WorldWideScience

Sample records for schemes addressed include

  1. Addressing Longevity’ Heterogeneity in Pension Scheme Design

    OpenAIRE

    Ayuso, Mercedes; Bravo, Jorge Miguel; Holzmann, Robert

    2017-01-01

    Ayuso, M., Bravo, J. M., & Holzmann, R. (2017). Addressing Longevity’ Heterogeneity in Pension Scheme Design. Journal of Finance and Economics, 6(1), 1-21. DOI: 10.12735/jfe.v6n1p1 This paper demonstrates that the link between heterogeneity in longevity and lifetime income across countries is mostly high and often increasing; that it translates into an implicit tax/subsidy, with rates reaching 20 percent and higher in some countries; that such rates risk perverting redistributive objective...

  2. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  3. Addressing Stillbirth in India Must Include Men.

    Science.gov (United States)

    Roberts, Lisa; Montgomery, Susanne; Ganesh, Gayatri; Kaur, Harinder Pal; Singh, Ratan

    2017-07-01

    Millennium Development Goal 4, to reduce child mortality, can only be achieved by reducing stillbirths globally. A confluence of medical and sociocultural factors contribute to the high stillbirth rates in India. The psychosocial aftermath of stillbirth is a well-documented public health problem, though less is known of the experience for men, particularly outside of the Western context. Therefore, men's perceptions and knowledge regarding reproductive health, as well as maternal-child health are important. Key informant interviews (n = 5) were analyzed and 28 structured interviews were conducted using a survey based on qualitative themes. Qualitative themes included men's dual burden and right to medical and reproductive decision making power. Wives were discouraged from expressing grief and pushed to conceive again. If not successful, particularly if a son was not conceived, a second wife was considered a solution. Quantitative data revealed that men with a history of stillbirths had greater anxiety and depression, perceived less social support, but had more egalitarian views towards women than men without stillbirth experience. At the same time fathers of stillbirths were more likely to be emotionally or physically abusive. Predictors of mental health, attitudes towards women, and perceived support are discussed. Patriarchal societal values, son preference, deficient women's autonomy, and sex-selective abortion perpetuate the risk for future poor infant outcomes, including stillbirth, and compounds the already higher risk of stillbirth for males. Grief interventions should explore and take into account men's perceptions, attitudes, and behaviors towards reproductive decision making.

  4. Sellafield Site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. Several categories of emergencies on the Sellafield Site are mentioned; a building emergency which is confined to one building, a Site emergency standby when the effects of a building emergency go outside that building, a Site emergency alert (District Emergency Standby) when a release of activity affects Site operations and could have serious Site effects and a District Emergency Alert when a radioactivity release may interfere with the normal activity of the General Public. A Drigg Emergency Standby situation would operate similarly at the Drigg Site. The detailed arrangements and responsibilities of appointed personnel are set out in this manual. (UK)

  5. Proposed criteria for the evaluation of an address assignment scheme in Botswana

    CSIR Research Space (South Africa)

    Ditsela, J

    2011-06-01

    Full Text Available propose criteria for an address assignment scheme in Botswana: a single set of place or area names; different addresses types for urban, rural and farm areas; principles for address numbering assignment; integration of different referencing systems; and a...

  6. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  7. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yongwan Park

    2008-12-01

    Full Text Available So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  8. Addresses

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Point features representing locations of all street addresses in Orange County, NC including Chapel Hill, NC. Data maintained by Orange County, the Town of Chapel...

  9. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  10. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  11. A Reconstruction Approach to High-Order Schemes Including Discontinuous Galerkin for Diffusion

    Science.gov (United States)

    Huynh, H. T.

    2009-01-01

    We introduce a new approach to high-order accuracy for the numerical solution of diffusion problems by solving the equations in differential form using a reconstruction technique. The approach has the advantages of simplicity and economy. It results in several new high-order methods including a simplified version of discontinuous Galerkin (DG). It also leads to new definitions of common value and common gradient quantities at each interface shared by the two adjacent cells. In addition, the new approach clarifies the relations among the various choices of new and existing common quantities. Fourier stability and accuracy analyses are carried out for the resulting schemes. Extensions to the case of quadrilateral meshes are obtained via tensor products. For the two-point boundary value problem (steady state), it is shown that these schemes, which include most popular DG methods, yield exact common interface quantities as well as exact cell average solutions for nearly all cases.

  12. Has the Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh Addressed the Educational Divide in Accessing Health Care?

    Directory of Open Access Journals (Sweden)

    Mala Rao

    Full Text Available Equity of access to healthcare remains a major challenge with families continuing to face financial and non-financial barriers to services. Lack of education has been shown to be a key risk factor for 'catastrophic' health expenditure (CHE, in many countries including India. Consequently, ways to address the education divide need to be explored. We aimed to assess whether the innovative state-funded Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh state launched in 2007, has achieved equity of access to hospital inpatient care among households with varying levels of education.We used the National Sample Survey Organization 2004 survey as our baseline and the same survey design to collect post-intervention data from 8623 households in the state in 2012. Two outcomes, hospitalisation and CHE for inpatient care, were estimated using education as a measure of socio-economic status and transforming levels of education into ridit scores. We derived relative indices of inequality by regressing the outcome measures on education, transformed as a ridit score, using logistic regression models with appropriate weights and accounting for the complex survey design.Between 2004 and 2012, there was a 39% reduction in the likelihood of the most educated person being hospitalised compared to the least educated, with reductions observed in all households as well as those that had used the Aarogyasri. For CHE the inequality disappeared in 2012 in both groups. Sub-group analyses by economic status, social groups and rural-urban residence showed a decrease in relative indices of inequality in most groups. Nevertheless, inequalities in hospitalisation and CHE persisted across most groups.During the time of the Aarogyasri scheme implementation inequalities in access to hospital care were substantially reduced but not eliminated across the education divide. Universal access to education and schemes such as Aarogyasri have the synergistic potential

  13. Practical Calculational Scheme Implementing the Wilsonian RG Results for Nuclear Effective Field Theory Including Pions

    International Nuclear Information System (INIS)

    Kubo, H.; Harada, K.; Sakaeda, T.; Yamamoto, Y.

    2013-01-01

    On the basis of the Wilsonian renormalization group (WRG) analysis of nuclear effective field theory (NEFT) including pions, we propose a practical calculational scheme in which the short-distance part of one-pion exchange (S-OPE) is removed and represented as contact terms. The long-distance part of one-pion exchange (L-OPE) is treated as perturbation. The use of dimensional regularization (DR) for diagrams consisting only of contact interactions considerably simplifies the calculation of scattering amplitude and the renormalization group equations. NLO results for nucleon-nucleon elastic scattering in the S-waves are obtained and compared with experiments. A brief comment on NNLO calculations is given. (author)

  14. Towards good principles for the design of a national addressing scheme

    CSIR Research Space (South Africa)

    Coetzee, S

    2011-07-01

    Full Text Available planners, city managers, utility companies, postal operators and addressees. Some countries and international organizations have address standards and there is a process within the International Organization for Standardization (ISO) looking at bringing...

  15. A versatile lattice for a tau-charm factory that includes a monochromatization scheme

    International Nuclear Information System (INIS)

    Faus-Golfe, A.; Le Duff, J.

