqué les trois dernières décennies, se sont traduites par un abaissement du niveau de près de 7 m. Mais les précipitations abondantes des années 2008-09 et 2009-10 ont provoqué une nette remontée. Une régression multiple d'assez bonne qualité (r = 0,87 lie la variation annuelle du niveau (d'août à août à différents paramètres (conditions climatiques et niveau initial du lac.Lake Sidi Ali is a natural lake at high altitude (2070-2080 m, without surface outlet, determined by the dam of a basalt flow. With an apparent catchment of 15.6 km2, it is fed by runoff and karst springs. Its level shows strong annual and interannual variations, depending on weather conditions, particularly rainfall and evapotranspiration. Droughts that have marked the last three decades have resulted in a lowering of about 7 m of the water level. But heavy rainfall that occurred in 2008-09 and 2009-10 caused a marked rise. A multiple regression of sufficient quality (r = 0.87 binds the annual change (from august to august at differents parameters (weather conditions and initial level of the lake.

  14. Gestion Technique Centralisée en Génie Climatique

    CERN Document Server

    Pepinster, P

    1999-01-01

    Il y a une quinzaine d'années, la Division ST a introduit sur les équipements de chauffage et de climatisation du CERN, des systèmes de contrôle locaux à microprocesseur en lieu et place des chaînes de régulation devenues obsolètes. Adoptée dans une volonté d'évolution technologique et dans une démarche de rationalisation des dépenses d'énergie, cette technique s'est répandue sur les différents sites du Laboratoire au fil des années. Depuis les applications de confort climatique dans les bâtiments tertiaires, jusqu'au conditionnement d'air des accélérateurs et des expériences, en passant par l'autocontrôle des chaufferies centrales, ces 'Unités de Traitement Locales' (UTL) sont aujourd'hui interconnectées en un système de Gestion Technique Centralisée d'environ 140 sous-stations. L'objet du document est de présenter la structure actuelle de ce système GTC, d'en montrer les possibilités et l'intérêt dans son exploitation quotidienne au CERN, et d'aborder ses évolutions futures.

  15. Greenhouse gas emission trading schemes: a new tool for the environmental regulator's kit

    International Nuclear Information System (INIS)

    Soleille, Sebastien

    2006-01-01

    As the European Union greenhouse gas emission trading scheme (ETS) is emerging, it seems interesting to look back on previous experiments and to bring together a few elements of reflection about the pertinence of ETS as a new policy tool to regulate industrial pollution. So far, several regulatory tools have been used to decrease pollution. This article focuses on two of them, command-and-control (CAC) and ETS. There is no simple answer to which one is more efficient. It depends strongly on the context. Given a few elements outlined in this paper, the choice of an ETS to abate industrial emissions of greenhouse gases in the European Union (EU) can be considered pertinent. But, ultimately, what makes a scheme environmentally efficient is not the tool in itself (ETS or CAC) but the ambition of the target. Hence the design of the National Allocation Plans setting the emission caps are of paramount importance. They will make the EU ETS either a useless mess or an effective climate change mitigation policy tool

  16. Activation scheme to use performance indicators for the graded regulation on Korean NPPs

    International Nuclear Information System (INIS)

    Hwang, M. J.; Kang, D. I.; Kim, G. R.; Sung, G. Y.

    2003-01-01

    In this paper, we will provide an activation scheme of using performance indicators for graded regulation on Korean Nuclear Power Plants (NPPs). The safe operation of NPPs is the basic objective of nuclear society. To achieve the object, the direction of the regulation is established to regulate the risk of public health and safety. Therefore, it's essential to keep the safety of plants. However, it's not easy to define the appropriate safety level. So, the requirement of performance indicator establishment and framework establishment for safety management has been increased. Performance indicators can provide quantified safety value numerically. Therefore, we can increase the acceptance and trust of the public for safety of NPPs. Also, it helps pridictive regulation through the objective comparison of safety. Moreover, according to the importance of safety, we can allocate the resources effectively and lead an effort for the improvement of safety by comparison among nations and plants. The safety of a plant is affected by not only design but also the quality of operators, appropriate operation, maintenance and test. So, in this paper, we reviewed the application of performance indicators in domestic and foreign countries, and groped for a method to activate the use of performance indicators

  17. Regulation control and energy management scheme for wireless power transfer

    Science.gov (United States)

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  18. Network Regulation and Support Schemes - How Policy Interactions Affect the Integration of Distributed Generation

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Jacobsen, Henrik; Schröder, Sascha Thorsten

    2011-01-01

    This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect distributed generation. Firstly, the incentives of distributed generators and distribution system operators are examined. Frequently there exists a trade......-off between the incentives for these two market agents to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based on five EU Member States. Aspects of operational nature and investments in grid and distributed...

  19. Sound insulation and reverberation time for classrooms - Criteria in regulations and classification schemes in the Nordic countries

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2016-01-01

    Acoustic regulations or guidelines for schools exist in all five Nordic countries. The acoustic criteria depend on room uses and deal with airborne and impact sound insulation, reverberation time, sound absorption, traffic noise, service equipment noise and other acoustic performance...... have become more extensive and stricter during the last two decades. The paper focuses on comparison of sound insulation and reverberation time criteria for classrooms in regulations and classification schemes in the Nordic countries. Limit values and changes over time will be discussed as well as how...... not identical. The national criteria for quality level C correspond to the national regulations or recommendations for new-build. The quality levels A and B are intended to define better acoustic performance than C, and D lower performance. Typically, acoustic regulations and classification criteria for schools...

  20. Evaluation du risque de déstabilisation des infrastructures de haute montagne engendré par le réchauffement climatique dans les Alpes françaises

    OpenAIRE

    Duvillard, Pierre-Allain; Ravanel, Ludovic; Deline, Philip

    2015-01-01

    Dans le contexte du changement climatique actuel, les milieux de haute montagne sont soumis à de profonds bouleversements tels que la fonte des glaciers ou la dégradation du permafrost, à l’origine de mouvements de versant au sein des parois rocheuses comme des formations superficielles. Ces processus impliquent des risques directs de déstabilisation pour les infrastructures (refuges, remontées mécaniques, etc.). Dans un but de prévention de ces risques, un recensement des infrastructures de ...

  1. Aérosols atmosphériques propriétés et impacts climatiques

    CERN Document Server

    Boucher, Olivier

    2012-01-01

    L’hypothèse d’une cause anthropique au réchauffement climatique est désormais considérée comme valide par la très grande majorité de la communauté scientifique. Les gaz à effet de serre ne sont toutefois pas les seuls facteurs de modification du climat. Le rôle des aérosols doit aussi être souligné : il est admis que ces derniers ont partiellement masqué le pouvoir réchauffant des gaz à effet de serre depuis le début de l’ère industrielle. Ils interagissent en outre fortement avec le cycle de l’eau et un certain nombre de cycles biogéochimiques. C’est l’ensemble de ces interactions – entre aérosols, rayonnement, cycle hydrologique, etc. – que ce livre propose de passer en revue. Après avoir décrit les principales propriétés physiques et chimiques des aérosols, le livre expose les principes de modélisation des aérosols à grande échelle ; il décrit ensuite la théorie du transfert radiatif dans l’atmosphère, les techniques de télédétection et d’observati...

  2. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  3. A UK guide to intake fish-screening regulations, policy and best practice with particular reference to hydroelectric power schemes

    Energy Technology Data Exchange (ETDEWEB)

    Turnpenny, A W.H.; Struthers, G; Hanson, P

    1998-07-01

    A review of fish screening regulations in England, Wales, Scotland, and Northern Ireland is presented, and a summary of findings on screening legislation is given. The views of hydroelectric scheme developers, owners and operators are considered, and recommendations including the development of a risk assessment procedure are discussed. Fish screening technology, bypasses and other escape routes, and common fault in screen design and operation are examined, and guidance to Best Practice is given. (UK)

  4. Quel futur pour les services écosystémiques de la forêt alpine dans un contexte de changement climatique ?

    Directory of Open Access Journals (Sweden)

    Benoît Courbaud

    2011-01-01

    Full Text Available La forêt de montagne produit de nombreux services écosystémiques qui vont être affectés par les changements climatiques. On attend une remontée des essences en altitude qui pourrait conduire à une diminution des résineux et des espèces du subalpin. Ces changements d’essences pourraient avoir un impact négatif sur la biodiversité et sur la production de bois d’œuvre. On observe cependant également une augmentation de la productivité favorable à la production de bois énergie et au moins temporairement de bois d’œuvre, ainsi qu’au stockage de carbone. Face à une augmentation possible des évènements climatiques extrêmes, les changements de végétation pourront être marqués par des épisodes de dépérissements, très négatifs pour la filière économique, la protection contre les risques naturels et la biodiversité. Le changement climatique affectera la forêt également de manière indirecte en augmentant la demande en énergie renouvelable et en stockage de carbone. Les incertitudes sur les prédictions de changements de végétation sont élevées, ce qui rend délicate la définition de stratégies d’adaptation de la gestion forestière. Une gestion de crises efficace, un accompagnement des évolutions naturelles de la forêt basé sur une interaction recherche-gestion (gestion adaptative, et la prise en compte explicite de la notion d’incertitude paraissent des éléments essentiels au maintien des services écosystémiques fournis par la forêt.Mountain forests produce a large number of ecosystem services that are going to be affected by climate change. We are expecting an increase in high altitude species that could result in the decrease in resinous and subalpine species. These changes in species could adversely affect biodiversity and timber production. However, we also observe an increase in productivity that favours the production of energy wood and, at least temporarily, timber, as well as carbon

  5. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  6. Pricing schemes for new drugs: a welfare analysis.

    Science.gov (United States)

    Levaggi, Rosella

    2014-02-01

    Drug price regulation is acquiring increasing significance in the investment choices of the pharmaceutical sector. The overall objective is to determine an optimal trade-off between the incentives for innovation, consumer protection, and value for money. However, price regulation is itself a source of distortion. In this study, we examine the welfare properties of listing through a bargaining process and value-based pricing schemes. The latter are superior instruments to uncertain listing processes for maximising total welfare, but the distribution of the benefits between consumers and the industry depends on rate of rebate chosen by the regulator. However, through an appropriate choice, it is always possible to define a value-based pricing scheme with risk sharing, which both consumers and the industry prefer to an uncertain bargaining process. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Concurring Regulation in European Forest Law; Forest Certification and the New EU Timber Regulation

    NARCIS (Netherlands)

    Kistenkas, F.H.

    2013-01-01

    Newly made EU Timber Regulation (EUTR) may prima facie look like competing regulation and an overlap of the existing forest certification schemes of FSC and PEFC as also EUTR combats illegally harvested timber. The novel EUTR, however, is a public law scheme wheras FSC and PEFC are private law

  8. A preliminary assessment of the Normative Framework regulating MAR schemes in Europe: the EU Directives and their Implementation in nine National Legislations

    Directory of Open Access Journals (Sweden)

    Matteo E. Bonfanti

    2014-09-01

    Full Text Available The use of MAR schemes within the European Union is not a new phenomenon, on the contrary it dates back to the beginning of the XIX century. Despite being widely adopted and currently the object of extensive studies, this tool is not soundly regulated and so far very little research has been conducted on the normative framework regulating MAR at the regional and at the national level. This paper draws upon the findings of a Report which represents one of the deliverables identified by MARSOL, a EU FP7 project launched in December 2013 that aims at demonstrating that MAR shall be regarded as a viable approach to address the predicted water shortages over the long term. Through a survey which involved a number of national experts, the researchers involved in the drafting of the Report have collected relevant data concerning the national legal frameworks of nine EU countries that adopt MAR schemes. The results of the questionnaire have been processed using a qualitative and comparative approach and have been duly included in the legal analysis, which covers the implementation at the national level of the two EU Directives relevant for MAR Schemes, i.e. the Water Framework Directive and its “daughter”, the Groundwater Directive. This paper shall be considered as the outcome of a preliminary investigation which covered only a limited number of European countries, it is expected that the research will be carried out as to include a larger number of EU Member States (MSs, alongside the most relevant extra EU countries.

  9. L’équité au cœur des politiques climatiques : l’exemple des négociations relatives au climat et de la recherche de solutions à la crise énergétique

    Directory of Open Access Journals (Sweden)

    Loïc Aubrée

    2011-02-01

    Full Text Available L’article débat de la question de l’équité dans la lutte contre les changements climatiques. Il établit un parallèle entre le développement pris au niveau international de la négociation entre Etats d’une part, et la pauvreté au niveau d’une collectivité d’autre part. Dans les deux cas, il s’agit à la fois d’un principe moral essentiel, mais aussi d’une condition centrale des consensus et donc de la réussite des politiques face au défi climatique. La question de l’équité renvoie aussi très vite au changement nécessaire des modes de vie vers plus de sobriété.The article debates Equity Issues in the Climate Change debate is debated. A parallel is set between the development issues at the international level of negotiations between States, and poverty alleviation at the local community level. In both cases, the discussions stem from an essential moral principle, but also as a requisite for consensus and thus a condition of success of climate change policies to combat Climate Change. The issue of equity brings also forward the necessary modification of consumption patterns, into more frugal modes.

  10. Index-based reactive power compensation scheme for voltage regulation

    Science.gov (United States)

    Dike, Damian Obioma

    2008-10-01

    Increasing demand for electrical power arising from deregulation and the restrictions posed to the construction of new transmission lines by environment, socioeconomic, and political issues had led to higher grid loading. Consequently, voltage instability has become a major concern, and reactive power support is vital to enhance transmission grid performance. Improved reactive power support to distressed grid is possible through the application of relatively unfamiliar emerging technologies of "Flexible AC Transmission Systems (FACTS)" devices and "Distributed Energy Resources (DERS)." In addition to these infrastructure issues, a lack of situational awareness by system operators can cause major power outages as evidenced by the August 14, 2003 widespread North American blackout. This and many other recent major outages have highlighted the inadequacies of existing power system indexes. In this work, a novel "Index-based reactive compensation scheme" appropriate for both on-line and off-line computation of grid status has been developed. A new voltage stability index (Ls-index) suitable for long transmission lines was developed, simulated, and compared to the existing two-machine modeled L-index. This showed the effect of long distance power wheeling amongst regional transmission organizations. The dissertation further provided models for index modulated voltage source converters (VSC) and index-based load flow analysis of both FACTS and microgrid interconnected power systems using the Newton-Raphson's load flow model incorporated with multi-FACTS devices. The developed package has been made user-friendly through the embodiment of interactive graphical user interface and implemented on the IEEE 14, 30, and 300 bus systems. The results showed reactive compensation has system wide-effect, provided readily accessible system status indicators, ensured seamless DERs interconnection through new islanding modes and enhanced VSC utilization. These outcomes may contribute

  11. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  12. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...... infrastructure. Economic operation of existing decentralized schemes is also usually achieved by either tuning the droop characteristics of distributed generators (DGs) or prioritizing their dispatch order. For the latter, an earlier scheme has tried to prioritize the DG dispatch based on their no...

  13. Development scheme of the public power transportation network

    International Nuclear Information System (INIS)

    2005-01-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  14. Acoustic classification of buildings in Europe – Main characteristics of national schemes for housing, schools, hospitals and office buildings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2018-01-01

    schemes define limit values for a number of acoustic performance areas, typically airborne and impact sound insulation, service equipment noise, traffic noise and reverberation time, i.e. the same as in regulations. Comparative studies of the national acoustic classification schemes in Europe show main......Building regulations specify minimum requirements, and more than ten countries in Europe have published national acoustic classification schemes with quality classes, the main purpose being to introduce easy specification of stricter acoustic criteria than defined in regulations. The very first...... classification schemes were published in the mid 1990’es and for dwellings only. Since then, more countries have introduced such schemes, some including also other building categories like e.g. schools, hospitals and office buildings, and the first countries have made updates more times. Acoustic classification...

  15. Remote automatic control scheme for plasma arc cutting of contaminated waste

    International Nuclear Information System (INIS)

    Dudar, A.M.; Ward, C.R.; Kriikku, E.M.

    1993-01-01

    The Robotics Development Group at the Savannah River Technology Center has developed and implemented a scheme to perform automatic cutting of metallic contaminated waste. The scheme employs a plasma arc cutter in conjunction with a laser ranging sensor attached to a robotic manipulator called the Telerobot. A software algorithm using proportional control is then used to perturb the robot's trajectory in such a way as to regulate the plasma arc standoff and the robot's speed in order to achieve automatic plasma arc cuts. The scheme has been successfully tested on simulated waste materials and the results have been very favorable. This report details the development and testing of the scheme

  16. Sound classification schemes in Europe - Quality classes intended for renovated housing

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2010-01-01

    exposure in the home included in the proposed main objectives for a housing policy. In most countries in Europe, building regulations specify minimum requirements concerning acoustical conditions for new dwellings. In addition, several countries have introduced sound classification schemes with classes...... intended to reflect different levels of acoustical comfort. Consequently, acoustic requirements for a dwelling can be specified as the legal minimum requirements or as a specific class in a classification scheme. Most schemes have both higher classes than corresponding to the regulatory requirements...

  17. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...... for quality of life, information about acoustic conditions is rarely available, neither for new or existing housing. Regulatory acoustic requirements will, if enforced, ensure a corresponding quality for new dwellings, but satisfactory conditions for occupants are not guaranteed. Consequently, several...

  18. Comparison of nutrient profiling schemes for restricting the marketing of food and drink to children.

    Science.gov (United States)

    Brinsden, H; Lobstein, T

    2013-08-01

    The food and beverage industry have made voluntary pledges to reduce children's exposure to the marketing of energy-dense foods and beverages, and in 2012 announced the replacement of company-specific nutrient profiling schemes with uniform sets of criteria from 2013 (in the USA) and 2014 (in the European Union [EU]). To compare the proposed USA and EU nutrient profiling schemes and three government-led schemes, paying particular attention to the differences in sugar criteria. Food and beverage products permitted to be advertised in the USA under pre-2013 criteria were examined using five nutrient profiling schemes: the forthcoming USA and EU schemes and three government-approved schemes: the US Interagency Working Group (IWG) proposals, the United Kingdom Office of Communications (OfCom) regulations and the Danish Forum co-regulatory Code. Under the new USA and EU nutrient profiling schemes, 88 (49%) and 73 (41%) of a total of 178 products would be permitted to be advertised, respectively. The US IWG permitted 25 (14%) products; the Ofcom regulations permitted 65 (37%) and the Danish Code permitted 13 (7%). Government-led schemes are significantly more restrictive than industry-led schemes, primarily due to their tougher sugar criteria. The Danish Forum (93%) and USA IWG scheme (86%) are the most restrictive of the five examined. Further harmonization of nutrient profiling schemes is needed to reduce children's exposure to the promotion of energy-dense foods. © 2013 The Authors. Pediatric Obesity © 2013 International Association for the Study of Obesity.

  19. Economic incentives and alternative nitrogen regulation schemes

    DEFF Research Database (Denmark)

    Jensen, Jørgen Dejgård; Ørum, Jens Erik

    2014-01-01

    The objective of this chapter is to investigate economic incentives associated with changes in nitrogen regulation, including the distribution between farm types and geographically. The analysis is carried out on a partial equilibrium simulation model of the Danish agricultural sector—ESMERALDA. ...

  20. Acoustic classification schemes in Europe – Applicability for new, existing and renovated housing

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2016-01-01

    The first acoustic classification schemes for dwellings were published in the 1990’es as national standards with the main purpose to introduce the possibility of specifying easily stricter acoustic criteria for new-build than the minimum requirements found in building regulations. Since then, more...... countries have introduced acoustic classification schemes, the first countries updated more times and some countries introduced acoustic classification also for other building categories. However, the classification schemes continued to focus on new buildings and have in general limited applicability...... for existing buildings from before implementation of acoustic regulations, typically in the 1950’es or later. The paper will summarize main characteristics, differences and similarities of the current national quality classes for housing in ten countries in Europe. In addition, the status and challenges...

  1. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  2. Price regulation to remove EE-DSM disincentives and pressure for increased energy sales in monopoly segments of restructured electricity and gas markets: the multiple drivers target (MDT) tariff scheme

    International Nuclear Information System (INIS)

    Pagliano, L.; Alari, P.; Ruggieri, G.; Irrek, W.; Thomas, S.; Leprich, U.

    2002-01-01

    Even in restructured markets a part of the energy business remains a monopoly and should be correctly regulated. We present an analysis which reveals common structures in schemes enacted in UK, Norway, Portugal and recently (on the basis of this study) in Italy. The identified structure, which we named Multiple Driver Target (MDT) regulation is a performance-based regulation scheme, which provides incentives for greater economic efficiency, without creating biases against environmental efficiency. The method relies on a statistical analysis of the correlation of utility costs and a few 'cost drivers' (e.g. number of customers served, grid length, sold or transported energy). We discuss how MDT can be used to set price levels and price changes in the regulatory period in such a way to correctly match the evolution of costs and avoid awarding unwanted signals to utilities. At the opposite, pure Price Cap regulation provides artificial incentives to utilities to increase energy sales (even if this is not economic for the customers nor for society ) beyond the predicted levels foreseen in the price fixing Rate Cases. We show that Under MDT regulation the reduction in profits due to reduced sales as a consequence of DSM is minimised. In so doing this procedure removes the most important disincentive for utilities to implement DSM programmes since lost profits due to reduced sales can be substantially higher than direct costs of DSM programmes; once MDT regulation is in place, also these direct costs can be recovered through a small part of the tariff. We also discuss how MDT can be implemented with a moderate effort by regulatory authorities. (author)

  3. Status Review of Renewable and Energy Efficiency Support Schemes in Europe

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-09-15

    This document forms the latest update to the regular CEER Status Review of Renewable Energy and Energy Efficiency Support Schemes in Europe and builds on the previous CEER report C10-SDE-19-04a. The purpose of Status Review publications is to collect comparable data on RES support in Europe in order to provide policy-makers, regulators and industry participants with information on support schemes for electricity from renewable energy sources, by technology and type of instrument (e.g. Feed-in tariffs and Green Certificates). To collect this data, a questionnaire was circulated to CEER members in July 2012, to explore the renewable electricity support schemes currently in place in Member States across Europe.