    1992-02-01

    A double ring system with multibunch scheme and high luminosity is discussed. An attempt for beam monochromatization at the crossing point was made by increasing the vertical bending angle, and it succeeded in providing a proper matching. The next step consisted of demonstrating that the new ring geometry that permits a monochromatization scheme could be returned and rematched to operate without monochromatization, allowing only relocation of quadrupoles and readjustment of their gradient in the sloping region. The results of this work are reported after a brief recall of the monochromatization scheme requirements. (K.A.) 10 refs., 13 figs., 2 tabs

  16. Comparison of different interpolation operators including nonlinear subdivision schemes in the simulation of particle trajectories

    International Nuclear Information System (INIS)

    Bensiali, Bouchra; Bodi, Kowsik; Ciraolo, Guido; Ghendrih, Philippe; Liandrat, Jacques

    2013-01-01

    In this work, we compare different interpolation operators in the context of particle tracking with an emphasis on situations involving velocity field with steep gradients. Since, in this case, most classical methods give rise to the Gibbs phenomenon (generation of oscillations near discontinuities), we present new methods for particle tracking based on subdivision schemes and especially on the Piecewise Parabolic Harmonic (PPH) scheme which has shown its advantage in image processing in presence of strong contrasts. First an analytic univariate case with a discontinuous velocity field is considered in order to highlight the effect of the Gibbs phenomenon on trajectory calculation. Theoretical results are provided. Then, we show, regardless of the interpolation method, the need to use a conservative approach when integrating a conservative problem with a velocity field deriving from a potential. Finally, the PPH scheme is applied in a more realistic case of a time-dependent potential encountered in the edge turbulence of magnetically confined plasmas, to compare the propagation of density structures (turbulence bursts) with the dynamics of test particles. This study highlights the difference between particle transport and density transport in turbulent fields

  17. Etude Climat no. 34 'Including international aviation in the EU ETS: a first step towards a global scheme'

    International Nuclear Information System (INIS)

    Alberola, Emilie; Solier, Boris

    2012-01-01

    Among the publications of CDC Climat Research, 'Climate Reports' offer in-depth analyses on a given subject. This issue addresses the following points: CO 2 emissions from international aviation, which accounted for 2% of global emissions in 2009, are not currently capped by any international agreement. The inclusion of the aviation sector in the European Union Emissions Trading Scheme (EU ETS) from January 1 2012 onwards represents a first step towards the implementation of emission reduction regulations based on an emissions trading scheme After the gradual extension of the scope of the EU ETS to new countries since 2005, the European Commission is now assimilating around 5,400 airlines that operate in Europe, two-thirds of which are non-European, into the EU ETS to join the energy generation and manufacturing industries. This European Union's decision assigns quantified CO 2 emission reduction targets to airlines: a 3% reduction in 2012 compared with average CO 2 emissions for the sector between 2004 and 2006, then a 5% reduction between 2013 and 2020. In the short term, the inclusion of the aviation sector in the EU ETS should have an impact on the scheme. Indeed, the aviation sector is expected to represent a new source of demand for allowances. Based on the assumption of an average 2.5% increase in annual emissions between 2012 and 2014, and then of an increase of 2% over the period between 2015 and 2020, airlines would create a shortfall of 382 MtCO 2 between 2012 and 2020. The limited use of Kyoto credits to help them comply offers a maximum import potential of almost 65 MtCO 2 between 2012 and 2020. This inclusion is a test of the EU's proactive policy, which involves encouraging other countries to define their own climate policy, without breaching international law,. The potential exemption of airline operators from emitter countries that introduce equivalent regulations would be a success for the European policy. For the time being, the reaction of some

  18. System and method for detecting components of a mixture including a valving scheme for competition assays

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Chung-Yan; Piccini, Matthew E.; Singh, Anup K.

    2017-09-19

    Examples are described including measurement systems for conducting competition assays. A first chamber of an assay device may be loaded with a sample containing a target antigen. The target antigen in the sample may be allowed to bind to antibody-coated beads in the first chamber. A control layer separating the first chamber from a second chamber may then be opened to allow a labeling agent loaded in a first portion of the second chamber to bind to any unoccupied sites on the antibodies. A centrifugal force may then be applied to transport the beads through a density media to a detection region for measurement by a detection unit.

  19. System and method for detecting components of a mixture including a valving scheme for competition assays

    Science.gov (United States)

    Koh, Chung-Yan; Piccini, Matthew E.; Singh, Anup K.

    2017-07-11

    Examples are described including measurement systems for conducting competition assays. A first chamber of an assay device may be loaded with a sample containing a target antigen. The target antigen in the sample may be allowed to bind to antibody-coated beads in the first chamber. A control layer separating the first chamber from a second chamber may then be opened to allow a labeling agent loaded in a first portion of the second chamber to bind to any unoccupied sites on the antibodies. A centrifugal force may then be applied to transport the beads through a density media to a detection region for measurement by a detection unit.

  20. Addressing healthcare needs of people living below the poverty line: a rapid assessment of the Andhra Pradesh Health Insurance Scheme.

    Science.gov (United States)

    Rao, M; Ramachandra, S S; Bandyopadhyay, S; Chandran, A; Shidhaye, R; Tamisettynarayana, S; Thippaiah, A; Sitamma, M; Sunil George, M; Singh, V; Sivasankaran, S; Bangdiwala, S I

    2011-01-01

    Families living below the poverty line in countries which do not have universal healthcare coverage are drawn into indebtedness and bankruptcy. The state of Andhra Pradesh in India established the Rajiv Aarogyasri Community Health Insurance Scheme (RACHIS) in 2007 with the aim of breaking this cycle by improving the access of below the poverty line (BPL) families to secondary and tertiary healthcare. It covered a wide range of surgical and medical treatments for serious illnesses requiring specialist healthcare resources not always available at district-level government hospitals. The impact of this scheme was evaluated by a rapid assessment, commissioned by the government of Andhra Pradesh. The aim of the assessment was to explore the contribution of the scheme to the reduction of catastrophic health expenditure among the poor and to recommend ways by which delivery of the scheme could be improved. We report the findings of this assessment. Two types of data were used for the assessment. Patient data pertaining to 89 699 treatment requests approved by the scheme during its first 18 months were examined. Second, surveys of scheme beneficiaries and providers were undertaken in 6 randomly selected districts of Andhra Pradesh. This novel scheme was beginning to reach the BPL households in the state and providing access to free secondary and tertiary healthcare to seriously ill poor people. An integrated model encompassing primary, secondary and tertiary care would be of greater benefit to families below the poverty line and more cost-effective for the government. There is considerable potential for the government to build on this successful start and to strengthen equity of access and the quality of care provided by the scheme. Copyright 2011, NMJI.

  1. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar; Rashid, Abdul B M Harun Ur; Hussain, Muhammad Mustafa

    2010-01-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  2. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar

    2010-06-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  3. Address Points, The Address Point layer contains an address point for almost every structure over 200 square feet and for some vacant properties. Attributes include addresses, sub-units, address use, LAT/LONG, 10-digit SDAT taxpins, political areas and more., Published in 2013, 1:2400 (1in=200ft) scale, Baltimore County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Address Points dataset current as of 2013. The Address Point layer contains an address point for almost every structure over 200 square feet and for some vacant...

  4. Study sponsorship and the nutrition research agenda: analysis of randomized controlled trials included in systematic reviews of nutrition interventions to address obesity.

    Science.gov (United States)

    Fabbri, Alice; Chartres, Nicholas; Scrinis, Gyorgy; Bero, Lisa A

    2017-05-01

    To categorize the research topics covered by a sample of randomized controlled trials (RCT) included in systematic reviews of nutrition interventions to address obesity; to describe their funding sources; and to explore the association between funding sources and nutrition research topics. Cross-sectional study. RCT included in Cochrane Reviews of nutrition interventions to address obesity and/or overweight. Two hundred and thirteen RCT from seventeen Cochrane Reviews were included. Funding source and authors' conflicts of interest were disclosed in 82·6 and 29·6 % of the studies, respectively. RCT were more likely to test an intervention to manipulate nutrients in the context of reduced energy intake (44·2 % of studies) than food-level (11·3 %) and dietary pattern-level (0·9 %) interventions. Most of the food industry-sponsored studies focused on interventions involving manipulations of specific nutrients (66·7 %). Only 33·1 % of the industry-funded studies addressed dietary behaviours compared with 66·9 % of the non-industry-funded ones (P=0·002). The level of food processing was poorly considered across all funding sources. The predominance of RCT examining nutrient-specific questions could limit the public health relevance of rigorous evidence available for systematic reviews and dietary guidelines.

  5. The impact of a peer counselling scheme to address bullying in an all-girl London secondary school: a short-term longitudinal study.

    Science.gov (United States)

    Houlston, Catherine; Smith, Peter K

    2009-03-01

    A variety of peer support schemes are now widely used in schools, notably to reduce bullying. However, there has been little systematic investigation of the impact and effectiveness of these approaches. To assess the impact of a peer counselling scheme on peer counsellors and the school community. The research was conducted in a North London all-girls state secondary school. Data were collected from all lower school classes (years 7, 8, and 9) and some staff members, in addition to year 10 peer counsellors and an age equivalent comparison group. A detailed 1-year longitudinal study combined qualitative and quantitative methods of assessment. Peer counsellors benefited from their involvement through an acquisition of transferable communication and interpersonal skills, and, compared to age-matched control pupils, had increased social self-esteem. There were no reductions in self-reported bullying and victimization, but in general pupils believed that there was less bullying in school and that the school was doing more about bullying, with year 7 students showing the most positive changes. Peer-counselling schemes can improve self-esteem of peer supporters, and also impact positively on perceptions of bullying in the school; but impact on actual experiences of bullying is less clear, and there may be problems with the acceptance and use of such programmes by older students.

  6. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  7. Carbon dioxide and climate. [Appendix includes names and addresses of the Principal Investigators for the research projects funded in FY1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-10-01

    Global climate change is a serious environmental concern, and the US has developed An Action Agenda'' to deal with it. At the heart of the US effort is the US Global Change Research Program (USGCRP), which has been developed by the Committee on Earth and Environmental Sciences (CEES) of the Federal Coordinating Council for Sciences, Engineering, and Technology (FCCSET). The USGCRP will provide the scientific basis for sound policy making on the climate-change issue. The DOE contribution to the USGCRP is the Carbon Dioxide Research Program, which now places particular emphasis on the rapid improvement of the capability to predict global and regional climate change. DOE's Carbon Dioxide Research Program has been addressing the carbon dioxide-climate change connection for more than twelve years and has provided a solid scientific foundation for the USGCRP. The expansion of the DOE effort reflects the increased attention that the Department has placed on the issue and is reflected in the National Energy Strategy (NES) that was released in 1991. This Program Summary describes projects funded by the Carbon Dioxide Research Program during FY 1991 and gives a brief overview of objectives, organization, and accomplishments. The Environmental Sciences Division of the Office of Health and Environmental Research, Office of Energy Research supports a Carbon Dioxide Research Program to determine the scientific linkage between the rise of greenhouse gases in the atmosphere, especially carbon dioxide, and climate and vegetation change. One facet is the Core CO{sub 2} Program, a pioneering program that DOE established more than 10 years ago to understand and predict the ways that fossil-fuel burning could affect atmospheric CO{sub 2} concentration, global climate, and the Earth's biosphere. Major research areas are: global carbon cycle; climate detection and models of climate change; vegetation research; resource analysis; and, information and integration.

  8. Convocation address.

    Science.gov (United States)

    Zakaria, R

    1996-07-01

    By means of this graduation address at the International Institute for Population Sciences (IIPS) in Bombay, the Chancellor of Urdu University voiced his concerns about overpopulation in India. During the speaker's tenure as Health Minister of Maharashtra, he implemented a sterilization incentive program that resulted in the state's having the best family planning (FP) statistics in India for almost 10 years. The incentive program, however, was misused by overenthusiastic officials in other states, with the result that the FP program was renamed the Family Welfare Programme. Population is growing in India because of improvements in health care, but the population education necessary to change fertility will require more time than the seriousness of the population problem allows. In the longterm, poverty and illiteracy must be addressed to control population. In the meanwhile, the graduate program at the IIPS should be expanded to include an undergraduate program, marriage age laws should be enforced, and misconceptions about religious objections to FP must be addressed. India can not afford to use the measures forwarded by developed countries to control population growth. India must integrate population control efforts with the provision of health care because if population continues to grow in the face of reduced infant mortality and longer life expectancy, future generations will be forced to live in a state of poverty and economic degradation.

  9. Opening address

    International Nuclear Information System (INIS)

    Boening, K.

    2003-01-01

    The program of this 9th Meeting of the International Group on Research Reactors IGORR includes are quite a number of fascinating new research reactor projects in France, Germany, Russia, Canada, China, Thailand, and in Australia. In addition to the session about New Facilities there are interesting sessions on the Upgrades and on the Optimization of Operation and Utilization of existing research reactors, on Secondary Neutron Sources, on Neutron Scattering applications, and on the aspects of Safety, Licensing and Decommissioning. Two particular projects of new research reactors are mentioned specially: the TRR-II project in Taiwan, has unfortunately been terminated last year because of a change to anti-nuclear of the ruling parties in the government - and the new FRM-II in Munich, Germany, which will hopefully survive such a political change and receive its green light for nuclear start up in the very near future. The charter of IGORR and its objectives are part of this address: The International Group on Research Reactors IGORR was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. The main IGORR objectives are to promote contacts between its members, to identify and discuss problems of common interest, to distribute newsletters about once or twice every year and to organize meetings about once every one-and-a-half years

  10. Convocation address.

    Science.gov (United States)

    Swaminathan, M S

    1998-07-01

    This address delivered to the 40th convocation of the International Institute for Population Sciences in India in 1998 opens by noting that a shortage of jobs for youth is India's most urgent problem but that the problems that attend the increasing numbers of elderly also require serious attention. The address then notes that the Earth's population is growing at an unsustainable rate while economic inequities among countries are increasing, so that, while intellectual property is becoming the most important asset in developed countries, nutritional anemia among pregnant women causes their offspring to be unable to achieve their full intellectual potential from birth. Next, the address uses a discussion of the 18th-century work on population of the Marquis de Condorcet and of Thomas Malthus to lead into a consideration of estimated increased needs of countries like India and China to import food grains in the near future. Next, the progress of demographic transition in Indian states is covered and applied to Mahbub ul Haq's measure of human deprivation developed for and applied to the region of the South Asian Association for Regional Cooperation (India, Pakistan, Bangladesh, Nepal, Sri Lanka, Bhutan, and the Maldives). The address continues by reiterating some of the major recommendations forwarded by a government of India committee charged in 1995 with drafting a national population policy. Finally, the address suggests specific actions that could be important components of the Hunger-Free India Programme and concludes that all success rests on the successful implementation of appropriate population policies.

  11. Welcome Address

    Science.gov (United States)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  12. inaugral address

    African Journals Online (AJOL)

    While political reorientation and economic redress were of immediate concern, ... South African context, where widespread changes have been proposed for education at all ... education at school and other levels and needs to be addressed so as to ..... the major national curriculum intervention in environmental education.

  13. Opening address

    International Nuclear Information System (INIS)

    Ianko, L.

    1993-01-01

    This short talk was the opening remarks to the attendees at this conference, presented by the Scientific Secretary, IWG-LMNPP, of the IAEA. This meeting is an effort to aid research on problems related to the general area of nuclear plant aging and life management. In particular it addresses fracture properties of reactor materials and components, both as installed, and at end of service condition. A major concern is relating measurements made on laboratory samples to properties displayed by actual reactor components

  14. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  15. Keynote address

    International Nuclear Information System (INIS)

    Herzog, R.