  4. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  5. Change in the financing scheme for radioactive waste in Germany

    International Nuclear Information System (INIS)

    Svobodová, Tereza

    2018-01-01

    Financing radioactive waste management is an issue every country using nuclear power has to deal with. A European directive even makes this binding for Euratom Member States. Germany changed its financing scheme entirely during the past year, thereby moving closer to other states' schemes. Germany replaced the funds put aside by the operators with a public fund to which the companies contribute. Now it is the government that is responsible for radioactive waste. This paper describes the regulation and information collection system on the European level and analyses the former and current German systems, their advantages and potential hazards. (orig.)

  6. Coordinated Voltage Control Scheme for VSC-HVDC Connected Wind Power Plants

    DEFF Research Database (Denmark)

    Guo, Yifei; Gao, Houlei; Wu, Qiuwei

    2017-01-01

    This paper proposes a coordinated voltage control scheme based on model predictive control (MPC) for voltage source converter‐based high voltage direct current (VSC‐HVDC) connected wind power plants (WPPs). In the proposed scheme, voltage regulation capabilities of VSC and WTGs are fully utilized...... and optimally coordinated. Two control modes, namely operation optimization mode and corrective mode, are designed to coordinate voltage control and economic operation of the system. In the first mode, the control objective includes the bus voltages, power losses and dynamic Var reserves of wind turbine...

  7. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Science.gov (United States)

    Heffernan, Claire; Azbel-Jackson, Lena; Brownlie, Joe; Gunn, George

    2016-01-01

    The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such) and peer to peer monitoring (where individuals evaluate other's behaviour). Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme). The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  8. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Directory of Open Access Journals (Sweden)

    Claire Heffernan

    Full Text Available The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such and peer to peer monitoring (where individuals evaluate other's behaviour. Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme. The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  9. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  10. Using a Novel Wireless-Networked Decentralized Control Scheme under Unpredictable Environmental Conditions.

    Science.gov (United States)

    Chang, Chung-Liang; Huang, Yi-Ming; Hong, Guo-Fong

    2015-11-12

    The direction of sunshine or the installation sites of environmental control facilities in the greenhouse result in different temperature and humidity levels in the various zones of the greenhouse, and thus, the production quality of crop is inconsistent. This study proposed a wireless-networked decentralized fuzzy control scheme to regulate the environmental parameters of various culture zones within a greenhouse. The proposed scheme can create different environmental conditions for cultivating different crops in various zones and achieve diversification or standardization of crop production. A star-type wireless sensor network is utilized to communicate with each sensing node, actuator node, and control node in various zones within the greenhouse. The fuzzy rule-based inference system is used to regulate the environmental parameters for temperature and humidity based on real-time data of plant growth response provided by a growth stage selector. The growth stage selector defines the control ranges of temperature and humidity of the various culture zones according to the leaf area of the plant, the number of leaves, and the cumulative amount of light. The experimental results show that the proposed scheme is stable and robust and provides basis for future greenhouse applications.

  11. Using a Novel Wireless-Networked Decentralized Control Scheme under Unpredictable Environmental Conditions

    Directory of Open Access Journals (Sweden)

    Chung-Liang Chang

    2015-11-01

    Full Text Available The direction of sunshine or the installation sites of environmental control facilities in the greenhouse result in different temperature and humidity levels in the various zones of the greenhouse, and thus, the production quality of crop is inconsistent. This study proposed a wireless-networked decentralized fuzzy control scheme to regulate the environmental parameters of various culture zones within a greenhouse. The proposed scheme can create different environmental conditions for cultivating different crops in various zones and achieve diversification or standardization of crop production. A star-type wireless sensor network is utilized to communicate with each sensing node, actuator node, and control node in various zones within the greenhouse. The fuzzy rule-based inference system is used to regulate the environmental parameters for temperature and humidity based on real-time data of plant growth response provided by a growth stage selector. The growth stage selector defines the control ranges of temperature and humidity of the various culture zones according to the leaf area of the plant, the number of leaves, and the cumulative amount of light. The experimental results show that the proposed scheme is stable and robust and provides basis for future greenhouse applications.

  12. SOME COMMENTS ON THE SCHEME OF ARRANGEMENT AS AN AN "AFFECTED TRANSACTION" AS DEFINED IN THE COMPANIES ACT 71 OF 2008

    Directory of Open Access Journals (Sweden)

    Stephanie M Luiz

    2012-12-01

    Full Text Available A scheme of arrangement involving a regulated company and its shareholders is defined as an "affected transaction" in the Companies Act 71 of 2008. Although scheme of arrangements, which can be used to achieve a takeover of a company, are a common occurrence, the Act provides no definition of such schemes. The importance of knowing what actually constitutes a scheme of arrangement becomes apparent when it is noted that section 121 of the Actprovides that any person making an offer which if accepted would result in an affected transaction is obliged to comply with all the relevant reporting and approval requirements in the Act, as well as the Takeover Regulations, unless the Takeover Regulation Panel has granted an exemption. Giving effect to an affected transaction is prohibited, unless the Panel has issued a compliance certificate or granted an exemption. The article comments generally on the definition of a scheme of arrangement as an affected transaction, highlighting the elements of a scheme of arrangement. Specific consideration is given to transactions which include a re-acquisition by the company of its own previously issued securities and when such a re-acquisition on its own would be considered to be a scheme of arrangement and an affected transaction. Comment on the obligation to appoint an independent expert to report on the scheme and the relevance, if any, of the solvency and liquidity of the company embarking on a scheme of arrangement is included. Finally, consideration is given to the need to have a scheme of arrangement approved by a special resolution and the potential exclusion of certain voting rights. The article exposes a number of difficulties with the interpretation of the applicable provisions and suggests that these need to be revisited by the legislature for clarification.

  13. Swedish-Norwegian tradable green certificates: Scheme design flaws and perceived investment barriers

    International Nuclear Information System (INIS)

    Linnerud, Kristin; Simonsen, Morten

    2017-01-01

    The EU Commission recommends using market-based support schemes for renewable-electricity projects. One example is the Swedish-Norwegian tradable green certificate scheme. We examine whether design features in the Norwegian part of this scheme, specifically, the scheme's short duration and the way it is to be abruptly terminated, contribute to investors' perceptions of barriers. We apply econometric techniques on primary data collected in two surveys of Norwegian investors in hydropower, and we use real options theory to predict and interpret investors' responses. We show that: (1) immediately after the scheme was introduced, investors are eager to lock in future subsidies by investing immediately and concerned with factors that may delay the completion of their projects; (2) as the certificate deadline neared, investors have become increasingly pessimistic and concerned with economic and risk barriers. Investors in big hydropower plants with regulation reservoirs are particularly concerned with the risk of not completing their projects in time to gain the right to sell certificates. These findings are consistent with the predicted responses to the scheme design derived from real options theory. In contrast to earlier studies, we find no difference in responses to the scheme design across investor types. - Highlights: • The Swedish-Norwegian tradable green certificate scheme is intended to promote cost-efficiency. • We examine the optimism about and barriers against investing in new hydropower projects in Norway. • We find that scheme design may have contributed to barriers against Norwegian hydropower projects. • Thus, scheme design flaws may have prevented the scheme from working as intended. • These findings are consistent with real options theory predictions.

  14. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  15. Power-Smoothing Scheme of a DFIG Using the Adaptive Gain Depending on the Rotor Speed and Frequency Deviation

    DEFF Research Database (Denmark)

    Lee, Hyewon; Hwang, Min; Muljadi, Eduard

    2017-01-01

    In an electric power grid that has a high penetration level of wind, the power fluctuation of a large-scale wind power plant (WPP) caused by varying wind speeds deteriorates the system frequency regulation. This paper proposes a power-smoothing scheme of a doubly-fed induction generator (DFIG...... demonstrate that the proposed scheme significantly lessens the output power fluctuation of a WPP under various scenarios by modifying the gain with the rotor speed and frequency deviation, and thereby it can regulate the frequency deviation within a narrow range.......) that significantly mitigates the system frequency fluctuation while preventing over-deceleration of the rotor speed. The proposed scheme employs an additional control loop relying on the system frequency deviation that operates in combination with the maximum power point tracking control loop. To improve the power...

  16. Regulations and instructions for RA reactor operation

    International Nuclear Information System (INIS)

    1989-01-01

    This regulatory guide consists of following 4 chapters: Description of the RA reactor, organization scheme, regulations for performing experiments; Regulations for staff on duty; Instructions for operating the vacuum systems, heavy water and helium systems; and evacuation in case of accident [sr

  17. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  18. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  19. Firm performance and employment in the EU emissions trading scheme: An empirical assessment for Germany

    International Nuclear Information System (INIS)

    Anger, Niels; Oberndorfer, Ulrich

    2008-01-01

    This paper empirically investigates the role of the EU Emissions Trading Scheme (EU ETS) for firm performance and employment in Germany. We provide an overview of relative allowance allocation within the EU ETS as well as an econometric analysis for a large sample of German firms covered by the scheme in order to assess the impacts of EU emissions regulation on both firm revenues and employment. The dataset indicates that the EU ETS was in an overall long position in 2005, although allowance allocation was very heterogeneous across member states. Our econometric analysis suggests that, within the first phase of the EU ETS, relative allowance allocation did not have a significant impact on firm performance and employment of regulated German firms

  20. Regulations for RA reactor operation

    International Nuclear Information System (INIS)

    1980-09-01

    Regulations for RA reactor operation are written in accordance with the legal regulations defined by the Law about radiation protection and related legal acts, as well as technical standards according to the IAEA recommendations. The contents of this book include: fundamental data about the reactor; legal regulations for reactor operation; organizational scheme for reactor operation; general and detailed instructions for operation, behaviour in the reactor building, performing experiments; operating rules for operation under steady state and accidental conditions [sr

  1. Working together with regulators on nuclear sites

    International Nuclear Information System (INIS)

    Holloway, N.J.

    2004-01-01

    A scheme for earlier and clearer communications with the Health and Safety Executive (HSE) and the Environment Agency (EA) on jointly regulated issues has been developed across the nuclear industry over the past two years. The matched pair of industry and regulators' 'Working Together' documents was published in January 2003. In the United Kingdom Atomic Energy Authority (UKAEA), the scheme is being put into practice through the issue of Initial Regulatory Notifications (IRN) of various projects and issues, to capture key regulatory topics and prompt regulators' initial responses. The IRN may be based on a safety and environment overview report or may be a precursor to it. Positive responses, in line with the Working Together documents, were received from HSE and the EA, following receipt of the first three UKAEA IRNs. (author)

  2. The impact of economic regulation on attempts to curb expense preference behavior: a micro-data analysis of CEO compensation schemes for electric utilities

    International Nuclear Information System (INIS)

    Mixon, F.G.; Upadhyaya, K.P.

    1999-01-01

    This study uses a large, micro data set to present evidence which suggests that owners of regulated electric utilities have little incentive to structure CEO compensation packages in an effort to curb potential expense preference behavior. Because such potential behavior occurs, or would occur, at no cost to the firm (or the firm's owners), little incentive exists to structure compensation schemes in a way that would curb such behavior (e.g. by compensating them with incentive bonus plans and stock options). The results presented here augment those which examine other industries (e.g. banking) in an effort to point out the relationships between ownership organization, political involvement and expense preference behavior. (Copyright (c) 1999 Elsevier Science B.V., Amsterdam. All rights reserved.)

  3. Self-Tuning Control Scheme Based on the Robustness σ-Modification Approach

    Directory of Open Access Journals (Sweden)

    Nabiha Touijer

    2017-01-01

    Full Text Available This paper deals with the self-tuning control problem of linear systems described by autoregressive exogenous (ARX mathematical models in the presence of unmodelled dynamics. An explicit scheme of control is described, which we use a recursive algorithm on the basis of the robustness σ-modification approach to estimate the parameters of the system, to solve the problem of regulation tracking of the system. This approach was designed with the assumptions that the norm of the vector of the parameters is well-known. A new quadratic criterion is proposed to develop a modified recursive least squares (M-RLS algorithm with σ-modification. The stability condition of the proposed estimation scheme is proved using the concepts of the small gain theorem. The effectiveness and reliability of the proposed M-RLS algorithm are shown by an illustrative simulation example. The effectiveness of the described explicit self-tuning control scheme is demonstrated by simulation results of the cruise control system for a vehicle.

  4. The efficiency costs of separating carbon markets under the EU emissions trading scheme: A quantitative assessment for Germany

    International Nuclear Information System (INIS)

    Boehringer, Christoph; Hoffmann, Tim; Manrique-de-Lara-Penate, Casiano

    2006-01-01

    From 1 January 2005 onwards the European Union has launched the first large-scale international carbon emissions trading program. As the EU Emissions Trading Scheme (EU-ETS) covers only part of domestic carbon emissions, it implies a segmented environmental regulation scheme: Each EU Member State must specify additional domestic abatement policies for the sectors outside the EU-ETS in order to meet its emissions budget under the EU Burden Sharing Agreement. We highlight the generic problems of segmented carbon regulation in terms of information requirements for international carbon prices and domestic abatement costs of sectors outside the EU-ETS. Based on numerical simulations for Germany, we quantify the excess costs of segmented carbon regulation and conclude that inefficiencies can be much better explained by lobbying of influential EU-ETS sectors than by information problems. (Author)

  5. Performance Comparison of Grid-Faulty Control Schemes for Inverter-Based Industrial Microgrids

    Directory of Open Access Journals (Sweden)

    Antonio Camacho

    2017-12-01

    Full Text Available Several control schemes specifically designed to operate inverter-based industrial microgrids during voltage sags have been recently proposed. This paper first classifies these control schemes in three categories and then performs a comparative analysis of them. Representative control schemes of each category are selected, described and used to identify the main features and performance of the considered category. The comparison is based on the evaluation of several indexes, which measure the power quality of the installation and utility grid during voltage sags, including voltage regulation, reactive current injection and transient response. The paper includes selected simulation results from a 500 kVA industrial microgrid to validate the expected features of the considered control schemes. Finally, in view of the obtained results, the paper proposes an alternative solution to cope with voltage sags, which includes the use of a static compensator in parallel with the microgrid. The novelty of this proposal is the suitable selection of the control schemes for both the microgrid and the static compensator. The superior performance of the proposal is confirmed by the analysis of the quality indexes. Its practical limitations are also revealed, showing that the topic studied in this paper is still open for further research.

  6. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  7. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  8. Regulator of Dust and Coal Burner of Power Boilers

    Directory of Open Access Journals (Sweden)

    W. Wujcik

    2004-01-01

    Full Text Available The papers considers problems concerning introduction of neutron regulator into engineering practice. The regulator makes it possible to regulate CO, N0^ and O2 values with the purpose to optimize ejections into environment. The paper contains scheme of automation control of cyclone dust and coal burner with the help of a neutron regulator.

  9. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  10. Obesity and industry self-regulation of food and beverage marketing: a literature review.

    Science.gov (United States)

    Ronit, K; Jensen, J D

    2014-07-01

    Obesity is a growing concern at national and international levels, and it is increasingly recognised that the industry has a role in and hence needs to be involved in halting the obesity epidemic. The objective of this study is to describe, analyse and evaluate research on industry self-regulation regarding food and beverage marketing and nutrition labelling. Five databases were searched for combinations of the search terms-obesity, nutrition, food, beverages, industry, self-regulation, labelling, advertising and marketing-and papers were selected on the basis of paper titles and, subsequently, on the basis of abstracts. Of the 4978 identified publications, 22 were included in the final review. The studies show that commitments in industry self-regulation schemes tend to be relatively vague and permissive, that the measurable effects of the self-regulations tend to be relatively small and that some extent of public regulation may catalyse the effectiveness of industry self-regulation. Although the reviewed studies vary in terms of analytic units and methods applied, they generally stress an ineffectiveness of existing self-regulation schemes. Food industry self-regulation in relation to obesity prevention is an emerging field of research, and further research is needed in such schemes' definitions of regulatory standards, their monitoring and sanctioning mechanisms, and their interactions with public regulation, if industry self-regulation of marketing behaviour is to become an effective and credible approach.

  11. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  12. Promoting renewable energy through capacity markets: An analysis of the Russian support scheme

    International Nuclear Information System (INIS)

    Boute, Anatole

    2012-01-01

    Most existing support schemes aim to stimulate the deployment of renewable energy sources in the electricity sector on the basis of the electricity output (MW h) of renewable energy installations. Support is anchored in the electricity commodity market. In contrast to this established approach, Russia intends to promote renewable energy through the capacity market. The idea is to remunerate investors for the installed capacity (MW) of their installations, in particular for the availability of their installations to produce electricity. This article argues that, contrary to the implicit consensus, a capacity-based approach to supporting renewable energy can provide an alternative to the current output-based schemes. Capacity-based schemes limit the incentive that the operators of renewable energy installations currently have under output-based schemes to deliver electricity to the grid even in periods of low demand. These schemes also provide investors with a more predictable income flow. However, to be successful, the regulation of capacity supply – currently designed for flexible power plants – needs to accommodate the specific production patterns of variable renewable energy installations. This paper examines ways to overcome this challenge in Russia and provides more general conclusions on the complex interaction between capacity markets and renewable energy investments.

  13. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  14. Modeling and Analysis of Resonance in LCL-Type Grid-Connected Inverters under Different Control Schemes

    Directory of Open Access Journals (Sweden)

    Yanxue Yu

    2017-01-01

    Full Text Available As a basic building block in power systems, the three-phase voltage-source inverter (VSI connects the distributed energy to the grid. For the inductor-capacitor-inductor (LCL-filter three-phase VSI, according to different current sampling position and different reference frame, there mainly exist four control schemes. Different control schemes present different impedance characteristics in their corresponding determined frequency range. To analyze the existing resonance phenomena due to the variation of grid impedances, the sequence impedance models of LCL-type grid-connected three-phase inverters under different control schemes are presented using the harmonic linearization method. The impedance-based stability analysis approach is then applied to compare the relative stability issues due to the impedance differences at some frequencies and to choose the best control scheme and the better controller parameters regulating method for the LCL-type three-phase VSI. The simulation and experiments both validate the resonance analysis results.

  15. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  16. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  17. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  18. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  19. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  20. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  1. Adaptive quantization-parameter clip scheme for smooth quality in H.264/AVC.

    Science.gov (United States)

    Hu, Sudeng; Wang, Hanli; Kwong, Sam

    2012-04-01

    In this paper, we investigate the issues over the smooth quality and the smooth bit rate during rate control (RC) in H.264/AVC. An adaptive quantization-parameter (Q(p)) clip scheme is proposed to optimize the quality smoothness while keeping the bit-rate fluctuation at an acceptable level. First, the frame complexity variation is studied by defining a complexity ratio between two nearby frames. Second, the range of the generated bits is analyzed to prevent the encoder buffer from overflow and underflow. Third, based on the safe range of the generated bits, an optimal Q(p) clip range is developed to reduce the quality fluctuation. Experimental results demonstrate that the proposed Q(p) clip scheme can achieve excellent performance in quality smoothness and buffer regulation.

  2. Impact of Market Regulations on the Development of Wind Power - An International Comparison

    International Nuclear Information System (INIS)

    Ackermann, Thomas; Soeder, Lennart

    2000-01-01

    This paper presents and briefly evaluates the most important existing market regulations and market schemes regarding its influence on the development of wind power. The evaluation of the existing market regulations focuses on the incentives provided by the various instruments to reduce production costs. The instruments and schemes are: Feed-in Tariffs, Net Metering, Bidding Process, Fixed Quotas, Green Certificate Trading, Green Power Exchange, Green Pricing. In addition, the impact of market regulations for international electricity markets with a power exchange are investigated. The analysis showed that new wind power generation can faces significant market barriers. (author)

  3. Private governance, public purpose? Assessing transparency and accountability in self-regulation of food advertising to children.

    Science.gov (United States)

    Reeve, Belinda

    2013-06-01

    Reducing non-core food advertising to children is an important priority in strategies to address childhood obesity. Public health researchers argue for government intervention on the basis that food industry self-regulation is ineffective; however, the industry contends that the existing voluntary scheme adequately addresses community concerns. This paper examines the operation of two self-regulatory initiatives governing food advertising to children in Australia, in order to determine whether these regulatory processes foster transparent and accountable self-regulation. The paper concludes that while both codes appear to establish transparency and accountability mechanisms, they do not provide for meaningful stakeholder participation in the self-regulatory scheme. Accordingly, food industry self-regulation is unlikely to reflect public health concerns or to be perceived as a legitimate form of governance by external stakeholders. If industry regulation is to remain a feasible alternative to statutory regulation, there is a strong argument for strengthening government oversight and implementing a co-regulatory scheme.