    1985-01-01

    This paper addresses various aspects of the bases underlying the nuclear third party liability regime, and also analyses the distinction between danger and risk and the manner in which damage caused by flood, mass unemployment (economic damage mainly) and certain diseases is dealt with in the absence of liability provisions similar to those applicable to nuclear incidents. It also is suggested that the State because of its duty under the Basic Law to ensure adequate energy supplies, should be co-responsible for liability questions along with the nuclear operator. (NEA) [fr

  16. Keynote address

    International Nuclear Information System (INIS)

    Farlinger, W.

    1997-01-01

    In this second keynote address of the conference Mr. Farlinger, Chairman of Ontario Hydro, attempted to respond to some of the criticisms levelled at the Corporation in the course of the Macdonald Committee process. He appeared to be particularly vexed by the criticism of IPPSO, saying that in effect, they are' beating up on their only customer', at a time when Hydro is being pulled in several different directions, and was facing pressure from jurisdictional dispute with municipal utilities, (MEUs). Nevertheless, he agreed with the need for restructuring. He defended Hydro by saying that the Macdonald Report in fact represented a vindication of the position Ontario Hydro had taken, particularly on such issues as open competition, customer choice, rationalization of the distribution system, and termination of Hydro's monopoly position. At the same time, he objected to the Report's assertion that dismantling the generation system into smaller units would be in the best interest of the people of Ontario. He suggested that there would be several large US utility companies willing and able to fill the vacuum if there was no large company with its head office in Ontario to stake its claim to the provincial market

  17. Opening Address

    Science.gov (United States)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  18. Keynote address

    International Nuclear Information System (INIS)

    Davis, J.M.

    1991-01-01

    DOE biomass R ampersand D programs have the potential to provide America with both plentiful, clean-burning domestic transportation fuels and cost-competitive industrial and utility fuels, benefiting energy security in the United States. Biofuels developed under our programs will also help improve air quality, reduce greenhouse gases, reduce the large daily quantities of waste we produce, and revitalize rural America. These research motivations have been documented in the National Energy Strategy. DOE looks forward to expanding its biofuels research program and to forging a partnership with private sector for cost-shared commercialization of new fuels and vehicle technologies. Many alternative fuels (e.g., ethanol, methanol, compressed natural gas, propane, or electricity) are candidates for gaining market share. Indeed, there may be significant regional variation in the future fuel mix. Alcohol fuels from biomass, particularly ethanol, have the potential to make a major contribution. Currently, ethanol in the United States is almost entirely made from corn; and the limitations of that process are well known (e.g., costly feedstock, end product requiring subsidy to be competitive, use of fossil fuels in renewable feedstock production and processing, and potential adverse impact of corn ethanol production on the price of food). To address these concerns, the DOE biofuels program is pursuing an ambitious research program to develop the technologies needed to convert these crops into alternative transportation fuels, primarily cellulose-based ethanol and methanol. Program R ampersand D has reduced the estimated cost per gallon of cellulose-based ethanol from $3.60 in 1980 to the current $1.35, with a program goal of $0.60 by the year 2000. DOE is also investigating the thermochemical conversion of biomass to methanol. The program goal is to achieve commercial production of methanol (like ethanol) at the gasoline equivalent of $0.90 per gallon by the year 2000. 4 figs

  19. Addressing Misconceptions

    Science.gov (United States)

    Dial, Katrina; Riddley, Diana; Williams, Kiesha; Sampson, Victor

    2009-01-01

    The law of conservation of mass can be counterintuitive for most students because they often think the mass of a substance is related to its physical state. As a result, students may hold a number of alternative conceptions related to this concept, including, for example, the believe that gas has no mass, that solids have greater mass than fluids,…

  20. Keynote address

    International Nuclear Information System (INIS)

    McClellan, S.

    1991-01-01

    Activities in Alberta relating to research on the impact of climate change on the Great Plains are reviewed. Alberta has been active in trying to understand climate, and trying to change it. These activities have included the provision of significant irrigation capabilities in southern Alberta, and many years of research into the possibility of weather modification for precipitation enhancement and hail suppression. Organizations in Alberta active in the area of climate include the Alberta Climatological Association, the Climate Advisory Committee, the Alberta Research Council, the provincial departments Alberta Environment and Alberta Forestry, Lands and Wildlife, and the Department of Agriculture. It is widely recognized that crop production on the Great Plains is dependent on water, and climate is one of the greatest sources of risk facing agriculture in Alberta

  1. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  2. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  3. Sistema de otto-codificação modificado para endereçamento de redes hidrográficas An improved stream network addressing system: the modified pfafstetter coding scheme

    Directory of Open Access Journals (Sweden)

    Natanael dos Santos Silva

    2008-10-01

    .This paper presents a new numbering system based on the Pfafstetter codification scheme developed for stream networks. Its main advantage is the use of the segments' length instead of the catchments' areas for establishing the Pfafstetter code, therefore eliminating the need for elevation data. This methodology was then implemented in a software named Otto-Sys, developed for Arc/INFO workstation in AML. In order to present the results of this new approach, a case study was carried out for the stream network of the Caeté River, a tributary of Iaco River, belonging to the Amazon River basin. The details of such a digital hydrographic dataset led to 5 level-deep codes. Each codification level is stored as a new column of the attribute table and the corresponding level dictates the number of digits of the code. Once this codification scheme has been established, network-tracing tasks can be performed in any geographic information system using only attribute queries. This strategy speeds up such processes enabling them to be extended to real-time web-based devices.

  4. Keynote address

    International Nuclear Information System (INIS)

    Bunch, R.P.A.

    1992-01-01

    Good morning ladies and gentlemen. I am truly honored to be your keynote speaker at the first International Oil Spill R ampersand D Forum. This Forum is cosponsored by the Coast Guard, on behalf of the OPA 90 Interagency Coordinating Committee on Oil Spill Research, and the International Maritime Organization. The fact that IMO is jointly sponsoring the Forum truly reflects the global nature of our concerns for the marine environment. I was asked to speak to you today because of my purview over the entire Coast Guard R ampersand D Program, a significant portion of which is oil spill related. Our environmental awareness was renewed on March 24, 1990 when the tankship Exxon Valdez ran aground on Bligh Reef in Prince William Sound, Alaska, and caused the largest vessel related oil spill in U.S. history. During the next 15 months there were three other large oil spills that threatened the U.S. shorelines. The U.S. flag tank vessel American Trader suffered a three foot diameter hole in a cargo tank near Huntington Beach California; the Mega Borg, a Norwegian flag tank vessel, exploded and caught fire off the coast of Texas in the Gulf of Mexico; and the Greek flag tanker World Prodigy ran aground in Narragensett Bay near Rhode Island. Each spill presented a unique set of challenges to our response operations. Despite intense response and cleanup actions, which included excellent international cooperation for the Exxon Valdez spill, it was apparent that existing world-wide catastrophic spill response capabilities could easily be exceeded and that there was no international mechanism which promoted and facilitated cooperations

  5. A New UK 2006 National Kidney Allocation Scheme for deceased heart-beating donor kidneys.

    Science.gov (United States)

    Johnson, Rachel J; Fuggle, Susan V; Mumford, Lisa; Bradley, J Andrew; Forsythe, John L R; Rudge, Chris J

    2010-02-27

    In 2004, it was agreed that a new allocation scheme for kidneys from deceased heart-beating donors was required in the United Kingdom to address observed inequities in access to transplant. The 2006 National Kidney Allocation Scheme (2006 NKAS) was developed to meet agreed objectives and preparatory work included a review of the criteria for human leukocyte antigen (HLA) matching and simulation evidence about the effectiveness of alternative schemes. ALGORITHM FOR 2006 NKAS: The 2006 NKAS gives absolute priority to all 000 HLA-A, -B, -DR-mismatched patients and well-matched pediatric patients (inequity of access will take a number of years to address fully.