  4. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  5. « L’Amazonie – victime des changements climatiques ? » « The Amazon forest – victim of climate change? » « A Amazônia – vítima das mudanças climáticas ? »

    Directory of Open Access Journals (Sweden)

    Delaine Sampaio da Silva

    2010-12-01

    Full Text Available La forêt d’Amazonie est un des biomes les plus riches et les plus importants de la Terre. Cependant, son avenir est gravement menacé par les changements climatiques. L’effet de ces changements est indissociable de celui des activités humaines. Ainsi, la déforestation est responsable de plus de la moitié des émissions de gaz à effet de serre du Brésil. La lutte contre les changements climatique au Brésil passe donc en premier lieu par la lutte contre la déforestation. Cette lutte fait face aux enjeux actuels du développement en Amazonie, en premier lieu l’élevage et l’agriculture à grande échelle. Certains éléments des politiques récentes du Brésil vont dans le sens d’un développement moins « sauvage » en Amazonie, mais se heurtent à des intérêts économiques et politiques. Les initiatives internationales comme Reduced Emissions from Deforestation and forest Degradation (REDD, dans le cadre d’un accord climatique, peuvent fournir des incitatifs économiques cruciaux. Il est dans tous les cas primordial qu’un tel développement soit adapté à la réalité amazonienne et se fasse en collaboration avec les populations locales dans une optique de développement social autant qu’écologique ou économique.The Amazon rainforest is one of most important ecosystems on earth and a biodiversity hotspot. Its future is however in peril due to the effects of climate change and human activities. Climate models predict a severe die-back of the Amazon forest by the end of this century, accompanied by the release of vast quantities of carbon actually stored in the vegetation. Deforestation is currently responsible for over one half of Brazil’s greenhouse gas emissions. Fighting deforestation is therefore Brazil’s most efficient way to reduce its emissions. This is however contrary to current development schemes in the Amazon region, and in particular large scale agricultural and cattle raising farms. However, Brazil

  6. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    Science.gov (United States)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  7. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  8. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  9. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  10. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  11. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  12. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  13. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  14. Development of Dalaelven hydro power scheme in Sweden

    International Nuclear Information System (INIS)

    Kokko, Voitto; Hjerthen, Peter; Ingfaelt, Hans; Loewen, Karl-Erik; Sjoegren, Arne

    2015-01-01

    The Dalaelven hydro scheme is located in central Sweden. Fortum has in the scheme 50 dams and 35 hydro power plants producing 4 TWh energy with a capacity of 970 MW. The main reservoirs are Lake Siljan and Traengsletsjoen with Traengslet dam, the highest earth-filled dam in Sweden. Development of the hydro scheme started 1878 with construction of four power plants for industry until 1930. From 1931 to 1974 15 power plants were built for increasing electricity consumption. De-regulation of the energy market in 1990's and EU environmental targets in 2000's resulted in the rehabilitation of ten power plants between 1990 and 2014 with increased annual energy production of 377 GWh (29%) and capacity 124 MW (59%). This energy decreases the annual CO 2 emissions with 125918 tons in comparison to production of the same amount of energy by coal. In several cases the rehabilitation was made in new power houses, allowing the development of the layout and technology of civil structures, and use of state-of-art equipment. Sweden uses the green certificate system, and 235 GWh of the energy received this certificate. Other environmental benefits come from use of the environmentally friendly Kaplan turbines and construction of some new fish pass. There are further plans to increase the spillway capacity of Traengslet dam and to rehabilitate eight power plant units. The possibilities of obtaining the Environmental licences for the rehabilitations has became challenging in the past years and green certificates are nowadays agreed only for increased energy. (authors)

  15. Résultats de recherche | Page 15 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Est, sont particulièrement vulnérables, à long terme, aux conséquences des changements climatiques et, à court terme, à la variabilité accrue du climat. Projet. -. Variabilité climatique, changements sociaux et dengue au Bangladesh. Depuis ...

  16. Low enrolment in Ugandan Community Health Insurance Schemes: underlying causes and policy implications

    Directory of Open Access Journals (Sweden)

    Criel Bart

    2007-07-01

    Full Text Available Abstract Background Despite the promotion of Community Health Insurance (CHI in Uganda in the second half of the 90's, mainly under the impetus of external aid organisations, overall membership has remained low. Today, some 30,000 persons are enrolled in about a dozen different schemes located in Central and Southern Uganda. Moreover, most of these schemes were created some 10 years ago but since then, only one or two new schemes have been launched. The dynamic of CHI has apparently come to a halt. Methods A case study evaluation was carried out on two selected CHI schemes: the Ishaka and the Save for Health Uganda (SHU schemes. The objective of this evaluation was to explore the reasons for the limited success of CHI. The evaluation involved review of the schemes' records, key informant interviews and exit polls with both insured and non-insured patients. Results Our research points to a series of not mutually exclusive explanations for this under-achievement at both the demand and the supply side of health care delivery. On the demand side, the following elements have been identified: lack of basic information on the scheme's design and operation, limited understanding of the principles underlying CHI, limited community involvement and lack of trust in the management of the schemes, and, last but not least, problems in people's ability to pay the insurance premiums. On the supply-side, we have identified the following explanations: limited interest and knowledge of health care providers and managers of CHI, and the absence of a coherent policy framework for the development of CHI. Conclusion The policy implications of this study refer to the need for the government to provide the necessary legislative, technical and regulative support to CHI development. The main policy challenge however is the need to reconcile the government of Uganda's interest in promoting CHI with the current policy of abolition of user fees in public facilities.

  17. Performance comparison of control schemes for variable-speed wind turbines

    Science.gov (United States)

    Bottasso, C. L.; Croce, A.; Savini, B.

    2007-07-01

    We analyze the performance of different control schemes when applied to the regulation problem of a variable-speed representative wind turbine. In particular, we formulate and compare a wind-scheduled PID, a LQR controller and a novel adaptive non-linear model predictive controller, equipped with observers of the tower states and wind. The simulations include gusts and turbulent winds of varying intensity in nominal as well as off-design operating conditions. The experiments highlight the possible advantages of model-based non-linear control strategies.

  18. Performance comparison of control schemes for variable-speed wind turbines

    International Nuclear Information System (INIS)

    Bottasso, C L; Croce, A; Savini, B

    2007-01-01

    We analyze the performance of different control schemes when applied to the regulation problem of a variable-speed representative wind turbine. In particular, we formulate and compare a wind-scheduled PID, a LQR controller and a novel adaptive non-linear model predictive controller, equipped with observers of the tower states and wind. The simulations include gusts and turbulent winds of varying intensity in nominal as well as off-design operating conditions. The experiments highlight the possible advantages of model-based non-linear control strategies

  19. Universal Service Obligations: The Role of Subsidization Schemes and the Consequences of Accounting Separation

    International Nuclear Information System (INIS)

    Mirabel, F.; Poudou, J.C.; Roland, M.

    2007-01-01

    This paper (i) highlights the role that unit subsidies can play in the compensation scheme of a Universal Service Obligation (USO), and (ii) shows that welfare may be reduced when regulation requires accounting separation of network activities for vertically integrated USO providers. This suggests that accounting separation should be avoided when a USO is implemented. (authors)

  20. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  1. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  2. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  3. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  4. 12 Layout ppp2

    African Journals Online (AJOL)

    Nubidga

    Climatiques en Zone Soudano-Sahélienne : Cas De Mogode, Extrême-Nord. Cameroun. DJAKOU ... climatique majeurs affectant l'eau dans la zone d'étude. Les inondations détruisent les .... zone soudano-sahélienne. L'objectif global est de.

  5. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  6. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  7. Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology

    Directory of Open Access Journals (Sweden)

    Yichuan Wang

    2018-01-01

    Full Text Available Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users’ perspective, and results show that the proposed scheme works well in the reduction of user’ detection awareness.

  8. Development scheme of the public power transportation network; Le schema de developpement du reseau public de transport d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  9. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  10. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  11. CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Liu Zhang

    2011-01-01

    Full Text Available With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremendous impact on digital content providers as well as the mobile industry that a large number of digital content have been pirated and illegally distributed. Digital Rights Management (DRM aims at protecting digital contents from being abused through regulating their usage. Unfortunately, to the best of our knowledge, fewer of these DRM schemes are concerned with the cost of the servers in a DRM system when the number of users scales up, and consider benefits of content providers who can be seen as tenants of a content server. In this paper, we propose CS-DRM, a cloud-based SIM DRM scheme, for the mobile Internet. The SIM card is introduced into CS-DRM to both reduce the cost and provide higher security. Also, the characteristics of cloud computing enable CS-DRM to bring benefits for content providers, and well satisfy the performance requirements with low cost when the number of users increases significantly. Furthermore, we have implemented a prototype of our DRM scheme, which demonstrates that CS-DRM is efficient, secure, and practicable.

  12. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  13. A Robust DC-Split-Capacitor Power Decoupling Scheme for Single-Phase Converter

    DEFF Research Database (Denmark)

    Yao, Wenli; Loh, Poh Chiang; Tang, Yi

    2017-01-01

    Instead of bulky electrolytic capacitors, active power decoupling circuit can be introduced to a single-phase converter for diverting second harmonic ripple away from its dc source or load. One possible circuit consists of a half-bridge and two capacitors in series for forming a dc-split capacitor......, instead of the usual single dc-link capacitor bank. Methods for regulating this power decoupler have earlier been developed, but almost always with equal capacitances assumed for forming the dc-split capacitor, even though it is not realistic in practice. The assumption should, hence, be evaluated more...... thoroughly, especially when it is shown in the paper that even a slight mismatch can render the power decoupling scheme ineffective and the IEEE 1547 standard to be breached. A more robust compensation scheme is, thus, needed for the dc-split capacitor circuit, as proposed and tested experimentally...

  14. Hospital financing: calculating inpatient capital costs in Germany with a comparative view on operating costs and the English costing scheme.

    Science.gov (United States)

    Vogl, Matthias

    2014-04-01

    The paper analyzes the German inpatient capital costing scheme by assessing its cost module calculation. The costing scheme represents the first separated national calculation of performance-oriented capital cost lump sums per DRG. The three steps in the costing scheme are reviewed and assessed: (1) accrual of capital costs; (2) cost-center and cost category accounting; (3) data processing for capital cost modules. The assessment of each step is based on its level of transparency and efficiency. A comparative view on operating costing and the English costing scheme is given. Advantages of the scheme are low participation hurdles, low calculation effort for G-DRG calculation participants, highly differentiated cost-center/cost category separation, and advanced patient-based resource allocation. The exclusion of relevant capital costs, nontransparent resource allocation, and unclear capital cost modules, limit the managerial relevance and transparency of the capital costing scheme. The scheme generates the technical premises for a change from dual financing by insurances (operating costs) and state (capital costs) to a single financing source. The new capital costing scheme will intensify the discussion on how to solve the current investment backlog in Germany and can assist regulators in other countries with the introduction of accurate capital costing. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  16. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  17. Project NOAH: Regulating modern sea-level rise. Phase II: Jerusalem Underground

    Science.gov (United States)

    Newman, Walter S.; Fairbridge, Rhodes W.

    This proposal builds a high-speed inter-urban express between Jerusalem and Tel Aviv, generates 1500 megawatts of hydroelectric energy, curtails littoral erosion, builds a port along the Israeli Mediterranean coast and demands peaceful cooperation on both sides of the Jordan River. Phase II represents a pilot project demonstrating the feasibility of continuing to regulate world sea-level by a new series of water regulation schemes. Phase I previously described all those projects already completed or underway which have inadvertently and/or unintentionally served the purpose of sea-level regulation. These forms of Phase I sea-level regulation include large and small reservoirs, irrigation projects, water infiltration schemes, farm ponds, and swimming and reflecting pools. All these water storage projects have already exercised a very appreciable brake on 20th century sea-level rise. Phase II outlines a high-visibility proposal which will serve to illustrate the viability of “Project NOAH”.

  18. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  19. Threshold behaviors of social dynamics and financial outcomes of Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Fu, Peihua; Zhu, Anding; Ni, He; Zhao, Xin; Li, Xiulin

    2018-01-01

    Ponzi schemes always lead to mass disasters after collapse. It is important to study the critical behaviors of both social dynamics and financial outcomes for Ponzi scheme diffusion in complex networks. We develop the potential-investor-divestor-investor (PIDI) model by considering the individual behavior of direct reinvestment. We find that only the spreading rate relates to the epidemic outbreak while the reinvestment rate relates to the zero and non-zero final states for social dynamics of both homo- and inhomogeneous networks. Financially, we find that there is a critical spreading threshold, above which the scheme needs not to use its own initial capital for taking off, i.e. the starting cost is covered by the rapidly inflowing funds. However, the higher the cost per recruit, the larger the critical spreading threshold and the worse the financial outcomes. Theoretical and simulation results also reveal that schemes are easier to take off in inhomogeneous networks. The reinvestment rate does not affect the starting. However, it improves the financial outcome in the early stages and postpones the outbreak of financial collapse. Some policy suggestions for the regulator from the perspective of social physics are proposed in the end of the paper.

  20. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  1. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  2. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  3. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  4. Strategic partitioning of emission allowances under the EU Emission Trading Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Boehringer, Christoph [Univ. of Oldenburg, Department of Economics, and Centre for European Economic Research (ZEW) (Germany); Rosendahl, Knut Einar [Statistics Norway, Research Department, Pob. 8131 Dep., N-0033 Oslo (Norway)

    2009-08-15

    The EU Emission Trading Scheme (ETS) is breaking new ground in the experience with emission trading regimes across multiple jurisdictions. Since the EU ETS covers only some industries, it implies a hybrid emission control scheme where EU member states must apply complementary domestic emissions regulation for the non-trading sectors of their economies in order to comply with their national emission reduction targets. The EU ETS thus opens up for strategic partitioning of national emissions budgets by the member states between trading and non-trading sectors. In this paper we examine the potential effects of such strategic behavior on compliance cost and emissions prices. We show that concerns on efficiency losses from strategic partitioning are misplaced. In turn, our analysis implicitly indicates significant political economy forces behind EU climate policy, as both cost-effective and strategically motivated partitioning of national emission budgets are far off from the actual break-down between trading and non-trading sectors. (author)

  5. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  6. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  7. 1133-IJBCS-Article-Dr Benoit Sarr

    African Journals Online (AJOL)

    DR GATSING

    Identification des risques climatiques de la culture du maïs au Burkina Faso. Benoît SARR *, Luc ... La culture est sensible aux aléas climatiques liés à la variabilité et aux extrêmes ...... daily rainfall principal component analysis to the ...

  8. Improved FRT Control Scheme for DFIG Wind Turbine Connected to a Weak Grid

    DEFF Research Database (Denmark)

    Abulanwar, Elsayed; Chen, Zhe; Iov, Florin

    2013-01-01

    This paper presents an improved coordinated fault ridethrough (FRT) control strategy for a doubly fed induction generator (DFIG) based wind turbine, (WT), in a weak grid. A technique for grid synchronization against voltage excursions, i.e., a Dual Second Order Generalized Integrator – Frequency ...... controllers to counteract rotor as well as stator currents and regulate the rotor speed. Simulation results which assure the effectiveness of the proposed control scheme is presented....

  9. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  10. The regulation of health care providers' payments when horizontal and vertical differentiation matter.

    Science.gov (United States)

    Bardey, David; Canta, Chiara; Lozachmeur, Jean-Marie

    2012-09-01

    This paper analyzes the regulation of payment schemes for health care providers competing in both quality and product differentiation of their services. The regulator uses two instruments: a prospective payment per patient and a cost reimbursement rate. When the regulator can only use a prospective payment, the optimal price involves a trade-off between the level of quality provision and the level of horizontal differentiation. If this pure prospective payment leads to underprovision of quality and overdifferentiation, a mixed reimbursement scheme allows the regulator to improve the allocation efficiency. This is true for a relatively low level of patients' transportation costs. We also show that if the regulator cannot commit to the level of the cost reimbursement rate, the resulting allocation can dominate the one with full commitment. This occurs when the transportation cost is low or high enough, and the full commitment solution either implies full or zero cost reimbursement. Copyright © 2012 Elsevier B.V. All rights reserved.

  11. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  12. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  13. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  14. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  15. An emissions trading scheme design for power industries facing price regulation

    International Nuclear Information System (INIS)

    Kim, Yong-Gun; Lim, Jong-Soo

    2014-01-01

    The electricity market, monopolistic in nature, with government price regulation, poses a serious challenge for policy makers with respect to the cost-effectiveness of emissions trading, particularly in Asian countries. This paper argues that a cap-and-trade regulatory system for indirect emissions combined with a rate-based allocation system for direct emissions can achieve market efficiency even in the presence of price and quantity controls in the electricity market. This particular policy mix could provide appropriate incentives for industries to reduce their electricity consumption while inducing power producers to reduce their direct carbon emissions cost-effectively in conditions where there is strict government control of electricity prices. Another advantage of the suggested policy mix is that it allows carbon leakage in cross-border power trades to be effectively eliminated. - Highlights: • A rate-based allocation induces power producers to minimize direct emissions. • A cap-and-trade on indirect emission induces firms to reduce electricity consumption. • These two can jointly achieve market efficiency even in the regulated power market

  16. Comprendre les obstacles à la paix dans la région des Grands Lacs ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  17. Intégration régionale, commerce et essor du secteur privé (Namibie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  18. Building a New South Africa Volume 4 : Environment ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  19. Production et commercialisation durables de l'indigo au Salvador ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  20. Protection sociale et travailleurs pauvres en Égypte | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  1. Soutien institutionnel à l'Ethiopian Development Research Institute ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  2. Synthèse et diffusion de résultats de recherche à l'échelle régionale ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  3. Soutien institutionnel à l'Initiative prospective agricole et rurale ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  4. Croissance de l'emploi dans le secteur manufacturier (structuré et ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  5. Compréhension des traumatismes et du processus de réconciliation ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  6. Soutien institutionnel à l'Institute for Policy Analysis and Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  7. Site d'enfouissement de Mbeubeuss : Étude de l'impact sur la santé ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  8. Les technologies de l'information et de la communication au service ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  9. Renforcement de la recherche sur les politiques et du plaidoyer ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  10. Réduction de la pauvreté par le truchement du développement du ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  11. Bourse de recherche postdoctorale sur l'Amérique centrale et les ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  12. Voie d'acheminement de contenu et de services (telecentre.org ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  13. Subventions à la mobilité bilatérale Canada-Afrique du Sud pour les ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  14. Sécurité alimentaire, soins adéquats et environnement (Tanzanie et ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  15. Stratégies de lutte antitabac à Maurice | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  16. Crise financière mondiale et vulnérabilité au Cambodge | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  17. Soutien institutionnel au Kenya Institute for Public Policy Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  18. Envois de fonds vers les zones de conflit - le cas de la diaspora ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  19. Réseau d'universités et de conseils pour l'innovation au service du ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  20. Atténuation des risques pour la santé dans le secteur de la poterie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  1. Raúl Prebisch et les défis du XXIe siècle | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  2. Security Sector Reform in the Arab Region | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  3. Building a New South Africa Volume 3 : Science and Technology ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  4. Créer un conseil arabe des sciences sociales | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  5. Innovations pour améliorer les vaccins pour le bétail | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  6. Programme des cycles supérieurs et de recherche en études sur les ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  7. Soutien institutionnel de l'Institute of Social Studies Trust | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  8. Conflit armé en Colombie : différentes ressources, différents conflits ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  9. Punto J : portail d'information sur la santé et le VIH/sida par et pour les

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  10. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  11. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  12. The evolution of emissions trading in the EU. Tensions between national trading schemes and the proposed EU directive

    International Nuclear Information System (INIS)

    Boemare, Catherine; Quirion, Philippe; Sorrell, Steve

    2003-12-01

    The EU is pioneering the development of greenhouse gas emissions trading, but there is a tension between the 'top-down' and 'bottom-up' evolution of trading schemes. While the Commission is introducing a European emissions trading scheme (EU ETS) in 2005, several member states have already introduced negotiated agreements that include trading arrangements. Typically, these national schemes have a wider scope than the proposed EU directive and allow firms to use relative rather than absolute targets. The coexistence of 'top-down' and 'bottom-up' trading schemes may create some complex problems of policy interaction. This paper explores the potential interactions between the EU ETS and the negotiated agreements in France and UK and uses these to illustrate some important generic issues. The paper first describes the proposed EU directive, outlines the UK and French policies and compares their main features to the EU ETS. It then discusses how the national and European policies may interact in practice. Four issues are highlighted, namely, double regulation, double counting of emission reductions, equivalence of effort and linking trading schemes. The paper concludes with some recommendations for the future development of UK and French climate policy

  13. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  14. The regulatory practice of the French financial regulator, 2006-2011. From substantive to procedural financial regulation?

    Directory of Open Access Journals (Sweden)

    Thierry Kirat

    2015-11-01

    Full Text Available Fraud and misconduct in financial markets have recently become a key regulatory issue against the backdrop of the financial crisis. This paper investigates the sanctions policy and practices of the French financial regulator, Autorité des Marchés Financiers (AMF. It argues that, over time, the AMF has shifted from substantive to procedural regulation of finance. This shift consists in departing from sanctions based on observed outcomes in the market and, instead, assessing how the internal organizational schemes of financial firms actually perform. The AMF’s new policy and practice involves a process of legalization of organizations; it also evidences a tendency to delegate regulation to financial firms themselves

  15. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  16. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  17. Advanced Reactive Power Reserve Management Scheme to Enhance LVRT Capability

    Directory of Open Access Journals (Sweden)

    Hwanik Lee

    2017-10-01

    Full Text Available Abstract: To increase the utilization of wind power in the power system, grid integration standards have been proposed for the stable integration of large-scale wind power plants. In particular, fault-ride-through capability, especially Low-Voltage-Ride-Through (LVRT, has been emphasized, as it is related to tripping in wind farms. Therefore, this paper proposes the Wind power plant applicable-Effective Reactive power Reserve (Wa-ERPR, which combines both wind power plants and conventional generators at the Point of Interconnection (POI. The reactive power capability of the doubly-fed induction generator wind farm was considered to compute the total Wa-ERPR at the POI with reactive power capability of existing generators. By using the Wa-ERPR management algorithm, in case of a violation of the LVRT standards, the amount of reactive power compensation is computed using the Wa-ERPR management scheme. The proposed scheme calculates the Wa-ERPR and computes the required reactive power, reflecting the change of the system topology pre- and post-contingency, to satisfy the LVRT criterion when LVRT regulation is not satisfied at the POI. The static synchronous compensator (STATCOM with the capacity corresponding to calculated amount of reactive power through the Wa-ERPR management scheme is applied to the POI. Therefore, it is confirmed that the wind power plant satisfies the LVRT criteria by securing the appropriate reactive power at the POI, by applying of the proposed algorithm.

  18. Disease Recording Systems and Herd Health Schemes for Production Diseases

    Directory of Open Access Journals (Sweden)

    Østerås O

    2001-03-01

    Full Text Available Disease recording of cattle is compulsory in Sweden and Norway. Sweden and Denmark also have mandatory disease recording for swine, whereas Finland and Norway only have compulsory recording of infectious diseases. Both compulsory and voluntary systems are databased, the first ones developed in the 1970's. Disease recording at pig slaughtering is somewhat older. The veterinary practitioner, and often also the farmer, can report treated cases as well as fertility disturbances to the systems. Disease recording at slaughter is carried out by veterinarians and inspection officers. The databases are handled by the veterinary authorities or the agricultural organisations in each country. Costs are defrayed by the authorities and/or the agricultural industry. The farmers receive periodic reports. Data are stored for three to ten years, often longer. Affiliation to animal health schemes for cattle or swine is voluntary. In Sweden and Denmark (cattle they are run within the scope of government regulations. Affiliation to animal health programmes may also be demanded by organisations within the agricultural industry. These organisations are also responsible for the administration of the programmes. Costs to take part in herd health schemes are covered by the farmers themselves. In certain cases, grants are received from agricultural organisations, authorities, or the European Union. Recording of diseases and the format of animal health schemes in the Nordic countries are described here in order to illustrate the possibilities to compare data between countries.

  19. Development of a Hazard Classification Scheme for Substances Used in the Fraudulent Adulteration of Foods.

    Science.gov (United States)

    Everstine, Karen; Abt, Eileen; McColl, Diane; Popping, Bert; Morrison-Rowe, Sara; Lane, Richard W; Scimeca, Joseph; Winter, Carl; Ebert, Andrew; Moore, Jeffrey C; Chin, Henry B

    2018-01-01

    Food fraud, the intentional misrepresentation of the true identity of a food product or ingredient for economic gain, is a threat to consumer confidence and public health and has received increased attention from both regulators and the food industry. Following updates to food safety certification standards and publication of new U.S. regulatory requirements, we undertook a project to (i) develop a scheme to classify food fraud-related adulterants based on their potential health hazard and (ii) apply this scheme to the adulterants in a database of 2,970 food fraud records. The classification scheme was developed by a panel of experts in food safety and toxicology from the food industry, academia, and the U.S. Food and Drug Administration. Categories and subcategories were created through an iterative process of proposal, review, and validation using a subset of substances known to be associated with the fraudulent adulteration of foods. Once developed, the scheme was applied to the adulterants in the database. The resulting scheme included three broad categories: 1, potentially hazardous adulterants; 2, adulterants that are unlikely to be hazardous; and 3, unclassifiable adulterants. Categories 1 and 2 consisted of seven subcategories intended to further define the range of hazard potential for adulterants. Application of the scheme to the 1,294 adulterants in the database resulted in 45% of adulterants classified in category 1 (potentially hazardous). Twenty-seven percent of the 1,294 adulterants had a history of causing consumer illness or death, were associated with safety-related regulatory action, or were classified as allergens. These results reinforce the importance of including a consideration of food fraud-related adulterants in food safety systems. This classification scheme supports food fraud mitigation efforts and hazard identification as required in the U.S. Food Safety Modernization Act Preventive Controls Rules.

  20. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  1. A new water treatment scheme for thermal development : the SIBE process

    Energy Technology Data Exchange (ETDEWEB)

    Pedenaud, P.; Dang, F. [Total, Paris (France)

    2008-10-15

    The production of extra heavy oil or bitumen through thermal methods such as steam assisted gravity drainage (SAGD) involves the generation and injection into the reservoir of large quantities of steam which is recirculated with the produced bitumen. It is expected that maximizing the recycling of the produced water into steam will be mandatory, because of the need to minimize fresh water consumption and the possibility of increasingly stringent environmental regulations. The SAGD water treatment scheme is complex. It depends on the water characteristics, the steam generator type selected, and the decision to completely eliminate waste water disposal or use other waste handling and disposal methods. Other challenges such as the high silica content in the produced water, are encountered with SAGD water treatment. This paper presented an overview of the current water treatment process options for SAGD, as well as a new patented process called silica inhibition and blowdown evaporation (SIBE). The paper also presented an estimate of the economic benefit of the new SIBE process relative to conventional process schemes. Treatment objectives and water characteristics and the steps involved in conventional water treatment were first outlined. It was concluded that the silica and hardness removal scheme combined with the boiler blowdown evaporator were less economical because of higher investment cost due to the evaporation unit. 1 ref., 3 tabs., 4 figs.

  2. Nouveaux centres de cyberpolitique pour les pays du Sud | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    13 avr. 2018 ... L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau ...

  3. Lancement de l'appel des bourses du CRDI aux chercheurs ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    4 avr. 2018 ... L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau ...

  4. Lancement de l'appel de la bourse John G. Bene 2018 | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    16 avr. 2018 ... L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau ...

  5. Digital Review of Asia Pacific 2007–2008 | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    7 janv. 2008 ... L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau ...

  6. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  7. Atlas du réchauffement climatique 1971-2010. Publié par Physio-Géo - collection Ouvrages, 2012, 122 p.En ligne sur : http://www.physio-geo.fr (onglet "Ouvrages".

    Directory of Open Access Journals (Sweden)

    Jean-Claude Flageollet

    2012-06-01

    Full Text Available Cet atlas présente le réchauffement climatique récent, de 1971 à 2010, dans les terres émergées continentales et océaniques découpées en 39 régions dont, pour certaines d'entre elles, les limites sont proches des limites des régions climatiques du globe telles que définies et tracées par exemple par KÖPPEN et GEIGER. Les températures utilisées sont les moyennes annuelles empruntées à la base de données "Gistemp" de la NASA, complétées par calcul et par station. Dans chaque région, sont représentées graphiquement l'évolution des températures annuelles, selon l'environnement des stations, rural, urbain ou intermédiaire, ainsi que la valeur du réchauffement, par périodes pluri annuelles et décennales. En outre, les stations, classées en deux catégories en comparant leurs températures de 2009 et 2010, sont localisées sur des cartes à l'échelle de chaque continent. Quatre cartes régionales du réchauffement sont produites pour les périodes 1971-2010, 1981-2010, 1991-2010 et 2001­2010. Elles permettent de distinguer les régions en réchauffement et les régions en refroidissement, ces dernières concernant principalement les deux dernières décennies.This atlas presents the recent warming, from 1971 to 2010, in the continental and oceanic earth's land surface, divided into 39 regions which, for some of them, the limits are close to the earth's climatic regions defined and delineated by KÖPPEN and GEIGER. The temperatures used are annual averages taken from the "Gistemp" data base of the NASA, supplemented by calculation and by station. In each region, graphs and diagrams represent the evolution of annual temperatures as well as pluri-annual, decadal and multi decadal periods of warming, depending on the environment of stations: rural, urban or intermediate. In addition, the stations, divided into two categories by comparing their temperatures of 2009 and 2010, are located on each continent-scale maps. Four

  8. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  9. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  10. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  11. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  12. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  13. Improving the regulation of safety at DOE nuclear facilities. Final report: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    The report strongly recommends that, with the end of the Cold War, safety and health at DOE facilities should be regulated by outside agencies rather than by any regulatory scheme, DOE must maintain a strong internal safety management system; essentially all aspects of safety at DOE`s nuclear facilities should be externally regulated; and existing agencies rather than a new one should be responsible for external regulation.

  14. Improving the regulation of safety at DOE nuclear facilities. Final report: Appendices

    International Nuclear Information System (INIS)

    1995-12-01

    The report strongly recommends that, with the end of the Cold War, safety and health at DOE facilities should be regulated by outside agencies rather than by any regulatory scheme, DOE must maintain a strong internal safety management system; essentially all aspects of safety at DOE's nuclear facilities should be externally regulated; and existing agencies rather than a new one should be responsible for external regulation

  15. Development scheme of the public power transportation network; Le schema de developpement du reseau public de transport d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  16. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  17. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  18. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  19. Ethanol sensitivity: a central role for CREB transcription regulation in the cerebellum

    Directory of Open Access Journals (Sweden)

    Biswal Shyam

    2006-12-01

    Full Text Available Abstract Background Lowered sensitivity to the effects of ethanol increases the risk of developing alcoholism. Inbred mouse strains have been useful for the study of the genetic basis of various drug addiction-related phenotypes. Inbred Long-Sleep (ILS and Inbred Short-Sleep (ISS mice differentially express a number of genes thought to be implicated in sensitivity to the effects of ethanol. Concomitantly, there is evidence for a mediating role of cAMP/PKA/CREB signalling in aspects of alcoholism modelled in animals. In this report, the extent to which CREB signalling impacts the differential expression of genes in ILS and ISS mouse cerebella is examined. Results A training dataset for Machine Learning (ML and Exploratory Data Analyses (EDA was generated from promoter region sequences of a set of genes known to be targets of CREB transcription regulation and a set of genes whose transcription regulations are potentially CREB-independent. For each promoter sequence, a vector of size 132, with elements characterizing nucleotide composition features was generated. Genes whose expressions have been previously determined to be increased in ILS or ISS cerebella were identified, and their CREB regulation status predicted using the ML scheme C4.5. The C4.5 learning scheme was used because, of four ML schemes evaluated, it had the lowest predicted error rate. On an independent evaluation set of 21 genes of known CREB regulation status, C4.5 correctly classified 81% of instances with F-measures of 0.87 and 0.67 respectively for the CREB-regulated and CREB-independent classes. Additionally, six out of eight genes previously determined by two independent microarray platforms to be up-regulated in the ILS or ISS cerebellum were predicted by C4.5 to be transcriptionally regulated by CREB. Furthermore, 64% and 52% of a cross-section of other up-regulated cerebellar genes in ILS and ISS mice, respectively, were deemed to be CREB-regulated. Conclusion These

  20. : tous les projets | Page 195 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Programme: Food, Environment, and Health. Financement total : CA$ 2,411,000.00. Changements climatiques, vulnérabilité et santé en Colombie et en Bolivie. Projet. Selon le quatrième rapport d'évaluation du Groupe d'experts intergouvernemental sur l'évolution du climat, les changements climatiques modifient les ...

  1. Ghana : tous les projets | Page 3 | CRDI - Centre de recherches pour ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Programme: Alimentation, environnement et santé. Financement total : CA$ 62,000.00. Recherche et renforcement des capacités au chapitre de l'adaptation aux changements climatiques au Ghana. Projet. L'Afrique subsaharienne est la région la plus gravement touchée par les changements climatiques; or, elle dispose ...

  2. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  3. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  4. A new scheme for the promotion of renewable energies in developing countries: the renewable energy regulated purchase tariff

    NARCIS (Netherlands)

    Moner-Girona, M.; Aulich, H.; Ahm, P.; Adelmann, P.; Bounia, A.; Fabre, E.; Fioravanti, E.; Hosini, F.; Jongerden, G.J.; Jourde, P.; Kukuczka, T.; Llamas, P.; Macias, E.; Mayer, D.; Maigne, Y.; Moner, M.; McNelis, B.; Nemac, F.; Sener, O.; Ribeiro, F.; Samak, I.; Schmid, J.; Shah, Arvind; Shanker, A.; Sark, W.G.J.H.M. van; Vallvé, X.; Wohlthat, A.; Wollny, M.; Wouters, F.

    2008-01-01

    The main aim of this policy-support document is to attract policy-makers attention in renewable energies deployment, offering to energy and development stakeholders an alternative subsidy-scheme to support electrification in a village-scale mini-grid based on the good performance of the renewable

  5. Regulate or deregulate. Influencing network interconnection charges

    Energy Technology Data Exchange (ETDEWEB)

    Van De Wielle, B.

    2003-06-01

    We study the choice between regulating interconnection charges or delegating their determination to the operators, both in a non-mature and a mature market. Three regulatory regimes are considered: full, cost-based and bill-and-keep. Delegation corresponds to bargaining about the interconnection charges using the regulatory schemes as disagreement outcomes. Applying regulation benefits the consumers. Under full regulation, access charges account for asymmetries and allow a unique Ramsey price. Delegation benefits the operators. In a mature market delegation robs the government of any market influence. In a non-mature market government preferences coincide with those of the largest operator and are disadvantageous for entry.

  6. Improving the regulation of safety at DOE nuclear facilities. Final report

    International Nuclear Information System (INIS)

    1995-12-01

    The report strongly recommends that, with the end of the Cold War, safety and health at DOE facilities should be regulated by outside agencies rather than by DOE itself. The three major recommendations are: under any regulatory scheme, DOE must maintain a strong internal safety management system; essentially all aspects of safety at DOE's nuclear facilities should be externally regulated; and existing agencies rather than a new one should be responsible for external regulation

  7. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  8. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  9. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  10. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  11. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  12. A Fault-tolerable Control Scheme for an Open-frame Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Huang Hai

    2014-05-01

    Full Text Available Open-frame is one of the major types of structures of Remote Operated Vehicles (ROV because it is easy to place sensors and operations equipment onboard. Firstly, this paper designed a petri-based recurrent neural network (PRFNN to improve the robustness with response to nonlinear characteristics and strong disturbance of an open-frame underwater vehicle. A threshold has been set in the third layer to reduce the amount of calculations and regulate the training process. The whole network convergence is guaranteed with the selection of learning rate parameters. Secondly, a fault tolerance control (FTC scheme is established with the optimal allocation of thrust. Infinity-norm optimization has been combined with 2-norm optimization to construct a bi-criteria primal-dual neural network FTC scheme. In the experiments and simulation, PRFNN outperformed fuzzy neural networks in motion control, while bi-criteria optimization outperformed 2-norm optimization in FTC, which demonstrates that the FTC controller can improve computational efficiency, reduce control errors, and implement fault tolerable thrust allocation.

  13. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  14. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  15. Evaluating motives: Two simple tests to identify and avoid entanglement in legally dubious urine drug testing schemes.

    Science.gov (United States)

    Barnes, Michael C; Worthy, Stacey L

    2015-01-01

    This article educates healthcare practitioners on the legal framework prohibiting abusive practices in urine drug testing (UDT) in medical settings, discusses several profit-driven UDT schemes that have resulted in enforcement actions, and provides recommendations for best practices in UDT to comply with state and federal fraud and anti-kickback statutes. The authors carefully reviewed and analyzed statutes, regulations, adivsory opinions, case law, court documents, articles from legal journals, and news articles. Certain facts-driven UDT arrangements tend to violate federal and state healthcare laws and regulations, including Stark law, the anti-kickback statute, the criminal health care fraud statute, and the False Claims Act. Healthcare practitioners who use UDT can help ensure that they are in compliance with applicable federal and state laws by evaluating whether their actions are motivated by providing proper care to their patients rather than by profits. They must avoid schemes that violate the spirit of the law while appearing to comply with the letter of the law. Such a simple self-evaluation of motive can reduce a practitioner's likelihood of civil fines and criminal liability.

  16. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  17. Rice agroecosystem of the Muda irrigation scheme, Malaysia

    International Nuclear Information System (INIS)

    Nashriyah Mat; Ho Nai Kin; Ismail Sahid; Ahyaudin Ali; Lum Keng Yeang

    1998-01-01

    Pesticides have become one of the major components of modern farming practice. However, their usage needs to be properly carried out and regulated. Farmers need to be aware of the potential hazards arising out of improper use of pesticides, to them as well to the environment. This book presents the results of a comprehensive study on the impact of pesticide usage in the largest rice agroecosystem in Malaysia, the Muda Irrigation Scheme. The study, carried out by a group of local scientists, covers the impact of pesticide usage on biodiversity and bioresources (forest, weed, insect, fish and bird). In addition to farmers education, it shows the potential of crop establishment, irrigation method and double cropping of rice as useful factors that can be employed in minimizing the impact. The book also provides good foundation for future work and points out areas for further studies. It is a valuable reference to policy makers, researchers, regulators, agriculture-related agencies, chemical / fertilizer companies as well as those concerned with sustainable farming. The ecologists, chemists, biochemists, entomologists, zoologists, botanists, microbiologists, agronomists and medical practitioners involved in this study are congratulated for their efforts. (Nahrul Khair Alang Md Rashid)

  18. Rice agroecosystem of the Muda irrigation scheme, Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    Mat, Nashriyah [Malaysian Institute for Nuclear Technology Research MINT, Bangi (Malaysia); Kin, Ho Nai [Muda Agricultural Development Authority MADA, Alor Setar (Malaysia); Sahid, Ismail [Universiti Kebangsaan Malaysia, Bangi (Malaysia); Ali, Ahyaudin [Universiti Sains Malaysia, Penang (Malaysia); Yeang, Lum Keng [Malaysian Agricultural Research and Development Institute, Serdang (Malaysia)

    1998-07-01

    Pesticides have become one of the major components of modern farming practice. However, their usage needs to be properly carried out and regulated. Farmers need to be aware of the potential hazards arising out of improper use of pesticides, to them as well to the environment. This book presents the results of a comprehensive study on the impact of pesticide usage in the largest rice agroecosystem in Malaysia, the Muda Irrigation Scheme. The study, carried out by a group of local scientists, covers the impact of pesticide usage on biodiversity and bioresources (forest, weed, insect, fish and bird). In addition to farmers education, it shows the potential of crop establishment, irrigation method and double cropping of rice as useful factors that can be employed in minimizing the impact. The book also provides good foundation for future work and points out areas for further studies. It is a valuable reference to policy makers, researchers, regulators, agriculture-related agencies, chemical / fertilizer companies as well as those concerned with sustainable farming. The ecologists, chemists, biochemists, entomologists, zoologists, botanists, microbiologists, agronomists and medical practitioners involved in this study are congratulated for their efforts. (Nahrul Khair Alang Md Rashid)

  19. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  20. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  1. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  2. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  3. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  4. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  5. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  6. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  7. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  8. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  9. : tous les projets | Page 59 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet formera jusqu'à 36 nouveaux leaders en matière de changements climatiques dans le domaine du financement de l'adaptation, qui soutient les efforts visant à s'adapter aux répercussions des changements climatiques. Région: North of Sahara, South of Sahara, Central Asia, Far East Asia, South Asia, North and ...

  10. Résultats de recherche | Page 12 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les modèles climatiques ont démontré que, même si l'on observe une réduction considérable des émissions de gaz à effet de serre à l'échelle mondiale, les répercussions néfastes du réchauffement climatique planétaire continueront de se fa. Projet ...

  11. Gestion de la leishmaniose en Tunisie dans le contexte des

    International Development Research Centre (IDRC) Digital Library (Canada)

    On admet généralement que les changements climatiques auront des répercussions considérables sur la santé humaine : ils augmenteront les catastrophes climatiques et changeront la distribution des maladies transmises par l'eau et par d'autres vecteurs. Toutefois, les efforts que nous déployons pour nous adapter aux ...

  12. Résultats de recherche | Page 450 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Changements climatiques (403) Apply Changements climatiques filter · Gouvernance et justice (373) Apply Gouvernance et justice filter · Emploi et croissance (329) Apply Emploi et croissance filter · Santé des mères et des enfants (312) Apply Santé des mères et des enfants filter · Alimentation, environnement et santé ...

  13. La recherche pour relever les défis mondiaux : neuvième ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2 janv. 2018 ... Les chercheurs qui ont participé à ce projet ont travaillé avec les négociateurs internationaux du changement climatique à une proposition visant à faire inclure l'agriculture dans l'Accord de Paris sur le changement climatique. Cette proposition a été acceptée une semaine seulement avant l'Assemblé ...