  6. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  7. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  8. Radiation and occupational health: opening address

    International Nuclear Information System (INIS)

    Mohammad Taib Osman

    1995-01-01

    The part of address discusses the following issue: benefits of radiological protection in Malaysia, traceability and accountability as assurance of the validity of radiation measurement, Laboratory Accreditation Scheme, Atomic Energy Licensing Act

  9. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    Science.gov (United States)

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Image Coding Based on Address Vector Quantization.

    Science.gov (United States)

    Feng, Yushu

    Image coding is finding increased application in teleconferencing, archiving, and remote sensing. This thesis investigates the potential of Vector Quantization (VQ), a relatively new source coding technique, for compression of monochromatic and color images. Extensions of the Vector Quantization technique to the Address Vector Quantization method have been investigated. In Vector Quantization, the image data to be encoded are first processed to yield a set of vectors. A codeword from the codebook which best matches the input image vector is then selected. Compression is achieved by replacing the image vector with the index of the code-word which produced the best match, the index is sent to the channel. Reconstruction of the image is done by using a table lookup technique, where the label is simply used as an address for a table containing the representative vectors. A code-book of representative vectors (codewords) is generated using an iterative clustering algorithm such as K-means, or the generalized Lloyd algorithm. A review of different Vector Quantization techniques are given in chapter 1. Chapter 2 gives an overview of codebook design methods including the Kohonen neural network to design codebook. During the encoding process, the correlation of the address is considered and Address Vector Quantization is developed for color image and monochrome image coding. Address VQ which includes static and dynamic processes is introduced in chapter 3. In order to overcome the problems in Hierarchical VQ, Multi-layer Address Vector Quantization is proposed in chapter 4. This approach gives the same performance as that of the normal VQ scheme but the bit rate is about 1/2 to 1/3 as that of the normal VQ method. In chapter 5, a Dynamic Finite State VQ based on a probability transition matrix to select the best subcodebook to encode the image is developed. In chapter 6, a new adaptive vector quantization scheme, suitable for color video coding, called "A Self -Organizing

  11. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  12. Event generators for address event representation transmitters

    Science.gov (United States)

    Serrano-Gotarredona, Rafael; Serrano-Gotarredona, Teresa; Linares Barranco, Bernabe

    2005-06-01

    Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows for real-time virtual massive connectivity between huge number neurons located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate 'events' according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. In a typical AER transmitter chip, there is an array of neurons that generate events. They send events to a peripheral circuitry (let's call it "AER Generator") that transforms those events to neurons coordinates (addresses) which are put sequentially on an interchip high speed digital bus. This bus includes a parallel multi-bit address word plus a Rqst (request) and Ack (acknowledge) handshaking signals for asynchronous data exchange. There have been two main approaches published in the literature for implementing such "AER Generator" circuits. They differ on the way of handling event collisions coming from the array of neurons. One approach is based on detecting and discarding collisions, while the other incorporates arbitration for sequencing colliding events . The first approach is supposed to be simpler and faster, while the second is able to handle much higher event traffic. In this article we will concentrate on the second arbiter-based approach. Boahen has been publishing several techniques for implementing and improving the arbiter based approach. Originally, he proposed an arbitration squeme by rows, followed by a column arbitration. In this scheme, while one neuron was selected by the arbiters to transmit his event out of the chip, the rest of neurons in the array were

  13. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  14. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  15. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  16. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  17. Allegheny County Addressing Landmarks

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  18. Allegheny County Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  19. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  20. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  1. Generative Street Addresses from Satellite Imagery

    Directory of Open Access Journals (Sweden)

    İlke Demir

    2018-03-01

    Full Text Available We describe our automatic generative algorithm to create street addresses from satellite images by learning and labeling roads, regions, and address cells. Currently, 75% of the world’s roads lack adequate street addressing systems. Recent geocoding initiatives tend to convert pure latitude and longitude information into a memorable form for unknown areas. However, settlements are identified by streets, and such addressing schemes are not coherent with the road topology. Instead, we propose a generative address design that maps the globe in accordance with streets. Our algorithm starts with extracting roads from satellite imagery by utilizing deep learning. Then, it uniquely labels the regions, roads, and structures using some graph- and proximity-based algorithms. We also extend our addressing scheme to (i cover inaccessible areas following similar design principles; (ii be inclusive and flexible for changes on the ground; and (iii lead as a pioneer for a unified street-based global geodatabase. We present our results on an example of a developed city and multiple undeveloped cities. We also compare productivity on the basis of current ad hoc and new complete addresses. We conclude by contrasting our generative addresses to current industrial and open solutions.

  2. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  3. License Address List

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Address list generated from National Saltwater Angler Registry. Used in conjunction with an address-based sample as per survey design.

  4. Reach Address Database (RAD)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Reach Address Database (RAD) stores the reach address of each Water Program feature that has been linked to the underlying surface water features (streams,...

  5. Developing and modifying behavioral coding schemes in pediatric psychology: a practical guide.

    Science.gov (United States)

    Chorney, Jill MacLaren; McMurtry, C Meghan; Chambers, Christine T; Bakeman, Roger

    2015-01-01

    To provide a concise and practical guide to the development, modification, and use of behavioral coding schemes for observational data in pediatric psychology. This article provides a review of relevant literature and experience in developing and refining behavioral coding schemes. A step-by-step guide to developing and/or modifying behavioral coding schemes is provided. Major steps include refining a research question, developing or refining the coding manual, piloting and refining the coding manual, and implementing the coding scheme. Major tasks within each step are discussed, and pediatric psychology examples are provided throughout. Behavioral coding can be a complex and time-intensive process, but the approach is invaluable in allowing researchers to address clinically relevant research questions in ways that would not otherwise be possible. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  7. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  8. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  9. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  10. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  11. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  12. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  13. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  14. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  15. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  16. Addressing Ozone Layer Depletion

    Science.gov (United States)

    Access information on EPA's efforts to address ozone layer depletion through regulations, collaborations with stakeholders, international treaties, partnerships with the private sector, and enforcement actions under Title VI of the Clean Air Act.

  17. The Australian Managed Entry Scheme: Are We Getting it Right?

    Science.gov (United States)

    Tuffaha, Haitham W; Scuffham, Paul A

    2018-05-01

    In 2010, the Australian Government introduced the managed entry scheme (MES) to improve patient access to subsidised drugs on the Pharmaceutical Benefits Scheme and enhance the quality of evidence provided to decision makers. The aim of this paper was to critically review the Australian MES experience. We performed a comprehensive review of publicly available Pharmaceutical Benefits Advisory Committee online documents from January 2010 to July 2017. Relevant information on each MES agreement was systematically extracted, including its rationale, the conditions that guided its implementation and its policy outcomes. We identified 11 drugs where an MES was considered. Most of the identified drugs (75%) were antineoplastic agents and the main uncertainty was the overall survival benefit. More than half of the MES proposals were made by sponsors and most of the schemes were considered after previous rejected/deferred submissions for reimbursement. An MES was not established in 8 of 11 drugs (73%) despite the high evidence uncertainty. Nevertheless, six of these eight drugs were listed after the sponsors reduced their prices. Three MESs were established and implemented by Deeds of Agreement. The three cases were concluded and the required data were submitted within the agreed time frames. The need for feasibility and value of an MES should be carefully considered by stakeholders before embarking on such an agreement. It is essential to engage major stakeholders, including patient representatives, in this process. The conditions governing MESs should be clear, transparent and balanced to address the expectations of various stakeholders.

  18. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  19. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. Addressing the nuclear misconception

    International Nuclear Information System (INIS)

    Taylor, J.J.

    1998-01-01

    There is a perception, fostered and encouraged by the anti-nuclear groups, that the nuclear industry generates large quantities of waste with no idea how to deal with it, that it is unsafe, uneconomic, and environmentally damaging. The task is to change these perceptions, by demonstrating that the industry is not a problem in itself, but in fact provides solutions to problems. This paper, while primarily concerned with waste, addresses all of these issues as each has a bearing on the perception of the industry and therefore must be considered when addressing the issue of waste. The paper concludes that evidence exists to support the industry view, but that the mission of the industry should be to change the perception of the industry, by influencing and working together with its stake holders to address their concerns, rather than merely presenting more and more facts. (author)

  1. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  2. Addressing Sexual Harassment

    Science.gov (United States)

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  3. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  4. R and D on co-working transport schemes in Geant4

    Energy Technology Data Exchange (ETDEWEB)

    Pia, M G; Saracco, P; Sudhakar, M [INFN Sezione di Genova, Via Dodecaneso 33, 16146 Genova (Italy); Zoglauer, A [University of California at Berkeley, Berkeley, CA 94720-7450 (United States); Augelli, M [CNES, 18 Av. Edouard Belin, 31401 Toulouse (France); Gargioni, E [University Medical Center Hamburg-Eppendorf, D-20246 Hamburg (Germany); Kim, C H [Hanyang University, 17 Haengdang-dong, Seongdong-gu, Seoul, 133-791 (Korea, Republic of); Quintieri, L [INFN Laboratori Nazionali di Frascati, Via Enrico Fermi 40, I-00044 Frascati (Italy); Filho, P P de Queiroz; Santos, D de Souza [IRD, Av. Salvador Allende, s/n. 22780-160, Rio de Janeiro, RJ (Brazil); Weidenspointner, G [MPI Halbleiterlabor, Otto-Hahn-Ring 6, D-81739 Muenchen (Germany); Begalli, M, E-mail: mariagrazia.pia@ge.infn.i [UERJ, R. Sao Francisco Xavier, 524. 20550-013, Rio de Janeiro, RJ (Brazil)

    2010-04-01

    A research and development (R and D) project related to the extension of the Geant4 toolkit has been recently launched to address fundamental methods in radiation transport simulation. The project focuses on simulation at different scales in the same experimental environment; this problem requires new methods across the current boundaries of condensed-random-walk and discrete transport schemes. The new developments have been motivated by experimental requirements in various domains, including nanodosimetry, astronomy and detector developments for high energy physics applications.

  5. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  6. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  7. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  8. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  9. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  10. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  11. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  12. Border carbon adjustments: Addressing emissions embodied in trade

    International Nuclear Information System (INIS)

    Sakai, Marco; Barrett, John

    2016-01-01

    Approximately one fourth of global emissions are embodied in international trade and a significant portion flows from non-carbon-priced to carbon-priced economies. Border carbon adjustments (BCAs) figure prominently as instruments to address concerns arising from unilateral climate policy. Estimating the volume of emissions that could be potentially taxed under a BCA scheme has received little attention until now. This paper examines how a number of issues involved in the implementation of BCAs can affect their ability to cover emissions embodied in trade and thus address carbon leakage. These issues range from ensuring compliance with trade provisions and assumptions on the carbon intensity of imports, to determining which countries are included and whether intermediate and final demand are considered. Here we show that the volume of CO_2 captured by a scheme that involved all Annex B countries could be significantly reduced due to these issues, particularly by trade provisions, such as the principle of ‘best available technology’ (BAT). As a consequence, the tariff burdens faced by non-Annex B parties could dwindle considerably. These findings have important policy implications, as they question the effectiveness and practicalities of BCAs to reduce carbon leakage and alleviate competitiveness concerns, adding further arguments against their implementation. - Highlights: •We estimate the volume of emissions that could be potentially taxed by BCAs. •We study the effects of trade provisions and country and sectoral coverage on BCAs. •Trade provisions can significantly reduce the scope and effectiveness of BCAs. •Best available technology and exclusion of electricity reduce tariffs considerably. •BCAs are not optimal policy tools to address carbon leakage concerns.

  13. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    scheme is a model of a decentralised entity whose importance lies at improving food security and employment creation within the community, it falls short in representing a downwardly accountable decentralised irrigation scheme. The scheme is faced with various challenges which include its operation which is below capacity utilisation, absence of specialised technical human personnel to address infrastructural breakdowns, uneven distribution of water pressure, incapacitated Irrigation Management Committee (IMC), absence of a locally legitimate constitution, compromised beneficiary participation and unclear lines of communication between various institutions involved in water management. Understanding decentralization is important since one of the key tenets of IWRM is stakeholder participation which the decentralization framework interrogates.

  14. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  15. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  16. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  17. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  18. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  19. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Document Server

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  20. South African address standard and initiatives towards an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-10-01

    Full Text Available ; visiting friends; and providing a reference context for presenting other information. The benefits of an international address standards include: enabling address interoperability across boundaries; reducing service delivery costs; enabling development...

  1. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  2. 75 FR 41790 - Address Management Services-Elimination of the Manual Card Option for Address Sequencing Services

    Science.gov (United States)

    2010-07-19

    .... The authority citation for 39 CFR Part 111 continues to read as follows: Authority: 5 U.S.C. 552(a... addresses (including rural address conversions to city-style addressing). For each 5-digit ZIP Code grouping... customer includes a rural-style address (RR/box number) in an address file submitted for sequencing, and a...

  3. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  4. Bayesian calibration of coarse-grained forces: Efficiently addressing transferability

    International Nuclear Information System (INIS)

    Patrone, Paul N.; Rosch, Thomas W.; Phelan, Frederick R.

    2016-01-01

    Generating and calibrating forces that are transferable across a range of state-points remains a challenging task in coarse-grained (CG) molecular dynamics. In this work, we present a coarse-graining workflow, inspired by ideas from uncertainty quantification and numerical analysis, to address this problem. The key idea behind our approach is to introduce a Bayesian correction algorithm that uses functional derivatives of CG simulations to rapidly and inexpensively recalibrate initial estimates f 0 of forces anchored by standard methods such as force-matching. Taking density-temperature relationships as a running example, we demonstrate that this algorithm, in concert with various interpolation schemes, can be used to efficiently compute physically reasonable force curves on a fine grid of state-points. Importantly, we show that our workflow is robust to several choices available to the modeler, including the interpolation schemes and tools used to construct f 0 . In a related vein, we also demonstrate that our approach can speed up coarse-graining by reducing the number of atomistic simulations needed as inputs to standard methods for generating CG forces.

  5. Bayesian calibration of coarse-grained forces: Efficiently addressing transferability

    Science.gov (United States)

    Patrone, Paul N.; Rosch, Thomas W.; Phelan, Frederick R.

    2016-04-01

    Generating and calibrating forces that are transferable across a range of state-points remains a challenging task in coarse-grained (CG) molecular dynamics. In this work, we present a coarse-graining workflow, inspired by ideas from uncertainty quantification and numerical analysis, to address this problem. The key idea behind our approach is to introduce a Bayesian correction algorithm that uses functional derivatives of CG simulations to rapidly and inexpensively recalibrate initial estimates f0 of forces anchored by standard methods such as force-matching. Taking density-temperature relationships as a running example, we demonstrate that this algorithm, in concert with various interpolation schemes, can be used to efficiently compute physically reasonable force curves on a fine grid of state-points. Importantly, we show that our workflow is robust to several choices available to the modeler, including the interpolation schemes and tools used to construct f0. In a related vein, we also demonstrate that our approach can speed up coarse-graining by reducing the number of atomistic simulations needed as inputs to standard methods for generating CG forces.