  14. Coopération entre milieux ruraux et urbains dans la gestion de l'eau ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Coopération entre milieux ruraux et urbains dans la gestion de l'eau face aux changements climatiques au Burkina Faso. Les villes dépendent fortement des milieux ruraux qui leur assurent un apport en produits alimentaires, en eau et en matières premières. Les changements climatiques, en augmentant la fréquence des ...

  15. Inde | Page 73 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Entretien avec…propose des entrevues vidéos avec des chercheurs participant à des projets portant sur l'adaptation aux changements climatiques réalisés en Afrique, en Asie ainsi qu'en Amérique latine et dans les Caraïbes que le CRDI subventionne par le truchement de son programme Changements climatiques et eau ...

  16. EU Emissions Trading Scheme and Investments in the power sector

    Energy Technology Data Exchange (ETDEWEB)

    Sapienza, M.D.; Stefanoni, S.

    2007-07-01

    How environmental regulation affects electricity players' investment decisions? Should policy makers look beyond for alternative mechanisms - such as energy efficiency, capture and storage of carbon dioxide, and incentives for renewables - to fulfill the environmental objectives set by Kyoto Protocol? This paper suggests - through a Real Option approach - how the efficacy of the EU Emission Trading Scheme on technological innovation, emissions reduction and energy price dynamics, is strongly affected by the 'hysteresis' emerging from the capital budgeting process of main utilities. As a matter of fact, long-term substitutions between coal-fired units and Combined Cycle Gas Turbine plants production only take place under quite restrictive conditions. (auth)

  17. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1998-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed

  18. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  19. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  20. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  1. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  2. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  3. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  4. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  5. Identifying Impacts of Hydropower Regulation on Salmonid Habitats to Guide River Restoration for Existing Schemes and Mitigate Adverse Effects of Future Developments

    Science.gov (United States)

    Buddendorf, B.; Geris, J.; Malcolm, I.; Wilkinson, M.; Soulsby, C.

    2015-12-01

    A decrease in longitudinal connectivity in riverine ecosystems resulting from the construction of transverse barriers has been identified as a major threat to biodiversity. For example, Atlantic Salmon (Salmo salar) have a seasonal variety of hydraulic habitat requirements for their different life stages. However, hydropower impoundments impact the spatial and temporal connectivity of natural habitat along many salmon rivers in ways that are not fully understood. Yet, these changes may affect the sustainability of habitat at local and regional scales and so ultimately the conservation of the species. Research is therefore needed both to aid the restoration and management of rivers impacted by previous hydropower development and guide new schemes to mitigate potentially adverse effects. To this end we assessed the effects of hydropower development on the flow related habitat conditions for different salmon life stages in Scottish rivers at different spatial scales. We used GIS techniques to map the changes in structural connectivity at regional scales, applying a weighting for habitat quality. Next, we used hydrological models to simulate past and present hydrologic conditions that in turn drive reach-scale hydraulic models to assess the impacts of regulation on habitat suitability in both space and time. Preliminary results indicate that: 1) impacts on connectivity depend on the location of the barrier within the river network; 2) multiple smaller barriers may have a potentially lower impact than a single larger barrier; 3) there is a relationship between habitat and connectivity where losing less but more suitable habitat potentially has a disproportionally large impact; 4) the impact of flow regulation can lead to a deterioration of habitat quality, though the effects are spatially variable and the extent of the impact depends on salmon life stage. This work can form a basis for using natural processes to perform targeted and cost-effective restoration of rivers.

  6. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  7. The European Regulation no. 761/2001 EMAS

    International Nuclear Information System (INIS)

    Andriola, L.; Battellini, S.

    2005-08-01

    The Regulation 761/2001 EMAS (Environmental Management and Audit Scheme), introduced by the 1836/93 Community regulation, is one of the tools activated by the European Union in order to apply the 5. and 6. Community Environmental Programme, in the field of firm-environment interactions at first (overcoming the old Command and Control logic), then by extending its applicability to ali Organisations. EMAS is a voluntary tool that enables Organisations to evaluate their own interaction with the Environment, to plan and check the yearly improvement of their environmental performance, providing the public documented relevant information. The report illustrates the procedure far applying this regulation, its implementation and new application trends in Italy and the advantages far firms [it

  8. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  9. UK medicines regulation: responding to current challenges.

    Science.gov (United States)

    Richards, Natalie; Hudson, Ian

    2016-12-01

    The medicines regulatory environment is evolving rapidly in response to the changing environment. Advances in science and technology have led to a vast field of increasingly complicated pharmaceutical and medical device products; increasing globalization of the pharmaceutical industry, advances in digital technology and the internet, changing patient populations, and shifts in society also affect the regulatory environment. In the UK, the Medicines and Healthcare products Regulatory Agency (MHRA) regulates medicines, medical devices and blood products to protect and improve public health, and supports innovation through scientific research and development. It works closely with other bodies in a single medicines network across Europe and takes forward UK health priorities. This paper discusses the range of initiatives in the UK and across Europe to support innovation in medicines regulation. The MHRA leads a number of initiatives, such as the Innovation Office, which helps innovators to navigate the regulatory processes to progress their products or technologies; and simplification of the Clinical Trials Regulations and the Early Access to Medicines Scheme, to bring innovative medicines to patients faster. The Accelerated Access Review will identify reforms to accelerate access for National Health Service patients to innovative medicines and medical technologies. PRIME and Adaptive Pathways initiatives are joint endeavours within the European regulatory community. The MHRA runs spontaneous reporting schemes and works with INTERPOL to tackle counterfeiting and substandard products sold via the internet. The role of the regulator is changing rapidly, with new risk-proportionate, flexible approaches being introduced. International collaboration is a key element of the work of regulators, and is set to expand. © 2016 The British Pharmacological Society.

  10. Changements climatiques au Maroc: quels systèmes de culture et quelles biotechnologies pour s’y adapter ?

    Directory of Open Access Journals (Sweden)

    Abdelhadi AIT HOUSSA

    2017-09-01

    scale use of seawater in agriculture or finding new salinity tolerant cultivars. In Morocco, we should think of desalinization with renewable energies (solar, wind and the use of this water mainly in coastal areas where climate, land quality, sun and wind are adequate to these projects. To anticipate the future of food security of the country, attention should be given to the use of readily available resources to overcome the structural deficit in wheat starch and animal protein. The study suggests the use of other starch sources that Morocco can produce easily such as potato. For animal protein, we suggest fisheries resources which are still underused by the population. Résumé On présente une étude prospective concernant l’impact probable des changements climatiques sur les systèmes de culture et d’élevage au Maroc. D’après le constat de terrain et dans les limites de ce que signifie ce genre d’étude, l’effet direct du réchauffement climatique peut conduire à terme (et c’est déjà le cas dans certaines contrées à la nécessité d’une redistribution variétale pour des espèces exigeantes en froid comme les rosacées. Des variétés de pomme, telle que le groupe des Golden, risquent de disparaître des montagnes pour laisser la place à d’autres moins exigeantes comme le groupe des Gala. Le bananier et l’avocatier risquent de migrer vers les régions un peu plus continentales, l’olivier et les agrumes un peu plus vers le pied de la montagne. Le réchauffement climatique peut aussi obliger à faire évoluer les systèmes d’élevage et de culture en faisant déplacer la frontière de la sécheresse un peu plus vers le centre et le nord du pays; l’aride serait peut-être envahi par la désertification, le semi-aride passerait en partie à l’étage aride et le Bour dit favorable en partie dans le semi-aride. Comme corollaire à ce changement, il faudrait s’attendre à une perte de potentiel de ressources en eau qui obligerait

  11. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  12. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  13. Schemes for fibre-based entanglement generation in the telecom band

    International Nuclear Information System (INIS)

    Chen, Jun; Lee, Kim Fook; Li Xiaoying; Voss, Paul L; Kumar, Prem

    2007-01-01

    We investigate schemes for generating polarization-entangled photon pairs in standard optical fibres. The advantages of a double-loop scheme are explored through comparison with two other schemes, namely, the Sagnac-loop scheme and the counter-propagating scheme. Experimental measurements with the double-loop scheme verify the predicted advantages

  14. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  15. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  16. Development of NPP safety regulation in Russia

    International Nuclear Information System (INIS)

    Vishnevsky, Y.G.; Gutsalov, A.T.; Bukrinsky, A.M.; Gordon, B.G.

    1999-01-01

    The presentation describes the organisation scheme of Russian safety regulatory bodies, their tasks and responsibilities. Legislative and regulatory basis of NPP safety regulations rely on the federal laws: Law on the Use of Nuclear Energy and Law on Radiation Safety of the Population. Role of international cooperation and Improvement of regulatory activities in Russia are emphasised

  17. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  18. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  19. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  20. Développer le leadership dans des villes de l'Amérique latine et des ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Développer le leadership dans des villes de l'Amérique latine et des Caraïbes dans le contexte des changements climatiques. En raison des changements climatiques, de la croissance démographique et de l'urbanisation rapide non planifiée, les villes des pays en développement sont à la fois le principal déclencheur des ...

  1. Gestion des ressources hydriques dans un contexte de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Gestion des ressources hydriques dans un contexte de changements climatiques dans des établissements humains côtiers en Angola. Durant la guerre civile angolaise, de très nombreux habitants des zones de conflit en milieu rural se sont déplacés vers des endroits vulnérables aux phénomènes climatiques extrêmes, ...

  2. Water as a Human Right for the Middle East and North Africa | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    11 juil. 2008 ... Le CRDI investit dans des solutions locales aux problèmes auxquels l'Inde est confrontée, comme le stress thermique, la gestion de l'eau et les migrations liées aux changements climatiques. Voir davantage Le CRDI aide l'Inde à s'adapter aux changements climatiques au moyen de données probantes, ...

  3. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  4. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  5. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  6. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  7. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  8. Performance comparison of renewable incentive schemes using optimal control

    International Nuclear Information System (INIS)

    Oak, Neeraj; Lawson, Daniel; Champneys, Alan

    2014-01-01

    Many governments worldwide have instituted incentive schemes for renewable electricity producers in order to meet carbon emissions targets. These schemes aim to boost investment and hence growth in renewable energy industries. This paper examines four such schemes: premium feed-in tariffs, fixed feed-in tariffs, feed-in tariffs with contract for difference and the renewable obligations scheme. A generalised mathematical model of industry growth is presented and fitted with data from the UK onshore wind industry. The model responds to subsidy from each of the four incentive schemes. A utility or ‘fitness’ function that maximises installed capacity at some fixed time in the future while minimising total cost of subsidy is postulated. Using this function, the optimal strategy for provision and timing of subsidy for each scheme is calculated. Finally, a comparison of the performance of each scheme, given that they use their optimal control strategy, is presented. This model indicates that the premium feed-in tariff and renewable obligation scheme produce the joint best results. - Highlights: • Stochastic differential equation model of renewable energy industry growth and prices, using UK onshore wind data 1992–2010. • Cost of production reduces as cumulative installed capacity of wind energy increases, consistent with the theory of learning. • Studies the effect of subsidy using feed-in tariff schemes, and the ‘renewable obligations’ scheme. • We determine the optimal timing and quantity of subsidy required to maximise industry growth and minimise costs. • The premium feed-in tariff scheme and the renewable obligations scheme produce the best results under optimal control

  9. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  10. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  11. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  12. Finite Difference Schemes as Algebraic Correspondences between Layers

    Science.gov (United States)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  13. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  14. A Certificate Authority (CA-based cryptographic solution for HIPAA privacy/security regulations

    Directory of Open Access Journals (Sweden)

    Sangram Ray

    2014-07-01

    Full Text Available The Health Insurance Portability and Accountability Act (HIPAA passed by the US Congress establishes a number of privacy/security regulations for e-healthcare systems. These regulations support patients’ medical privacy and secure exchange of PHI (protected health information among medical practitioners. Three existing HIPAA-based schemes have been studied but appear to be ineffective as patients’ PHI is stored in smartcards. Moreover, carrying a smartcard during a treatment session and accessing PHI from different locations results in restrictions. In addition, authentication of the smartcard presenter would not be possible if the PIN is compromised. In this context, we propose an MCS (medical center server should be located at each hospital and accessed via the Internet for secure handling of patients’ PHI. All entities of the proposed e-health system register online with the MCS, and each entity negotiates a contributory registration key, where public-key certificates issued and maintained by CAs are used for authentication. Prior to a treatment session, a doctor negotiates a secret session key with MCS and uploads/retrieves patients’ PHI securely. The proposed scheme has five phases, which have been implemented in a secure manner for supporting HIPAA privacy/security regulations. Finally, the security aspects, computation and communication costs of the scheme are analyzed and compared with existing methods that display satisfactory performance.

  15. Modeling regulated water utility investment incentives

    Science.gov (United States)

    Padula, S.; Harou, J. J.

    2014-12-01

    This work attempts to model the infrastructure investment choices of privatized water utilities subject to rate of return and price cap regulation. The goal is to understand how regulation influences water companies' investment decisions such as their desire to engage in transfers with neighbouring companies. We formulate a profit maximization capacity expansion model that finds the schedule of new supply, demand management and transfer schemes that maintain the annual supply-demand balance and maximize a companies' profit under the 2010-15 price control process in England. Regulatory incentives for costs savings are also represented in the model. These include: the CIS scheme for the capital expenditure (capex) and incentive allowance schemes for the operating expenditure (opex) . The profit-maximizing investment program (what to build, when and what size) is compared with the least cost program (social optimum). We apply this formulation to several water companies in South East England to model performance and sensitivity to water network particulars. Results show that if companies' are able to outperform the regulatory assumption on the cost of capital, a capital bias can be generated, due to the fact that the capital expenditure, contrarily to opex, can be remunerated through the companies' regulatory capital value (RCV). The occurrence of the 'capital bias' or its entity depends on the extent to which a company can finance its investments at a rate below the allowed cost of capital. The bias can be reduced by the regulatory penalties for underperformances on the capital expenditure (CIS scheme); Sensitivity analysis can be applied by varying the CIS penalty to see how and to which extent this impacts the capital bias effect. We show how regulatory changes could potentially be devised to partially remove the 'capital bias' effect. Solutions potentially include allowing for incentives on total expenditure rather than separately for capex and opex and allowing

  16. A scheme for regulating toxic substances to water quality of Chamsil upstream water system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Suk; Kim, Jee Hoon [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    This study asserts to reflect a concept of toxicity thoroughly in the present water quality concept. It presents an appropriate solution to control toxic substances flowing into the Chamsil upstream water system. Although a regulation of toxic substances into major rivers in Korea other than Han river is also required urgently, it will be studied in future. It is expected that this study on Chamsil upstream would be a cornerstone for establishing a national regulation policy of toxic substances into water system. 28 refs., 1 fig., 36 tabs.

  17. Towards the ultimate variance-conserving convection scheme

    International Nuclear Information System (INIS)

    Os, J.J.A.M. van; Uittenbogaard, R.E.

    2004-01-01

    In the past various arguments have been used for applying kinetic energy-conserving advection schemes in numerical simulations of incompressible fluid flows. One argument is obeying the programmed dissipation by viscous stresses or by sub-grid stresses in Direct Numerical Simulation and Large Eddy Simulation, see e.g. [Phys. Fluids A 3 (7) (1991) 1766]. Another argument is that, according to e.g. [J. Comput. Phys. 6 (1970) 392; 1 (1966) 119], energy-conserving convection schemes are more stable i.e. by prohibiting a spurious blow-up of volume-integrated energy in a closed volume without external energy sources. In the above-mentioned references it is stated that nonlinear instability is due to spatial truncation rather than to time truncation and therefore these papers are mainly concerned with the spatial integration. In this paper we demonstrate that discretized temporal integration of a spatially variance-conserving convection scheme can induce non-energy conserving solutions. In this paper the conservation of the variance of a scalar property is taken as a simple model for the conservation of kinetic energy. In addition, the derivation and testing of a variance-conserving scheme allows for a clear definition of kinetic energy-conserving advection schemes for solving the Navier-Stokes equations. Consequently, we first derive and test a strictly variance-conserving space-time discretization for the convection term in the convection-diffusion equation. Our starting point is the variance-conserving spatial discretization of the convection operator presented by Piacsek and Williams [J. Comput. Phys. 6 (1970) 392]. In terms of its conservation properties, our variance-conserving scheme is compared to other spatially variance-conserving schemes as well as with the non-variance-conserving schemes applied in our shallow-water solver, see e.g. [Direct and Large-eddy Simulation Workshop IV, ERCOFTAC Series, Kluwer Academic Publishers, 2001, pp. 409-287

  18. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  19. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  20. Etude Climat no. 34 'Including international aviation in the EU ETS: a first step towards a global scheme'

    International Nuclear Information System (INIS)

    Alberola, Emilie; Solier, Boris

    2012-01-01

    Among the publications of CDC Climat Research, 'Climate Reports' offer in-depth analyses on a given subject. This issue addresses the following points: CO 2 emissions from international aviation, which accounted for 2% of global emissions in 2009, are not currently capped by any international agreement. The inclusion of the aviation sector in the European Union Emissions Trading Scheme (EU ETS) from January 1 2012 onwards represents a first step towards the implementation of emission reduction regulations based on an emissions trading scheme After the gradual extension of the scope of the EU ETS to new countries since 2005, the European Commission is now assimilating around 5,400 airlines that operate in Europe, two-thirds of which are non-European, into the EU ETS to join the energy generation and manufacturing industries. This European Union's decision assigns quantified CO 2 emission reduction targets to airlines: a 3% reduction in 2012 compared with average CO 2 emissions for the sector between 2004 and 2006, then a 5% reduction between 2013 and 2020. In the short term, the inclusion of the aviation sector in the EU ETS should have an impact on the scheme. Indeed, the aviation sector is expected to represent a new source of demand for allowances. Based on the assumption of an average 2.5% increase in annual emissions between 2012 and 2014, and then of an increase of 2% over the period between 2015 and 2020, airlines would create a shortfall of 382 MtCO 2 between 2012 and 2020. The limited use of Kyoto credits to help them comply offers a maximum import potential of almost 65 MtCO 2 between 2012 and 2020. This inclusion is a test of the EU's proactive policy, which involves encouraging other countries to define their own climate policy, without breaching international law,. The potential exemption of airline operators from emitter countries that introduce equivalent regulations would be a success for the European policy. For the time being, the reaction of some

  1. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  2. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  3. The resource adequacy scheme in the Korean electricity market

    International Nuclear Information System (INIS)

    Kim, Hyunsook; Kim, Sung-Soo

    2012-01-01

    In South Korea, the incentive scheme for generators to add new power generation is based on the system marginal price (SMP) and the capacity payment (CP). The infra-marginal generators receive an extra margin due to the high SMP level and the new infra-marginal generators need to be built to achieve the optimal fuel mix. However, the Metropolitan zone needs more marginal generators due to the transmission congestion and environmental regulations, but the marginal generator in the Metropolitan zone does not have adequate profits for the new investment under the current CP. This paper suggests the appropriate investment incentive scheme for different zones. The introduction of forward capacity markets for different regions creates higher capacity market prices in the Metropolitan zone than those in the Southern zone. The introduction of forward capacity market also induces a new LNG generator investment in the Metropolitan zone while only new infra-marginal generators need to be added in the Southern zone. - Highlights: ► We suggest the introduction of a capacity market for resource adequacy in Korea. ► The current capacity payment does not induce the optimal fuel mix. ► The Southern zone needs more infra-marginal generators. ► The Metropolitan zone needs marginal generators due to transmission congestion. ► Zonal capacity markets induce the efficient generation investment across zones.

  4. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  5. Feasible Teleportation Schemes with Five-Atom Entangled State

    Institute of Scientific and Technical Information of China (English)

    XUE Zheng-Yuan; YI You-Min; CAO Zhuo-Liang

    2006-01-01

    Teleportation schemes with a five-atom entangled state are investigated. In the teleportation scheme Bell state measurements (BSMs) are difficult for physical realization, so we investigate another strategy using separate measurements instead of BSM based on cavity quantum electrodynamics techniques. The scheme of two-atom entangled state teleportation is a controlled and probabilistic one. For the teleportation of the three-atom entangled state, the scheme is a probabilistic one. The fidelity and the probability of the successful teleportation are also obtained.

  6. Monitoring substrate enables real-time regulation of a protein localization pathway.

    Science.gov (United States)

    Ito, Koreaki; Mori, Hiroyuki; Chiba, Shinobu

    2018-06-01

    Protein localization machinery supports cell survival and physiology, suggesting the potential importance of its expression regulation. Here, we summarize a remarkable scheme of regulation, which allows real-time feedback regulation of the machinery expression. A class of regulatory nascent polypeptides, called monitoring substrates, undergoes force-sensitive translation arrest. The resulting ribosome stalling on the mRNA then affects mRNA folding to expose the ribosome-binding site of the downstream target gene and upregulate its translation. The target gene encodes a component of the localization machinery, whose physical action against the monitoring substrate leads to arrest cancellation. Thus, this scheme of feedback loop allows the cell to adjust the amount of the machinery to correlate inversely with the effectiveness of the process at a given moment. The system appears to have emerged late in evolution, in which a narrow range of organisms selected a distinct monitoring substrate-machinery combination. Currently, regulatory systems of SecM-SecA, VemP-SecDF2 and MifM-YidC2 are known to occur in different bacterial species.