  6. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  7. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    Science.gov (United States)

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  8. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  9. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  10. Reading handprinted addresses on IRS tax forms

    Science.gov (United States)

    Ramanaprasad, Vemulapati; Shin, Yong-Chul; Srihari, Sargur N.

    1996-03-01

    The hand-printed address recognition system described in this paper is a part of the Name and Address Block Reader (NABR) system developed by the Center of Excellence for Document Analysis and Recognition (CEDAR). NABR is currently being used by the IRS to read address blocks (hand-print as well as machine-print) on fifteen different tax forms. Although machine- print address reading was relatively straightforward, hand-print address recognition has posed some special challenges due to demands on processing speed (with an expected throughput of 8450 forms/hour) and recognition accuracy. We discuss various subsystems involved in hand- printed address recognition, including word segmentation, word recognition, digit segmentation, and digit recognition. We also describe control strategies used to make effective use of these subsystems to maximize recognition accuracy. We present system performance on 931 address blocks in recognizing various fields, such as city, state, ZIP Code, street number and name, and personal names.

  11. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  12. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  13. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  14. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  15. Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows.

    Science.gov (United States)

    Li, Q; Luo, K H; Li, X J

    2012-07-01

    The pseudopotential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudoepotential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudopotential LB model. First, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme [Shan and Chen, Phys. Rev. E 47, 1815 (1993)] and the exact-difference-method forcing scheme [Kupershtokh et al., Comput. Math. Appl. 58, 965 (2009)]. The nature of these two schemes and their recovered macroscopic equations will be shown. Second, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudopotential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach to achieving thermodynamic consistency in the pseudopotential LB model.

  16. Counting addressing method: Command addressable element and extinguishing module

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2009-01-01

    Full Text Available The specific requirements that appear in addressable fire detection and alarm systems and the shortcomings of the existing addressing methods were discussed. A new method of addressing of detectors was proposed. The basic principles of addressing and responding of a called element are stated. Extinguishing module is specific subsystem in classic fire detection and alarm systems. Appearing of addressable fire detection and alarm systems didn't caused essential change in the concept of extinguishing module because of long calling period of such systems. Addressable fire security system based on counting addressing method reaches high calling rates and enables integrating of the extinguishing module in addressable system. Solutions for command addressable element and integrated extinguishing module are given in this paper. The counting addressing method was developed for specific requirements in fire detection and alarm systems, yet its speed and reliability justifies its use in the acquisition of data on slowly variable parameters under industrial conditions. .

  17. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  18. Improvement Schemes for Indoor Mobile Location Estimation: A Survey

    Directory of Open Access Journals (Sweden)

    Jianga Shang

    2015-01-01

    Full Text Available Location estimation is significant in mobile and ubiquitous computing systems. The complexity and smaller scale of the indoor environment impose a great impact on location estimation. The key of location estimation lies in the representation and fusion of uncertain information from multiple sources. The improvement of location estimation is a complicated and comprehensive issue. A lot of research has been done to address this issue. However, existing research typically focuses on certain aspects of the problem and specific methods. This paper reviews mainstream schemes on improving indoor location estimation from multiple levels and perspectives by combining existing works and our own working experiences. Initially, we analyze the error sources of common indoor localization techniques and provide a multilayered conceptual framework of improvement schemes for location estimation. This is followed by a discussion of probabilistic methods for location estimation, including Bayes filters, Kalman filters, extended Kalman filters, sigma-point Kalman filters, particle filters, and hidden Markov models. Then, we investigate the hybrid localization methods, including multimodal fingerprinting, triangulation fusing multiple measurements, combination of wireless positioning with pedestrian dead reckoning (PDR, and cooperative localization. Next, we focus on the location determination approaches that fuse spatial contexts, namely, map matching, landmark fusion, and spatial model-aided methods. Finally, we present the directions for future research.

  19. An Efficient V2I Authentication Scheme for VANETs

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  20. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  1. Addressing the labour shortage

    Energy Technology Data Exchange (ETDEWEB)

    Riemer, J. [Alberta Economic Development, Edmonton, AB (Canada)

    2005-07-01

    Labour shortages are an increasing concern for companies in Alberta, where the economy is booming. This presentation provided statistics on labour shortages and Alberta's labour force. Between 1995 and 2004, employment in Alberta increased by more than 433,000 jobs, and is predicted to grow, but the natural population increase in the province is only 19,600 per year. It is expected that by 2010, immigrants will account for all growth in Canada's labour force. By 2020, an additional $100 billion of capital will be invested in Alberta, which is competing for labour with every other industrialized economy in the world. This presentation included a series of graphs and charts depicting Canada's national unemployment rate by province; Alberta's unemployment rate; oil sands capital expenditure; regional workforce requirements; and new jobs in the oil sands industry from 1998 to 2010. Employment requirements by trade were also highlighted along with projected labour shortages in 16 different trades. The author recommended that better long-term labour supply and demand models are needed along with rationalization and streamlining of credentials systems. Other solutions to labour shortages may include the removal of barriers to interprovincial and foreign workers; education and training; enhanced productivity; industry collaboration; and maximization of the labour pool to include women and Aboriginal workers. tabs., figs.

  2. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  3. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  4. The complete flux scheme in cylindrical coordinates

    NARCIS (Netherlands)

    Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.

    2014-01-01

    We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection

  5. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  6. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  7. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  8. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  9. Forms of address in Isizulu

    OpenAIRE

    2014-01-01

    M.A. (African Studies) The study deals with forms of address in isiZulu. Therefore, the various aspects of speech that play roles when addressing a person, the factors affecting forms of address in isiZulu and the effect of languages such as English, Afrikaans and other African languages on the forms of address in isiZulu are of interest. Research was conducted on forms of address in isiZulu in parts of Soweto and it was discovered that form of address are determined by different factors i...

  10. Light addressable gold electrodes

    Energy Technology Data Exchange (ETDEWEB)

    Khalid, Waqas

    2011-07-01

    The main objective carried out in this dissertation was to fabricate Light Amplified Potentiometric sensors (LAPS) based upon the semiconductor nanoparticles (quantum dots) instead of its bulk form. Quantum dots (QDs) were opted for this device fabrication because of their superior fluorescent, electric and catalytic properties. Also in comparison to their bulk counterparts they will make device small, light weighted and power consumption is much lower. QDs were immobilized on a Au substrate via 1,4 benzene dithiol (BDT) molecule. Initially a self-assembled monolayer (SAM) of BDT was established on Au substrate. Because of SAM, the conductivity of Au substrate decreased dramatically. Furthermore QDs were anchored with the help of BDT molecule on Au substrate. When QDs immobilized on Au substrate (QD/Au) via BDT molecule were irradiated with UV-visible light, electron-hole pairs were generated in QDs. The surface defect states in QDs trapped the excited electrons and long lived electron-hole pairs were formed. By the application of an appropriate bias potential on Au substrate the electrons could be supplied or extracted from the QDs via tunneling through BDT. Thus a cathodic or anodic current could be observed depending upon bias potential under illumination. However without light illumination the QD/Au electrode remained an insulator. To improve the device different modifications were made, including different substrates (Au evaporated on glass, Au evaporated on mica sheets and Au sputtered on SiO{sub 2}/Si) and different dithiol molecules (capped and uncapped biphenyl 4,4' dithiol and capped and uncapped 4,4' dimercaptostilbenes) were tried. Also different QD immobilization techniques (normal incubation, spin coating, layer by layer assembly (LbL) of polyelectrolytes and heat immobilization) were employed. This device was able to detect electrochemically different analytes depending upon the QDs incorporated. For example CdS QDs were able to detect 4

  11. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  12. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  13. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  14. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of coverage of the scheme among the formal sector workers in Nigeria as a proxy to gauge the extent of coverage of the scheme and derive suitable lessons that could be used in its expansion.