  7. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  8. Self-tuning regulator for an interacting CSTR process

    Science.gov (United States)

    Rajendra Mungale, Niraj; Upadhyay, Akshay; Jaganatha Pandian, B.

    2017-11-01

    In the paper we have laid emphasis on STR that is Self Tuning Regulator and its application for an interacting process. CSTR has a great importance in Chemical Process when we deal with controlling different parameters of a process using CSTR. Basically CSTR is used to maintain a constant liquid temperature in the process. The proposed method called self-tuning regulator, is a different scheme where process parameters are updated and the controller parameters are obtained from the solution of a design problem. The paper deals with STR and methods associated with it.

  9. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  10. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  11. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  12. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  13. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  14. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  15. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  16. Reduction de la sensation des malaises thermiques: determination ...

    African Journals Online (AJOL)

    La présente étude a pour objet de contribuer à la réduction de la sensation des malaises thermiques à travers la recherche des orientations préférentielles des bâtiments dans les différentes zones du Togo à partir des conditions aérodynamiques et climatiques locales. Les données climatiques à savoir la température, ...

  17. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  18. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  19. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  20. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  1. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  2. A repeat-until-success quantum computing scheme

    International Nuclear Information System (INIS)

    Beige, A; Lim, Y L; Kwek, L C

    2007-01-01

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes

  3. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  4. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Affiliation of the beneficiaries of a deferred pension to the CERN Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    Subsequent to the modifications to the Rules and Regulations of the Pension Fund allowing members of the personnel having five years of affiliation to the Fund to opt for a deferred retirement pension, the Organization wishes to recall the rules relating to the affiliation of those beneficiaries to the CERN Health Insurance Scheme (CHIS). In accordance with Articles III 2.02 and VIII 4.02 of the CHIS Rules, beneficiaries of a deferred retirement pension can only be Members of the CHIS as CERN pensioners if they applied to remain Members of the Scheme upon termination of their compulsory membership as a member of the personnel and if their membership has been uninterrupted up to the moment they become CERN pensioners. The applicable contribution for this intermediate period is indicated in Articles III 5.03 and X 1.02 of the CHIS Rules. The amount is revised annually, and is set at 936 CHF/ month for 2003. Human Resources Division Tel. 73635

  6. On doublet composite schemes of leptons and quarks

    International Nuclear Information System (INIS)

    Pirogov, Yu.F.

    1981-01-01

    All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru

  7. Proposals for the Reform of Constitutional Regulations on Public Finances

    OpenAIRE

    Tibor András Hetei

    2011-01-01

    The main purpose of this paper is to make specific proposals in the areas of public finance and the budget process in the context of the reform of the Hungarian Constitution. In preparing the proposals the author has reviewed the prevailing constitutional regulations as well as the relevant practice of the Constitutional Court, and examined and compared the constitutional schemes of European countries. The paper finds that a number of aspects of the constitutional regulation of public finance...

  8. Regulating forest rotation to increase CO{sub 2} sequestration

    Energy Technology Data Exchange (ETDEWEB)

    Gong, P.; Kristroem, B.

    1999-06-01

    Previous studies have shown that the optimal forest rotation age increases considerably if the benefits of CO{sub 2} sequestration are included in rotation decisions. While these studies provide some guidelines for managing public forests, private forest owners may not choose the socially optimal rotation age. This paper discusses a regulation measure to increase CO{sub 2} sequestration in privately owned forests. The regulation problem is treated as a sequential game, where the regulator chooses a subsidy scheme and forest owners respond by changing rotation ages. A private forest owner receives a subsidy at the time of harvesting if he/she changes the rotation age towards the socially optimal one. The subsidy is proportional to the associated change in timber yield. The forest owner`s objective is to maximize the net present value of after-tax timber production profits and subsidies. The regulator`s decision problem is to find the subsidy rate that maximizes the net benefits of implementing the policy (the net of increased CO{sub 2} sequestration benefits, subsidy costs, and changes in forestry taxation income). Empirical results for Swedish examples show that the optimal subsidy rate is sensitive to the marginal benefit of CO{sub 2} sequestration, the social discount rate, and site quality. The optimal subsidy rate is found to be significantly lower than the marginal benefit of CO{sub 2} sequestration. With the proposed subsidy scheme, private forest owners will choose rotation ages longer than the Faustmann rotation, but significantly shorter than the socially optimal rotation age 21 refs, 6 tabs. Arbetsrapport 272

  9. Method of power self-regulation of CFBR-II reactor based on DSP

    International Nuclear Information System (INIS)

    Bai Zhongxiong; Zhou Wenxiang

    2007-01-01

    To the control system of Power Self-regulation of CFBR-II Reactor, a new digital control scheme based on DSP has been brought forward. The TMS320F2812 DSP chip is adopted as the core controller to realize Power self-regulation of CFBR-II Reactor. In this paper, the successful program of DSP control system is introduced in both hardware and software technology in detail. (authors)

  10. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  11. Developing New Modelling Tools for Environmental Flow Assessment in Regulated Salmon Rivers

    Science.gov (United States)

    Geris, Josie; Soulsby, Chris; Tetzlaff, Doerthe

    2013-04-01

    There is a strong political drive in Scotland to meet all electricity demands from renewable sources by 2020. In Scotland, hydropower generation has a long history and is a key component of this strategy. However, many rivers sustain freshwater communities that have both high conservation status and support economically important Atlantic salmon fisheries. Both new and existing hydropower schemes must be managed in accordance with the European Union's Water Framework Directive (WFD), which requires that all surface water bodies achieve good ecological status or maintain good ecological potential. Unfortunately, long-term river flow monitoring is sparse in the Scottish Highlands and there are limited data for defining environmental flows. The River Tay is the most heavily regulated catchment in the UK. To support hydropower generation, it has an extensive network of inter- and intra- catchment transfers, in addition to a large number of regulating reservoirs for which abstraction legislation often only requires minimum compensation flows. The Tay is also considered as one of Scotland's most important rivers for Atlantic salmon (Salmo salar), and there is considerable uncertainty as to how best change reservoir operations to improve the ecological potential of the river system. It is now usually considered that environmental flows require more than a minimum compensation flow, and instead should cover a range of hydrological flow aspects that represent ecologically relevant streamflow attributes, including magnitude, timing, duration, frequency and rate of change. For salmon, these hydrological indices are of particular interest, with requirements varying at different stages of their life cycle. To meet the WFD requirements, rationally alter current abstraction licences and provide an evidence base for regulating new hydropower schemes, advanced definitions for abstraction limits and ecologically appropriate flow releases are desirable. However, a good understanding

  12. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  13. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  14. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  15. Stakeholders Perspectives on the Success Drivers in Ghana's National Health Insurance Scheme - Identifying Policy Translation Issues.

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2016-10-01

    Ghana's National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Based on an empirical qualitative case study of stakeholders' views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. In the study, interviewees referred to both 'hard and soft' elements as driving the "success" of the Ghana scheme. The main 'hard elements' include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The 'soft' elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years, amounting to a process best conceived as germination as opposed

  16. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  17. Analysis of the imbalance price scheme in the Spanish electricity market: A wind power test case

    International Nuclear Information System (INIS)

    Bueno-Lorenzo, Miriam; Moreno, M. Ángeles; Usaola, Julio

    2013-01-01

    This work investigates the interaction between wind power and electricity markets. The paper is focused on balancing markets pricing policies. The proposal of a new imbalance price scheme is included and conveniently evaluated. This proposed scheme tries to minimise the use of ancillary services to compensate for deviations in searching for a more efficient market design. The effectiveness of imbalance prices as market signals is also examined, and policy recommendations regarding imbalance services are discussed. Two test cases are included that analyse the participation of a wind power producer in the Spanish electricity market using a stochastic optimisation strategy. For this purpose, the uncertainty of the variables is considered, i.e., wind power production and prediction, intraday and imbalance prices. Test cases were run with real data for 10 months, and realistic results are presented along with a hypothetical test case. The regulation of the imbalance prices may not be adequate for the Spanish electricity market because an error drop is not sufficiently encouraged. Therefore, we suggest the application of a new imbalance price scheme, which includes an additional constraint. The conclusions of this paper can be assumed to be general policy recommendations

  18. Convergent Difference Schemes for Hamilton-Jacobi equations

    KAUST Repository

    Duisembay, Serikbolsyn

    2018-05-07

    In this thesis, we consider second-order fully nonlinear partial differential equations of elliptic type. Our aim is to develop computational methods using convergent difference schemes for stationary Hamilton-Jacobi equations with Dirichlet and Neumann type boundary conditions in arbitrary two-dimensional domains. First, we introduce the notion of viscosity solutions in both continuous and discontinuous frameworks. Next, we review Barles-Souganidis approach using monotone, consistent, and stable schemes. In particular, we show that these schemes converge locally uniformly to the unique viscosity solution of the first-order Hamilton-Jacobi equations under mild assumptions. To solve the scheme numerically, we use Euler map with some initial guess. This iterative method gives the viscosity solution as a limit. Moreover, we illustrate our numerical approach in several two-dimensional examples.

  19. The Impacts of the New Zealand Emissions Trading Scheme on Economic and Environmental Factors

    OpenAIRE

    Saunders, Caroline M.; Saunders, John

    2011-01-01

    New Zealand implemented an emissions trading scheme, the NZ ETS, to regulate the production of Greenhouse Gases. This ETS is the first of its kind to include the agricultural sector, as is expected to significantly raise costs to both producers and consumers. The aim of the paper is to assess the potential impact of the New Zealand ETS on the economy and the environment. The paper reports first on the development and nature of the legislation itself, and then continues by mapping the cost of ...

  20. Concentrations and fluxes of dissolved uranium in the Yellow River estuary: seasonal variation and anthropogenic (Water-Sediment Regulation Scheme) impact.

    Science.gov (United States)

    Juanjuan, Sui; Zhigang, Yu; Bochao, Xu; Wenhua, Dong; Dong, Xia; Xueyan, Jiang

    2014-02-01

    The Water-Sediment Regulation Scheme (WSRS) of the Yellow River is a procedure implemented annually from June to July to expel sediments deposited in Xiaolangdi and other large middle-reach reservoirs and to scour the lower reaches of the river, by controlling water and sediment discharges. Dissolved uranium isotopes were measured in river waters collected monthly as well as daily during the 2010 WSRS (June 19-July 16) from Station Lijin (a hydrologic station nearest to the Yellow River estuary). The monthly samples showed dissolved uranium concentrations of 3.85-7.57 μg l(-1) and (234)U/(238)U activity ratios of 1.24-1.53. The concentrations were much higher than those reported for other global major rivers, and showed seasonal variability. Laboratory simulation experiments showed significant uranium release from bottom and suspended sediment. The uranium concentrations and activity ratios differed during the two stages of the WSRS, which may reflect desorption/dissolution of uranium from suspended river sediments of different origins. An annual flux of dissolved uranium of 1.04 × 10(8) g y(-1) was estimated based on the monthly average water discharge and dissolved uranium concentration in the lower reaches of the Yellow River. The amount of dissolved uranium (2.65 × 10(7) g) transported from the Yellow River to the sea during the WSRS constituted about 1/4 of the annual flux. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. The construction of Shenzhen's carbon emission trading scheme

    International Nuclear Information System (INIS)

    Jiang, Jing Jing; Ye, Bin; Ma, Xiao Ming

    2014-01-01

    The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emissions trading scheme to operate in China. This paper gives an overview of the economic and emissions situation in Shenzhen and focuses on the development of the Shenzhen ETS regulatory framework. It is devised as an ETS with an intensity-based cap, output-based allocation and a market for trading of allowances. The design of the Shenzhen ETS attaches great importance to coordinate the dynamic relationships between economic growth, industrial transition and emissions control. The cap and its allocation are determined by carbon intensity reduction targets and economic output, with an aim to slow down emissions growth while mitigating shocks from economic fluctuation and industrial adjustment to market stability. The Shenzhen ETS features extensive coverage consisting of three types of regulated entities and four categories of covered emissions, in order to control carbon emissions by both improving energy efficiency and restraining growing energy demand. A competitive game theory method is created for allocation of free allowances to manufacturing enterprises. Mechanisms for carbon offsets and market stabilization are developed to promote active and orderly trading in the carbon market. Moreover, several challenges and their policy choices are detailed for the development of the Shenzhen ETS. - Highlights: • The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emission trading scheme operated in China. • This paper focuses on the construction of Shenzhen carbon emission trading scheme. It is devised as the intensity-based cap, output-based allocation and allowance trade carbon market. • It has some signatures in the general principles, coverage and scope, cap and allocation and other mechanisms. • Several challenges and their policy choices are detailed for the development of Shenzhen ETS

  2. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  3. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  4. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  5. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  6. Scheme and scale dependences of leading electroweak corrections

    International Nuclear Information System (INIS)

    Kniehl, B.A.; Sirlin, A.

    1996-01-01

    The scheme and scale dependences of leading M t -dependent contributions to Δρ, Δr, and τ, which arise because of the truncation of the perturbative series, are investigated by comparing expressions in the on-shell and MS schemes of renormalization, and studying their scale variations. Starting from the conventional on-shell formulae, we find rather large scheme and scale dependences. We then propose a simple, physically motivated modification of the conventional expressions and show that it leads to a sharp reduction in the scheme and scale dependences. Implications for electroweak physics are discussed. (orig.)

  7. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  8. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  9. PSO-tuned PID controller for coupled tank system via priority-based fitness scheme

    Science.gov (United States)

    Jaafar, Hazriq Izzuan; Hussien, Sharifah Yuslinda Syed; Selamat, Nur Asmiza; Abidin, Amar Faiz Zainal; Aras, Mohd Shahrieel Mohd; Nasir, Mohamad Na'im Mohd; Bohari, Zul Hasrizal

    2015-05-01

    The industrial applications of Coupled Tank System (CTS) are widely used especially in chemical process industries. The overall process is require liquids to be pumped, stored in the tank and pumped again to another tank. Nevertheless, the level of liquid in tank need to be controlled and flow between two tanks must be regulated. This paper presents development of an optimal PID controller for controlling the desired liquid level of the CTS. Two method of Particle Swarm Optimization (PSO) algorithm will be tested in optimizing the PID controller parameters. These two methods of PSO are standard Particle Swarm Optimization (PSO) and Priority-based Fitness Scheme in Particle Swarm Optimization (PFPSO). Simulation is conducted within Matlab environment to verify the performance of the system in terms of settling time (Ts), steady state error (SSE) and overshoot (OS). It has been demonstrated that implementation of PSO via Priority-based Fitness Scheme (PFPSO) for this system is potential technique to control the desired liquid level and improve the system performances compared with standard PSO.

  10. Résumé sur l'eau : Une stratégie adaptive au changement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    4 janv. 2011 ... Historiquement parlant, le climat de la Terre a changé plusieurs fois et plusieurs événements climatiques se sont succédés au fil des âges, tels que des périodes glaciaires et de longues périodes de réchauffement. Les changements climatiques sont dûs à de causes variées, tant naturelles qu'humaines.

  11. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    Science.gov (United States)

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  12. A novel grain cluster-based homogenization scheme

    International Nuclear Information System (INIS)

    Tjahjanto, D D; Eisenlohr, P; Roters, F

    2010-01-01

    An efficient homogenization scheme, termed the relaxed grain cluster (RGC), for elasto-plastic deformations of polycrystals is presented. The scheme is based on a generalization of the grain cluster concept. A volume element consisting of eight (= 2 × 2 × 2) hexahedral grains is considered. The kinematics of the RGC scheme is formulated within a finite deformation framework, where the relaxation of the local deformation gradient of each individual grain is connected to the overall deformation gradient by the, so-called, interface relaxation vectors. The set of relaxation vectors is determined by the minimization of the constitutive energy (or work) density of the overall cluster. An additional energy density associated with the mismatch at the grain boundaries due to relaxations is incorporated as a penalty term into the energy minimization formulation. Effectively, this penalty term represents the kinematical condition of deformation compatibility at the grain boundaries. Simulations have been performed for a dual-phase grain cluster loaded in uniaxial tension. The results of the simulations are presented and discussed in terms of the effective stress–strain response and the overall deformation anisotropy as functions of the penalty energy parameters. In addition, the prediction of the RGC scheme is compared with predictions using other averaging schemes, as well as to the result of direct finite element (FE) simulation. The comparison indicates that the present RGC scheme is able to approximate FE simulation results of relatively fine discretization at about three orders of magnitude lower computational cost

  13. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  14. Impacts of the dam-orientated water-sediment regulation scheme on the lower reaches and delta of the Yellow River (Huanghe): A review

    Science.gov (United States)

    Wang, Houjie; Wu, Xiao; Bi, Naishuang; Li, Song; Yuan, Ping; Wang, Aimei; Syvitski, James P. M.; Saito, Yoshiki; Yang, Zuosheng; Liu, Sumei; Nittrouer, Jeffrey

    2017-10-01

    The water-sediment regulation scheme (WSRS), beginning in 2002, is an unprecedented engineering effort to manage the Yellow River with the aims to mitigate the siltation both in the lower river channel and within the Xiaolangdi Reservoir utilizing the dam-regulated flood water. Ten years after its initial implementation, multi-disciplinary indicators allow us to offer a comprehensive review of this human intervention on a river-coastal system. The WSRS generally achieved its objective, including bed erosion in the lower reaches with increasing capacity for flood discharge and the mitigation of reservoir siltation. However, the WSRS presented unexpected disturbances on the delta and coastal system. Increasing grain size of suspended sediment and decreasing suspended sediment concentration at the river mouth resulted in a regime shift of sediment transport patterns that enhanced the disequilibrium of the delta. The WSRS induced an impulse delivery of nutrients and pollutants within a short period ( 20 days), which together with the altered hydrological cycle, impacted the estuarine and coastal ecosystem. We expect that the sediment yield from the loess region in the future will decrease due to soil-conservation practices, and the lower channel erosion will also decrease as the riverbed armors with coarser sediment. These, in combination with uncertain water discharge concomitant with climate change, increasing water demands and delta subsidence, will put the delta and coastal ocean at high environmental risks. In the context of global change, this work depicts a scenario of human impacts in the river basin that were transferred along the hydrological pathway to the coastal system and remotely transformed the different components of coastal environment. The synthesis review of the WSRS indicates that an integrated management of the river-coast continuum is crucially important for the sustainability of the entire river-delta system. The lessons learned from the WSRS in

  15. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  16. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  17. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  18. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  19. Adaptive Image Transmission Scheme over Wavelet-Based OFDM System

    Institute of Scientific and Technical Information of China (English)

    GAOXinying; YUANDongfeng; ZHANGHaixia

    2005-01-01

    In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.

  20. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  1. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  2. Color encryption scheme based on adapted quantum logistic map

    Science.gov (United States)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  3. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  4. Stakeholders Perspectives on the Success Drivers in Ghana’s National Health Insurance Scheme – Identifying Policy Translation Issues

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2017-01-01

    Background: Ghana’s National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Methods: Based on an empirical qualitative case study of stakeholders’ views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. Results: In the study, interviewees referred to both ‘hard and soft’ elements as driving the "success" of the Ghana scheme. The main ‘hard elements’ include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The ‘soft’ elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Conclusion: Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years

  5. Stakeholders Perspectives on the Success Drivers in Ghana’s National Health Insurance Scheme – Identifying Policy Translation Issues

    Directory of Open Access Journals (Sweden)

    Adam Fusheini

    2017-05-01

    Full Text Available Background Ghana’s National Health Insurance Scheme (NHIS, established by an Act of Parliament (Act 650, in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Methods Based on an empirical qualitative case study of stakeholders’ views on challenges and success factors in four mutual schemes (district offices located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. Results In the study, interviewees referred to both ‘hard and soft’ elements as driving the “success” of the Ghana scheme. The main ‘hard elements’ include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The ‘soft’ elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity; and ownership and participation. Conclusion Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period

  6. Closed loop identification using a modified Hansen scheme

    DEFF Research Database (Denmark)

    Sekunda, André Krabdrup; Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2015-01-01

    in closed loop [4], and one such method is the Hansen scheme [1]. Standard identification using Hansen scheme demands generating the identification signals indirectly. In this paper it is instead proposed to use the relationship between the Youla factorization of a plant and its stabilizing controller...... in order to keep the system stable. Furthermore because the dynamics of such a system depends on the rotational speed it is needed to conduct an identification while the system is part of a closed loop scheme. The authors believe the paper able to contribute towards a simpler and more direct way...... of identifying closed loop plants using Hansen scheme....

  7. The SS-SCR Scheme for Dynamic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Vinay Thumar

    2012-01-01

    Full Text Available We integrate the two models of Cognitive Radio (CR, namely, the conventional Sense-and-Scavenge (SS Model and Symbiotic Cooperative Relaying (SCR. The resultant scheme, called SS-SCR, improves the efficiency of spectrum usage and reliability of the transmission links. SS-SCR is enabled by a suitable cross-layer optimization problem in a multihop multichannel CR network. Its performance is compared for different PU activity patterns with those schemes which consider SS and SCR separately and perform disjoint resource allocation. Simulation results depict the effectiveness of the proposed SS-SCR scheme. We also indicate the usefulness of cloud computing for a practical deployment of the scheme.

  8. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  9. Fierz transformations and renormalization schemes for fourquark operators

    Directory of Open Access Journals (Sweden)

    Garron Nicolas

    2018-01-01

    Full Text Available It has been shown that the choice of renormalization scheme is crucial for four-quark operators, in particular for neutral kaon mixing beyond the Standard Model. In the context of SMOM schemes, the choice of projector is not unique and is part of the definition of the renormalisation scheme. I present the non-diagonal Fierz relations which relate some of these projectors.

  10. Power Quality Regulation from an Economical and a Technical Point of View

    International Nuclear Information System (INIS)

    Partanen, Jarmo; Viljainen, Satu; Lassila, Jukka; Honkapuro, Samuli; Tahvanainen, Kaisa; Jaerventausta, Pertti; Maekinen, Antti; Kivikko, Kimmo

    2005-06-01

    An essential guideline for the implementation of power quality regulation - or any regulation for that matter - is that it needs to find the right balance between the interests of the different stakeholders. This is particularly important when assessing the inconvenience caused to customers by the failures in the electricity supply. Customers' experiences should obviously not be underestimated but it is equally important that excessive requirements concerning the power quality developments are not laid on the distribution companies, either - especially if they are not provided with adequate means to carry out the necessary developments. After all, regulation should encourage innovations, both organisational and technological, that benefit the industry in the long run - this applies to power quality developments as well as any other developments within the industry. Failing to do this, the investors will soon loose their interest in the electricity distribution business, and this will be extremely harmful for the capital-intensive industry. Regulators are currently developing versatile power quality regulation schemes in different countries. At this point it might be worth considering what benefits could be achieved if the framework for the power quality regulation schemes that are applied in different countries was the same - after all the goals are principally the same anyway. One of the obvious benefits would be that the regulators would have more comparable data on the observed power quality levels in different countries. In addition, those companies that operate in various markets could more easily transfer their best practices concerning the power quality developments from one market to another

  11. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  12. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  13. [Expert consensus post-marketing evaluation scheme to detect immunotoxicity of Chinese medicine in clinical populations (draft version for comments)].

    Science.gov (United States)

    Xie, Yan-Ming; Zhao, Yu-Bin; Jiang, Jun-Jie; Chang, Yan-Peng; Zhang, Wen; Shen, Hao; Lu, Peng-Fei

    2013-09-01

    Through consensus, establish a post-marketing scheme and the technical processes to evaluate Chinese medicine's immunotoxicity on a population, as well as its beneficial influences on the immune system. Provide regulations on the collection, storage and transportation of serum samples. This article applies to the post-marketing scientific evaluation of the immunotoxicity of parenterally administered, and for other ways of taking Chinese medicine.

  14. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  15. Space-Time Transformation in Flux-form Semi-Lagrangian Schemes

    Directory of Open Access Journals (Sweden)

    Peter C. Chu Chenwu Fan

    2010-01-01

    Full Text Available With a finite volume approach, a flux-form semi-Lagrangian (TFSL scheme with space-time transformation was developed to provide stable and accurate algorithm in solving the advection-diffusion equation. Different from the existing flux-form semi-Lagrangian schemes, the temporal integration of the flux from the present to the next time step is transformed into a spatial integration of the flux at the side of a grid cell (space for the present time step using the characteristic-line concept. The TFSL scheme not only keeps the good features of the semi-Lagrangian schemes (no Courant number limitation, but also has higher accuracy (of a second order in both time and space. The capability of the TFSL scheme is demonstrated by the simulation of the equatorial Rossby-soliton propagation. Computational stability and high accuracy makes this scheme useful in ocean modeling, computational fluid dynamics, and numerical weather prediction.

  16. Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows.

    Science.gov (United States)

    Li, Q; Luo, K H; Li, X J

    2012-07-01

    The pseudopotential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudoepotential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudopotential LB model. First, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme [Shan and Chen, Phys. Rev. E 47, 1815 (1993)] and the exact-difference-method forcing scheme [Kupershtokh et al., Comput. Math. Appl. 58, 965 (2009)]. The nature of these two schemes and their recovered macroscopic equations will be shown. Second, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudopotential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach to achieving thermodynamic consistency in the pseudopotential LB model.

  17. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  18. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  19. Evaluation of exercise-respiratory system modifications and integration schemes for physiological systems

    Science.gov (United States)

    Gallagher, R. R.

    1974-01-01

    Exercise subroutine modifications are implemented in an exercise-respiratory system model yielding improvement of system response to exercise forcings. A more physiologically desirable respiratory ventilation rate in addition to an improved regulation of arterial gas tensions and cerebral blood flow is observed. A respiratory frequency expression is proposed which would be appropriate as an interfacing element of the respiratory-pulsatile cardiovascular system. Presentation of a circulatory-respiratory system integration scheme along with its computer program listing is given. The integrated system responds to exercise stimulation for both nonstressed and stressed physiological states. Other integration possibilities are discussed with respect to the respiratory, pulsatile cardiovascular, thermoregulatory, and the long-term circulatory systems.

  20. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  1. ROMANIAN DEPOSIT GUARANTEE SCHEME AND THE REQUIREMENTS OF THE ACQUIS COMMUNAUTAIRE

    Directory of Open Access Journals (Sweden)

    Cristian Bichi

    2002-12-01

    Full Text Available This paper compares the Romanian and EU deposit insurance legislation in order to identify the changes, which are needed in order to obtain a full compatibility of the national regulations in the field of deposit protection with the corresponding European rules. The first part outlines the main features of the EU Directive 94/19/EEC on deposit guarantee schemes in order to find out to what extent Romania is bound to incorporate the relevant acquis communautaire into its national legislation. It results that the directive contains explicit harmonization provisions as regards the minimum level of protection (EUR 20,000, depositor co-insurance, types of depositors, instruments and currencies to be covered, nature of coverage, status of branches from EU and non-EU countries, the compensation period and information to depositors. The directive does not provide for the harmonization of the financial and administrative structure of the deposit guarantee schemes, Romania being free to choose from a wider range of options. The second part examines the legal environment of deposit protection in Romania. The third part identifies the measures to be taken by the Romanian authorities in order to fill in the remaining regulatory gaps in the area of deposit insurance. Finally, the fourth part contains the conclusions.

  2. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  3. Patterns of agri-environmental scheme participation in Europe

    DEFF Research Database (Denmark)

    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren Bech Pilgaard

    2016-01-01

    This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... areas with marginal potential for agriculture. Motives for non-participation were also found to be dependent on the level of farming engagement and on case-area landscape types.......This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... geographical particularities and on subjective factors, farmers' individualities, different rural cultures, landscape types, EU and national policies and special needs of the study areas—all areas where agricultural production is increasingly marginalized, for different reasons. Subsidy scheme participation...

  4. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  5. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  6. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  7. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  8. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  9. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  10. Verifying atom entanglement schemes by testing Bell's inequality

    International Nuclear Information System (INIS)

    Angelakis, D.G.; Knight, P.L.; Tregenna, B.; Munro, W.J.

    2001-01-01

    Recent experiments to test Bell's inequality using entangled photons and ions aimed at tests of basic quantum mechanical principles. Interesting results have been obtained and many loopholes could be closed. In this paper we want to point out that tests of Bell's inequality also play an important role in verifying atom entanglement schemes. We describe as an example a scheme to prepare arbitrary entangled states of N two-level atoms using a leaky optical cavity and a scheme to entangle atoms inside a photonic crystal. During the state preparation no photons are emitted, and observing a violation of Bell's inequality is the only way to test whether a scheme works with a high precision or not. (orig.)

  11. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  12. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  13. Etude de l'effet de la date de semis et de l'Age des plantules au

    African Journals Online (AJOL)

    Les périmètres irrigués villageois (PIV) sont utilisés pour atténuer les effets néfastes des changements climatiques. Les variétés cultivées dans les PIV sont d'origine asiatique et souffrent des conditions agro climatiques des régions nord du Mali. Les expérimentations ont été conduites en milieu paysan dans les. PIV de ...

  14. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  15. Coarse-Grain Bandwidth Estimation Scheme for Large-Scale Network

    Science.gov (United States)

    Cheung, Kar-Ming; Jennings, Esther H.; Sergui, John S.

    2013-01-01

    A large-scale network that supports a large number of users can have an aggregate data rate of hundreds of Mbps at any time. High-fidelity simulation of a large-scale network might be too complicated and memory-intensive for typical commercial-off-the-shelf (COTS) tools. Unlike a large commercial wide-area-network (WAN) that shares diverse network resources among diverse users and has a complex topology that requires routing mechanism and flow control, the ground communication links of a space network operate under the assumption of a guaranteed dedicated bandwidth allocation between specific sparse endpoints in a star-like topology. This work solved the network design problem of estimating the bandwidths of a ground network architecture option that offer different service classes to meet the latency requirements of different user data types. In this work, a top-down analysis and simulation approach was created to size the bandwidths of a store-and-forward network for a given network topology, a mission traffic scenario, and a set of data types with different latency requirements. These techniques were used to estimate the WAN bandwidths of the ground links for different architecture options of the proposed Integrated Space Communication and Navigation (SCaN) Network. A new analytical approach, called the "leveling scheme," was developed to model the store-and-forward mechanism of the network data flow. The term "leveling" refers to the spreading of data across a longer time horizon without violating the corresponding latency requirement of the data type. Two versions of the leveling scheme were developed: 1. A straightforward version that simply spreads the data of each data type across the time horizon and doesn't take into account the interactions among data types within a pass, or between data types across overlapping passes at a network node, and is inherently sub-optimal. 2. Two-state Markov leveling scheme that takes into account the second order behavior of

  16. Coordinated Control Scheme of Battery Energy Storage System (BESS) and Distributed Generations (DGs) for Electric Distribution Grid Operation

    DEFF Research Database (Denmark)

    Cha, Seung-Tae; Zhao, Haoran; Wu, Qiuwei

    2012-01-01

    into the islanding operation mode, while the centralized joint load frequency control (CJLFC) utilizing DGs handles the secondary frequency regulation. The BESS with the associated controllers has been modelled in Real-time digital simulator (RTDS) in order to identify the improvement of the frequency and voltage......This paper describes a coordinated control scheme of battery energy storage system (BESS) and distributed generations (DGs) for electric distribution grid operation. The BESS is designed to stabilize frequency and voltages as a primary control after the electric distribution system enters...... response. The modified IEEE 9-bus system, which is comprised of several DG units, wind power plant and the BESS, has been employed to illustrate the performance of the proposed coordinated flexible control scheme using RTDS in order to verify its practical efficacy....

  17. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  18. [Occlusal schemes of complete dentures--a review of the literature].

    Science.gov (United States)

    Tarazi, E; Ticotsky-Zadok, N

    2007-01-01

    Occlusal scheme is defined as the form and the arrangement of the occlusal contacts in natural and artificial dentition. The choice of an occlusal scheme will determine the pattern of occlusal contacts between opposing teeth during centric relation and functional movement of the mandible. With dentures, the quantity and the intensity of these contacts determine the amount and the direction of the forces that are transmitted through the bases of the denture to the residual ridges. That is why the occlusal scheme is an important factor in the design of complete dentures. Three occlusal schemes are viewed in this review: bilateral balanced occlusion, monplane occlusion, and linear occlusion scheme. Each scheme represents a different concept of occlusion. Comparisons between these schemes are also reviewed and analyzed. The reasoning underlying the bilateral balanced occlusion scheme is that stability of the dentures is attained when bilateral contacts exist throughout all dynamic and static states of the denture during function. Anatomic teeth are used: the upper anterior teeth are set to satisfy aesthetics, and the posterior teeth are arranged in a compensatory curve and a medial curve. This scheme is adequate for well developed residual ridges, with skeletal class I relation. With highly resorbed residual ridges, the vectors of force that are transmitted through anatomic cusps will dislodge the lower denture and thus impair the comfort and efficiency of mastication experienced by the patient. In order to accommodate to the special needs posed by highly resorbed residual ridges and skeletal relations that are not class I, the monoplane scheme of occlusion was designed. This scheme consists of non anatomic (cuspless) teeth, which are set so that the anterior teeth provide the aesthetics, the premolars and the first molars are used for chewing, and the second molars do not occlude (although sometimes they are specifically used to establish bilateral contacts in lateral

  19. The structure, regulation, and performance of pension funds in nine industrial countries

    OpenAIRE

    Davis, E.P.; DEC

    1993-01-01

    The author offers an overview of issues relating to the development of funded pension schemes in industrial countries. The analysis applies the economic theory of pension regulation to experience with the structure, regulation, and performance of funds in nine countries - Canada, Denmark, Germany, Japan, Netherlands, Sweden, Switzerland, the United Kingdom, and the United States - seeking to shed light on the finance of old age security in developing countries and the reform of pension funds ...

  20. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  1. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings......, facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination...

  2. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    Science.gov (United States)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  3. A Hybrid Single-Carrier/Multicarrier Transmission Scheme with Power Allocation

    Directory of Open Access Journals (Sweden)

    Luc Féty

    2007-11-01

    Full Text Available We propose a flexible transmission scheme which easily allows to switch between cyclic-prefixed single-carrier (CP-SC and cyclic-prefixed multicarrier (CP-MC transmissions. This scheme takes advantage of the best characteristic of each scheme, namely, the low peak-to-average power ratio (PAPR of the CP-SC scheme and the robustness to channel selectivity of the CP-MC scheme. Moreover, we derive the optimum power allocation for the CP-SC transmission considering a zero-forcing (ZF and a minimum mean-square error (MMSE receiver. By taking the PAPR into account, we are able to make a better analysis of the overall system and the results show the advantage of the CP-SC-MMSE scheme for flat and mild selective channels due to their low PAPR and that the CP-MC scheme is more advantageous for a narrow range of channels with severe selectivity.

  4. An efficient and provable secure revocable identity-based encryption scheme.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  5. Concentrations and fluxes of dissolved uranium in the Yellow River estuary: seasonal variation and anthropogenic (Water-Sediment Regulation Scheme) impact

    International Nuclear Information System (INIS)

    Juanjuan, Sui; Zhigang, Yu; Bochao, Xu; Wenhua, Dong; Dong, Xia; Xueyan, Jiang

    2014-01-01

    The Water-Sediment Regulation Scheme (WSRS) of the Yellow River is a procedure implemented annually from June to July to expel sediments deposited in Xiaolangdi and other large middle-reach reservoirs and to scour the lower reaches of the river, by controlling water and sediment discharges. Dissolved uranium isotopes were measured in river waters collected monthly as well as daily during the 2010 WSRS (June 19–July 16) from Station Lijin (a hydrologic station nearest to the Yellow River estuary). The monthly samples showed dissolved uranium concentrations of 3.85–7.57 μg l −1 and 234 U/ 238 U activity ratios of 1.24–1.53. The concentrations were much higher than those reported for other global major rivers, and showed seasonal variability. Laboratory simulation experiments showed significant uranium release from bottom and suspended sediment. The uranium concentrations and activity ratios differed during the two stages of the WSRS, which may reflect desorption/dissolution of uranium from suspended river sediments of different origins. An annual flux of dissolved uranium of 1.04 × 10 8 g y −1 was estimated based on the monthly average water discharge and dissolved uranium concentration in the lower reaches of the Yellow River. The amount of dissolved uranium (2.65 × 10 7 g) transported from the Yellow River to the sea during the WSRS constituted about 1/4 of the annual flux. -- Highlights: • Dissolved U in the Yellow River estuary has distinct seasonal variability. • Geochemistry of dissolved U influenced by the WSRS has been analyzed. • Uranium flux during the WSRS has been evaluated

  6. Lattice-Boltzmann scheme for natural convection in porous media

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    1997-01-01

    A lattice-Boltzmann scheme for natural convection in porous media is developed and applied to the heat transfer problem of a 1000 kg potato packaging. The scheme has features new to the field of LB schemes. It is mapped on a orthorhombic lattice instead of the traditional cubic lattice. Furthermore

  7. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  8. An extrapolation scheme for solid-state NMR chemical shift calculations

    Science.gov (United States)

    Nakajima, Takahito

    2017-06-01

    Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.

  9. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  10. Internet Cognitive Failure and Fatigue Relevant to Learners' Self-Regulation and Learning Progress in English Vocabulary with a Calibration Scheme

    Science.gov (United States)

    Hong, J.-C.; Hwang, M.-Y.; Chang, H.-W.; Tai, K.-H.; Kuo, Y.-C.; Tsai, Y.-H.

    2015-01-01

    To determine the factors of learning effectiveness in English vocabulary learning when using a calibration scheme, this study developed a freshman English mobile device application (for iPhone 4) for students with low levels of English proficiency to practise vocabulary in the beginning of their Freshman English course. Data were collected and…

  11. Linear source approximation scheme for method of characteristics

    International Nuclear Information System (INIS)

    Tang Chuntao

    2011-01-01

    Method of characteristics (MOC) for solving neutron transport equation based on unstructured mesh has already become one of the fundamental methods for lattice calculation of nuclear design code system. However, most of MOC codes are developed with flat source approximation called step characteristics (SC) scheme, which is another basic assumption for MOC. A linear source (LS) characteristics scheme and its corresponding modification for negative source distribution were proposed. The OECD/NEA C5G7-MOX 2D benchmark and a self-defined BWR mini-core problem were employed to validate the new LS module of PEACH code. Numerical results indicate that the proposed LS scheme employs less memory and computational time compared with SC scheme at the same accuracy. (authors)

  12. Nonoscillatory shock capturing scheme using flux limited dissipation

    International Nuclear Information System (INIS)

    Jameson, A.

    1985-01-01

    A method for modifying the third order dissipative terms by the introduction of flux limiters is proposed. The first order dissipative terms can then be eliminated entirely, and in the case of a scalar conservation law the scheme is converted into a total variation diminishing scheme provided that an appropriate value is chosen for the dissipative coefficient. Particular attention is given to: (1) the treatment of the scalar conservation law; (2) the treatment of the Euler equations for inviscid compressible flow; (3) the boundary conditions; and (4) multistage time stepping and multigrid schemes. Numerical results for transonic flows suggest that a central difference scheme augmented by flux limited dissipative terms can lead to an effective nonoscillatory shock capturing method. 20 references

  13. Explicit TE/TM scheme for particle beam simulations

    International Nuclear Information System (INIS)

    Dohlus, M.; Zagorodnov, I.

    2008-10-01

    In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)

  14. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  15. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  16. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  17. Type monotonic allocation schemes for multi-glove games

    OpenAIRE

    Brânzei, R.; Solymosi, T.; Tijs, S.H.

    2007-01-01

    Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...

  18. A fast iterative scheme for the linearized Boltzmann equation

    Science.gov (United States)

    Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.

    2017-06-01

    Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference

  19. Towards an integrated design of voluntary approaches and standardization processes: An analysis of issues and trends in the Italian regulation on ground coupled heat pumps

    International Nuclear Information System (INIS)

    Rizzi, Francesco; Frey, Marco; Iraldo, Fabio

    2011-01-01

    Highlights: → We investigate GCHP regulation development from an entrepreneurial perspective. → Threats in booming market orient entrepreneurs toward green management. → Command and control regulation is not sufficient to guarantee market sustainability. → Voluntary regulation encourage best performers to invest in long-term strategies. → Bottom-up regulation design advances integration of process and product standards. - Abstract: Despite the lack of specific incentives, ground coupled heat pump (GCHP) installations are booming in Italy both in the private and public sectors. Such rapid growth is coupled with increasing concern for environmental and technical performances since no comprehensive regulation and reliable standards currently exist. This paper discusses potential schemes aimed at balancing mandatory and voluntary requirements by using SWOT-based techniques and examining the opinions of sectoral leaders. The analysis suggests that standardization and voluntary schemes are perceived as efficient and effective tools to encourage the greening of Italian GCHP-SMEs in the short-term while laying the foundations for sustainable policies in the longer run. A potential scheme is discussed that was simulated by reflecting the supply-side of the market, and which involves process and product standards.

  20. Towards an integrated design of voluntary approaches and standardization processes: An analysis of issues and trends in the Italian regulation on ground coupled heat pumps

    Energy Technology Data Exchange (ETDEWEB)

    Rizzi, Francesco, E-mail: f.rizzi@sssup.it [Scuola Superiore Sant' Anna - Istituto di Management, P.zza Martiri della Liberta 33, 56127 Pisa (Italy); Frey, Marco, E-mail: frey@sssup.it [Scuola Superiore Sant' Anna - Istituto di Management, P.zza Martiri della Liberta 33, 56127 Pisa (Italy); Iraldo, Fabio, E-mail: f.iraldo@sssup.it [Scuola Superiore Sant' Anna - Istituto di Management, P.zza Martiri della Liberta 33, 56127 Pisa (Italy)

    2011-09-15

    Highlights: {yields} We investigate GCHP regulation development from an entrepreneurial perspective. {yields} Threats in booming market orient entrepreneurs toward green management. {yields} Command and control regulation is not sufficient to guarantee market sustainability. {yields} Voluntary regulation encourage best performers to invest in long-term strategies. {yields} Bottom-up regulation design advances integration of process and product standards. - Abstract: Despite the lack of specific incentives, ground coupled heat pump (GCHP) installations are booming in Italy both in the private and public sectors. Such rapid growth is coupled with increasing concern for environmental and technical performances since no comprehensive regulation and reliable standards currently exist. This paper discusses potential schemes aimed at balancing mandatory and voluntary requirements by using SWOT-based techniques and examining the opinions of sectoral leaders. The analysis suggests that standardization and voluntary schemes are perceived as efficient and effective tools to encourage the greening of Italian GCHP-SMEs in the short-term while laying the foundations for sustainable policies in the longer run. A potential scheme is discussed that was simulated by reflecting the supply-side of the market, and which involves process and product standards.

  1. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  2. Environmental assessment of alternative treatment schemes for energy and nutrient recovery from livestock manure.

    Science.gov (United States)

    Pedizzi, C; Noya, I; Sarli, J; González-García, S; Lema, J M; Moreira, M T; Carballa, M

    2018-04-20

    The application of livestock manure on agricultural land is being restricted due to its significant content of phosphorus (P) and nitrogen (N), leading to eutrophication. At the same time, the growing demand for N and P mineral fertilizers is increasing their production costs and causing the depletion of natural phosphate rock deposits. In the present work, seven technologically feasible treatment schemes for energy (biogas) and nutrient recovery (e.g., struvite precipitation) and/or removal (e.g., partial nitritation/anammox) were evaluated from an environmental perspective. In general, while approaches based solely on energy recovery and use of digestate as fertilizer are commonly limited by community regulations, strategies pursuing the generation of high-quality struvite are not environmentally sound alternatives. In contrast, schemes that include further solid/liquid separation of the digestate improved the environmental profile, and their combination with an additional N-removal stage would lead to the most environmental-friendly framework. However, the preferred scenario was identified to be highly dependent on the particular conditions of each site, integrating environmental, social and economic criteria. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  4. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  5. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  6. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  7. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  8. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-11-01

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000. Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC, and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure schemes.

  9. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  10. On some Approximation Schemes for Steady Compressible Viscous Flow

    Science.gov (United States)

    Bause, M.; Heywood, J. G.; Novotny, A.; Padula, M.

    This paper continues our development of approximation schemes for steady compressible viscous flow based on an iteration between a Stokes like problem for the velocity and a transport equation for the density, with the aim of improving their suitability for computations. Such schemes seem attractive for computations because they offer a reduction to standard problems for which there is already highly refined software, and because of the guidance that can be drawn from an existence theory based on them. Our objective here is to modify a recent scheme of Heywood and Padula [12], to improve its convergence properties. This scheme improved upon an earlier scheme of Padula [21], [23] through the use of a special ``effective pressure'' in linking the Stokes and transport problems. However, its convergence is limited for several reasons. Firstly, the steady transport equation itself is only solvable for general velocity fields if they satisfy certain smallness conditions. These conditions are met here by using a rescaled variant of the steady transport equation based on a pseudo time step for the equation of continuity. Another matter limiting the convergence of the scheme in [12] is that the Stokes linearization, which is a linearization about zero, has an inevitably small range of convergence. We replace it here with an Oseen or Newton linearization, either of which has a wider range of convergence, and converges more rapidly. The simplicity of the scheme offered in [12] was conducive to a relatively simple and clearly organized proof of its convergence. The proofs of convergence for the more complicated schemes proposed here are structured along the same lines. They strengthen the theorems of existence and uniqueness in [12] by weakening the smallness conditions that are needed. The expected improvement in the computational performance of the modified schemes has been confirmed by Bause [2], in an ongoing investigation.

  11. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  12. Simulating deep convection with a shallow convection scheme

    Directory of Open Access Journals (Sweden)

    C. Hohenegger

    2011-10-01

    Full Text Available Convective processes profoundly affect the global water and energy balance of our planet but remain a challenge for global climate modeling. Here we develop and investigate the suitability of a unified convection scheme, capable of handling both shallow and deep convection, to simulate cases of tropical oceanic convection, mid-latitude continental convection, and maritime shallow convection. To that aim, we employ large-eddy simulations (LES as a benchmark to test and refine a unified convection scheme implemented in the Single-column Community Atmosphere Model (SCAM. Our approach is motivated by previous cloud-resolving modeling studies, which have documented the gradual transition between shallow and deep convection and its possible importance for the simulated precipitation diurnal cycle.

    Analysis of the LES reveals that differences between shallow and deep convection, regarding cloud-base properties as well as entrainment/detrainment rates, can be related to the evaporation of precipitation. Parameterizing such effects and accordingly modifying the University of Washington shallow convection scheme, it is found that the new unified scheme can represent both shallow and deep convection as well as tropical and mid-latitude continental convection. Compared to the default SCAM version, the new scheme especially improves relative humidity, cloud cover and mass flux profiles. The new unified scheme also removes the well-known too early onset and peak of convective precipitation over mid-latitude continental areas.

  13. Development of new NDT certification scheme in Singapore

    International Nuclear Information System (INIS)

    Wong, B.S.; Prabhakaran, K.G.; Babu, S.K.; Kuppuswamy, N.

    2009-01-01

    Nondestructive testing plays a vital role in Singapore Industry either it is construction or it it oil and gas. To cope up with the future demands for nondestructive testing personnel and cater to the local industry needs for qualified and certified NDT operators, Nondestructive Testing Society (Singapore)-NDTSS launched the SGNDT Certification Scheme. The aim of the organization is to promote and standardize the quality of NDT through education and training based on a scheme that is on par with internationally recognized 3rd party certifications. The certification also provides a greater confidence to the clients and end users who utilize the NDT test results provided by the certified operators. NDE certification in Singapore varies from industries and currently relies on the in-house certification scheme based on SNT-TC-1A where organizations find it difficult to standardize the skill and reliability of operators. NDE Certification system varies globally from countries to countries. A proper certification system is required to produce successful NDT Practitioners to suit the local industry. This paper outlines the development of Singapore NDT Certification Scheme (SGNDT), the operations, levels of qualification, the method of operation and control measures. The Training and Certification committee, Quality Management system within the certification scheme and the current system practiced in Singapore are discussed in this paper. The paper also highlights the importance of third party certification scheme. (author)

  14. A robust trust establishment scheme for wireless sensor networks.

    Science.gov (United States)

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  15. Possibilities for marker-assisted selection in aquaculture breeding schemes

    International Nuclear Information System (INIS)

    Sonesson, A.K.

    2007-01-01

    FAO estimates that there are around 200 species in aquaculture. However, only a few species have ongoing selective breeding programmes. Marker-assisted selection (MAS) is not used in any aquaculture breeding scheme today. The aim of this chapter, therefore, is to review briefly the current status of aquaculture breeding schemes and to evaluate the possibilities for MAS of aquaculture species. Genetic marker maps have been published for some species in culture. The marker density of these maps is, in general, rather low and the maps are composed of many amplified fragment length polymorphism (AFLP) markers anchored to few microsatellites. Some quantitative trait loci (QTL) have been identified for economically important traits, but they are not yet mapped at a high density. Computer simulations of within-family MAS schemes show a very high increase in genetic gain compared with conventional family-based breeding schemes, mainly due to the large family sizes that are typical for aquaculture breeding schemes. The use of genetic markers to identify individuals and their implications for breeding schemes with control of inbreeding are discussed. (author)

  16. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  17. Linking CO{sub 2} emissions from international shipping to the EU emissions trading scheme

    Energy Technology Data Exchange (ETDEWEB)

    Kaageson, Per [Nature Associates, Stockholm (Sweden)

    2009-09-15

    The objective of the report is to analyse the feasibility of a cap-and-trade system for CO{sub 2} emissions from international shipping linked to the European Emission Trading Scheme (ETS). The idea presented in the paper is to tie the permission for a ship to call at a port of a participating country to the vessels participation in a scheme for emissions trading under a common cap. The ship would be liable for emissions from fuel bunkered during, say, six months prior to a call at a participating port. With this design, emissions from the return voyages of ships involved in intercontinental traffic would automatically be covered, and shipowners and operators would gain nothing by calling at ports just outside the European Union. The geographical scope would thus be global, albeit limited to ships that call at ports of the European Union (and other participating states). The fuel consumption, that the surrendered CO{sub 2} allowances would have to match, could be declared by using the existing mandatory bunker delivery notes that all ships above 400 GT need to keep according to Regulation 18 of MARPOL Annex VI. The report discusses various ways for initial allocation of allowances and concludes that the least distorting method would be to sell them on auction and recycle all or most of the revenues to the shipping sector in a way that does not interfere with the objective of the trading scheme. In the case where Maritime Emissions Trading Scheme (METS) is initially limited to the ports of the European Union, at least 6 200 million ton less CO{sub 2} would be emitted over the 23 years between 2012 and 2035 compared to a business-as-usual scenario. However, a great part of this would be reductions in land-based sources paid indirectly by the shipping sector. (orig.)

  18. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  19. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  20. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  1. Monotonicity Conditions for Multirate and Partitioned Explicit Runge-Kutta Schemes

    KAUST Repository

    Hundsdorfer, Willem

    2013-01-01

    Multirate schemes for conservation laws or convection-dominated problems seem to come in two flavors: schemes that are locally inconsistent, and schemes that lack mass-conservation. In this paper these two defects are discussed for one-dimensional conservation laws. Particular attention will be given to monotonicity properties of the multirate schemes, such as maximum principles and the total variation diminishing (TVD) property. The study of these properties will be done within the framework of partitioned Runge-Kutta methods. It will also be seen that the incompatibility of consistency and mass-conservation holds for ‘genuine’ multirate schemes, but not for general partitioned methods.

  2. Government regulation as an impetus for innovation: Evidence from energy performance regulation in the Dutch residential building sector

    International Nuclear Information System (INIS)

    Beerepoot, Milou; Beerepoot, Niels

    2007-01-01

    The recent implementation of energy performance policy as a way to tackle energy consumption in the building sector in Europe draws attention to the effect it has on the development and diffusion of energy-saving innovations. According to innovation system literature, government regulation through norms and standards is one of the factors stimulating innovation. This paper concentrates on the role of stricter government regulation as an incentive to innovation in the Dutch residential building sector. Innovation in this sector is predominantly a process of applying incremental modifications to comply with new and stricter government regulations and standards. Energy performance policy in its current shape will therefore not contribute to the diffusion of really new innovation in energy techniques for residential buildings in the Netherlands. If diffusion of really new innovation is an explicit aim of energy performance policy then the European wide introduction of this scheme needs reconsideration

  3. Schemes for Greenberger-Horne-Zeilinger and cluster state preparation

    International Nuclear Information System (INIS)

    Song Jie; Xia Yan; Song Heshan

    2008-01-01

    Schemes to generate Greenberger-Horne-Zeilinger (GHZ) and cluster states of three atoms are proposed in a two-mode cavity. The advantages of the schemes are their robustness against decoherence due to spontaneous emission of the excited states and decay of the cavity modes. Moreover, the schemes can be generalized to generate N-atom entangled states

  4. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Directory of Open Access Journals (Sweden)

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  5. Hybrid flux splitting schemes for numerical resolution of two-phase flows

    Energy Technology Data Exchange (ETDEWEB)

    Flaatten, Tore

    2003-07-01

    This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)

  6. Progress with multigrid schemes for hypersonic flow problems

    International Nuclear Information System (INIS)

    Radespiel, R.; Swanson, R.C.

    1995-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10 6 and Mach numbers up to 25. 32 refs., 31 figs., 1 tab

  7. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  8. Electrical energy industry regulation: trend in the international context

    International Nuclear Information System (INIS)

    Perez Arriaga, J.I.

    1995-01-01

    The regulation of the electric power industry is presently experiencing significative changes world-wide at an unprecedented pace. In these circumstances it is useless to attempt the preparation of a static snapshot of the current situation, because of the difficulties in capturing the exact position of each player and also because the picture would become obsolete in a very short time. This paper presents the specific features characterising power organisation, the regulatory approaches to the several services involved in supplying electricity, and alternative schemes for introduction of different levels of competition in traditionally regulated electric systems. (Author) 24 refs

  9. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    Science.gov (United States)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  10. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  11. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  12. Additive Difference Schemes for Filtration Problems in Multilayer Systems

    CERN Document Server

    Ayrjan, E A; Pavlush, M; Fedorov, A V

    2000-01-01

    In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.

  13. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  14. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  15. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  16. Determinants and Characteristics of Korean Companies’ Carbon Management under the Carbon Pricing Scheme

    Directory of Open Access Journals (Sweden)

    Sunhee Suk

    2018-04-01

    Full Text Available In response to the domestic emission trading scheme, Korean companies are required to shift their strategies from voluntary or regulation-driven management approaches to innovative carbon management utilizing their carbon option linked with economic value. Using a questionnaire survey targeting companies subjected to the emission trading scheme, this study explores the status of Korean companies’ carbon management in a series of five strategies and identifies the correlation between companies’ proactive carbon strategies and pre-listed determinant factors. This study found that Korean companies’ practices in accordance with carbon pricing deviate little from conventional energy and environmental management in this phase. They are likely to be affected by the need to appear socially responsible or to make a social contribution, without having to exceed this mandate in terms activities outside of this remit. Yet, only a small proportion of companies have advanced to the stage of proactive carbon management. For them, top managers’ support and understanding are essential factors together with government pressure to factor-in issues related to carbon with their business strategies. This study provides implications for policy and corporate in promoting carbon-oriented management under the carbon policy.

  17. Differences exist across insurance schemes in China post-consolidation.

    Directory of Open Access Journals (Sweden)

    Yang Li

    Full Text Available In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance, URBMI (Urban Resident Basic Medical Insurance, and NCMS (New Cooperative Medical Scheme, across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation.A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket cost, and insurance reimbursement rate.Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate.Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  18. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  19. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  20. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  1. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  2. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  3. Factors affecting sustainability of rural water schemes in Swaziland

    Science.gov (United States)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  4. A multi-criteria evaluation framework for tradable white certificate schemes

    International Nuclear Information System (INIS)

    Mundaca, Luis; Neij, Lena

    2009-01-01

    Recent years have witnessed regained political momentum on energy efficiency and interest in establishing markets is growing. As a result, Tradable White Certificate (TWC) schemes of differing design have been implemented in Great Britain, Italy and France. Much attention is being paid to justifying and evaluating such schemes. In this paper, we develop and apply a multi-criteria framework for evaluating TWC schemes-an approach that attempts to cover their individual design features. A broad evaluation is conducted regarding energy-saving and environmental effectiveness, economic efficiency, cost-effectiveness, transaction costs, political feasibility, administrative burden and technical change. The results show the design and performance of TWC schemes to be case and context-specific, and generalisations are thus inappropriate. This evaluation supports the cost-effectiveness modelled for the British scheme and the assumption that a TWC scheme is an economically efficient policy instrument. For the other, more complex TWC schemes, more data and experience are needed to judge their ex-post merit. On the whole, the proposed multi-criteria evaluation requires considerable data and complementary methods. However, the framework improves the understanding of the broad effects and attributes of TWC schemes. It deals with various empirical and normative aspects that can be applied in their evaluation.

  5. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  6. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  7. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  8. Value based pricing, research and development, and patient access schemes. Will the United Kingdom get it right or wrong?

    Science.gov (United States)

    Towse, Adrian

    2010-09-01

    The National Health Service (NHS) should reward innovation it values. This will enable the NHS and the United Kingdom (UK) economy to benefit and impact positively on the Research and Development (R&D) decision making of companies. The National Institute for Health and Clinical Excellence (NICE) currently seeks to do this on behalf of the NHS. Yet the Office of Fair Trading proposals for Value Based Pricing add price setting powers--initially for the Department of Health (DH) and then for NICE. This introduces an additional substantial uncertainty that will impact on R&D and, conditional on R&D proceeding, on launch (or not) in the UK. Instead of adding to uncertainty the institutional arrangements for assessing value should seek to be predictable and science based, building on NICE's current arrangements. The real challenge is to increase understanding of the underlying cost-effectiveness of the technology itself by collecting evidence alongside use. The 2009 Pharmaceutical Price Regulation Scheme sought to help do this with Flexible Pricing (FP) and Patient Access Schemes (PASs). The PASs to date have increased access to medicines, but no schemes proposed to date have yet helped to tackle outcomes uncertainty. The 2010 Innovation Pass can also be seen as a form of 'coverage with evidence development.' The NHS is understandably concerned about the costs of running such evidence collection schemes. Enabling the NHS to deliver on such schemes will impact favourably on R&D decisions. Increasing the uncertainty in the UK NHS market through government price setting will reduce incentives for R&D and for early UK launch.

  9. Conservative numerical schemes for Euler-Lagrange equations

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, L. [Universidad Complutense, Madrid (Spain). Dept. de Matematica Aplicada; Jimenez, S. [Universidad Alfonso X El Sabio, Madrid (Spain). Dept. de Matematica Aplicada

    1999-05-01

    As a preliminary step to study magnetic field lines, the authors seek numerical schemes that reproduce at discrete level the significant feature of the continuous model, based on an underling Lagrangian structure. The resulting scheme give discrete counterparts of the variation law for the energy as well of as the Euler-Lagrange equations and their symmetries.

  10. Procedural Justice for ‘Weaker Parties’ in Cross-Border Litigation under the EU Regulatory Scheme

    Directory of Open Access Journals (Sweden)

    Vesna Lazić

    2014-11-01

    Full Text Available This article discusses how procedural justice for consumers, employees and insurance policy holders or other beneficiaries under insurance contracts has been ensured in the legal instruments of the EU legislator. The analysis focuses on the Brussels Jurisdiction Regulation, both under the current regulatory scheme and in its recently revised version. Thereby, the rules on jurisdiction, the enforcement of judgments in civil and commercial matters, as well as instruments that unify certain rules of civil procedure have been analysed. Within the context of the rules on jurisdiction, the relevance of the EU legislation for the validity and enforceability of jurisdictional clauses against weaker parties is addressed. Thereby express provisions in EU legislation, as well as relevant case law of the CJEU, have been the subject of the analysis. The changes introduced by the revised Regulation are discussed in great detail.

  11. Construction of a knowledge classification scheme for sharing and usage of knowledge

    International Nuclear Information System (INIS)

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  12. An improved biometrics-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  13. Privacy preserving cloud computation using Domingo-Ferrer scheme

    Directory of Open Access Journals (Sweden)

    Abdulatif Alabdulatif

    2016-01-01

    Full Text Available Homomorphic encryption system (HES schemes are anticipated to play a significant role in cloud-based applications. Moving to cloud-based storage and analytic services securely are two of the most important advantages of HES. Several HES schemes have been recently proposed. However, the majority of them either have limited capabilities or are impractical in real-world applications. Various HES schemes provide the ability to perform computations for statistical analysis (e.g. average, mean and variance on encrypted data. Domingo-Ferrer is one scheme that has privacy homomorphism properties to perform the basic mathematical operations (addition, subtraction and multiplication in a convenient and secure way. However, it works only in the positive numbers’ range which is considered as a limitation because several applications require both positive and negative ranges in which to work, especially those that have to implement analytical services in cloud computing. In this paper, we extend Domingo-Ferrer’s scheme to be able to perform arithmetic operations for both positive and negative numbers. We also propose using a lightweight data aggregation function to compute both maximum and minimum values of the aggregated data that works for both positive and negative numbers.

  14. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  15. Time-division-multiplex control scheme for voltage multiplier rectifiers

    Directory of Open Access Journals (Sweden)

    Bin-Han Liu

    2017-03-01

    Full Text Available A voltage multiplier rectifier with a novel time-division-multiplexing (TDM control scheme for high step-up converters is proposed in this study. In the proposed TDM control scheme, two full-wave voltage doubler rectifiers can be combined to realise a voltage quadrupler rectifier. The proposed voltage quadrupler rectifier can reduce transformer turn ratio and transformer size for high step-up converters and also reduce voltage stress for the output capacitors and rectifier diodes. An N-times voltage rectifier can be straightforwardly produced by extending the concepts from the proposed TDM control scheme. A phase-shift full-bridge (PSFB converter is adopted in the primary side of the proposed voltage quadrupler rectifier to construct a PSFB quadrupler converter. Experimental results for the PSFB quadrupler converter demonstrate the performance of the proposed TDM control scheme for voltage quadrupler rectifiers. An 8-times voltage rectifier is simulated to determine the validity of extending the proposed TDM control scheme to realise an N-times voltage rectifier. Experimental and simulation results show that the proposed TDM control scheme has great potential to be used in high step-up converters.

  16. An Efficient V2I Authentication Scheme for VANETs

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  17. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  18. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  19. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  20. L’environnement naturel et le changement climatique pendant les années Bush : la pertinence d’une différenciation des échelles territoriales Climate Change and the Natural Environment in the Bush Years: The Relevance of Territorial Scale Differentiation

    Directory of Open Access Journals (Sweden)

    Cynthia Ghorra-Gobin

    2010-03-01

    Full Text Available L’attitude de l’administration fédérale au cours des huit années de l’administration Bush contraste avec celle du contexte des années 1960-1970 pour ce qui concerne la prise en compte de l’environnement naturel dans les décisions économiques. Toutefois, cet engagement limité du président Bush sur la question du changement climatique dans les débats internationaux n’a pas pour autant réduit les capacités de mobilisation des États et des villes sur ce thème.On the issue of whether climate change should be taken into account in economic decisions, the federal administration’s attitude during the Bush Presidency sharply contrasted with the attitudes of earlier administrations, particularly in the 1960’s and 1970’s. The limited concern for climate change which the federal government exhibited in the international arena did not reduce, however, the mobilization of states and local communities on this issue.