  15. Smallholder irrigation schemes in South Africa: A review of ...

    African Journals Online (AJOL)

    The status and characteristics of the 302 smallholder irrigation schemes found in South Africa are discussed and knowledge on South African smallholder irrigation schemes generated by the Water Research Commission (WRC) over a period of nearly 20 years is reviewed. Themes covered include planning, design and ...

  16. Pension scheme in Austria

    Directory of Open Access Journals (Sweden)

    Greta Alikaj

    2015-07-01

    Full Text Available Driven by unfavorable demographic developments and unsustainable, outdated or fragmented systems, pension reform has been at the top of political agendas across the globe for many years now (Prinz, Stanovnik & Stropnik, 2000. Over the last two decades, almost all western European countries have been trimming their public pension systems in an effort to strengthen pension sustainability. One main target of reform was to increase the retirement age. Other measures (e.g. changing the pension calculation, broadening the assessment base, changing the adjustment mechanism were designed to lower replacement rates. The reform process in the wide range of countries addressed by this survey differs considerably from country to country. This is why Allianz first introduced the Pension Sustainability Index (PSI, which combines the various characteristics of pension systems with the factors that influence them to help track and evaluate policy changes made in different countries around the world. In addressing the sustainability of a country’s public pension system, the PSI can give an indication of a country’s need for reforms to maintain long-term financial sustainability. This can be difficult to assess given the many country-specific institutional, technical and legal parameters. The PSI is able to evaluate the long-term sustainability of national pension systems and thus the pressure on governments to reform these (International pension Papers, 1.2014. The speed of reform, however, differs between countries. Those which recently introduced major reforms were able to improve in the PSI ranking because of active steps taken, while others were lost in comparison due to their passive policymaking.

  17. Business and Commerce, We maintain a "Common Place" point layer which includes business names and locations across the county. This data layer is tied to our address points., Published in 2013, 1:1200 (1in=100ft) scale, Brown County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Business and Commerce dataset current as of 2013. We maintain a "Common Place" point layer which includes business names and locations across the county. This data...

  18. Schools K-12, School locations within Sedgwick County. This layer is maintained interactively by GIS staff. Primary attributes include school name, class, funding source, address, and parachial status. Published to scschoop.shp., Published in 2008, 1:1200 (1in=100ft) scale, Sedgwick County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Schools K-12 dataset current as of 2008. School locations within Sedgwick County. This layer is maintained interactively by GIS staff. Primary attributes include...

  19. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  20. Structural and parameteric uncertainty quantification in cloud microphysics parameterization schemes

    Science.gov (United States)

    van Lier-Walqui, M.; Morrison, H.; Kumjian, M. R.; Prat, O. P.; Martinkus, C.

    2017-12-01

    Atmospheric model parameterization schemes employ approximations to represent the effects of unresolved processes. These approximations are a source of error in forecasts, caused in part by considerable uncertainty about the optimal value of parameters within each scheme -- parameteric uncertainty. Furthermore, there is uncertainty regarding the best choice of the overarching structure of the parameterization scheme -- structrual uncertainty. Parameter estimation can constrain the first, but may struggle with the second because structural choices are typically discrete. We address this problem in the context of cloud microphysics parameterization schemes by creating a flexible framework wherein structural and parametric uncertainties can be simultaneously constrained. Our scheme makes no assuptions about drop size distribution shape or the functional form of parametrized process rate terms. Instead, these uncertainties are constrained by observations using a Markov Chain Monte Carlo sampler within a Bayesian inference framework. Our scheme, the Bayesian Observationally-constrained Statistical-physical Scheme (BOSS), has flexibility to predict various sets of prognostic drop size distribution moments as well as varying complexity of process rate formulations. We compare idealized probabilistic forecasts from versions of BOSS with varying levels of structural complexity. This work has applications in ensemble forecasts with model physics uncertainty, data assimilation, and cloud microphysics process studies.

  1. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  2. Linking project-based mechanisms with domestic greenhouse gas emissions trading schemes

    International Nuclear Information System (INIS)

    Bygrave, S.; Bosi, M.

    2004-01-01

    Although there are a number of possible links between emission trading and project-based mechanisms, the focus of this paper is on linking domestic GHG emission trading schemes with: (1) domestic; and, (2) international (JI and CDM) GHG reduction project activities. The objective is to examine some of the challenges in linking DETs and project-based mechanisms, as well as some possible solutions to address these challenges. The link between JI / CDM and intergovernmental international emissions trading (i.e. Article 17 of the Kyoto Protocol) is defined by the Kyoto Protocol, and therefore is not covered in this paper. The paper is written in the context of: (a) countries adhering to the Kyoto Protocol and elaborating their strategies to meet their GHG emission commitments, including through the use of the emissions trading and project-based mechanisms. For example, the European Union (EU) will be commencing a GHG Emissions Trading Scheme in January 2005, and recently, the Council of ministers and the European Parliament agreed on a text for an EU Linking Directive allowing the use of JI and CDM emission units in the EU Emission Trading Scheme (EU-ETS); and (b) all countries (and/or regions within countries) with GHG emission obligations that may choose to use domestic emissions trading and project-based mechanisms to meet their GHG commitments. The paper includes the following elements: (1) an overview of the different flexibility mechanisms (i.e. GHG emissions trading and PBMs), including a brief description and comparisons between the mechanisms (Section 3); (2) an exploration of the issues that emerge when project-based mechanisms link with domestic emissions trading schemes, as well as possible solutions to address some of the challenges raised (Section 4); (3) a case study examining the EU-ETS and the EU Linking Directive on project-based mechanisms, in particular on how the EU is addressing in a practical context relevant linking issues (Section 5); (4) a

  3. Advanced Entry Adult Apprenticeship Training Scheme: A Case Study

    Science.gov (United States)

    Sparks, Alan; Ingram, Hadyn; Phillips, Sunny

    2009-01-01

    Purpose: The purpose of this paper is to evaluate an innovative way to train adult apprentices for the construction industry. Design/methodology/approach: The paper emphasizes that, in order to address skills shortages for international construction, training methods must be improved. It looks at the example of an adult apprenticeship scheme in…

  4. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  5. Port virtual addressing for PC

    International Nuclear Information System (INIS)

    Bolanos, L.; Arista, E.; Osorio Deliz, J.F.

    1997-01-01

    Instruments for nuclear signal measurements based on add-on card for a personal computer (PC) are designed often. Then one faces the problem of the addressing of data input/output devices which show an integration level or intelligence that makes the use of several port address indispensable, and these are limited in the PC. The virtual addressing offers the advantage of the occupation of few addresses to accede to many of these devices. The principles of this technique and the appliances of a solution in radiometric in a radiometric card based on programmed logic are discussed in this paper

  6. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    terms of accuracy and stability, has the advantage to cope with dry zones. The two methods are first validated on academical test cases with analytical solution in order to assess the order of the schemes. Then more complex cases are addressed to test the robustness of the schemes and their performance under different flow conditions. Finally a real test case for which real data are available is carried out. An extension of the predictor-corrector residual distribution schemes to the 3D case is presented as final contribution. Even in this case the RD technique is completely compatible with the finite element framework used for the Navier-Stokes equations, thus its extension to the 3D case does not present any extra theoretical problem. The method is tested on preliminary cases. (author)

  7. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  8. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  9. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  10. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  11. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir; Alouini, Mohamed-Slim; Bhargava, Vijay K.

    2010-01-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second

  12. A Scheme of Controlled Quantum State Swapping

    International Nuclear Information System (INIS)

    Zha Xinwei; Zou Zhichun; Qi Jianxia; Song Haiyang

    2012-01-01

    A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.

  13. Electricity storage using a thermal storage scheme

    Energy Technology Data Exchange (ETDEWEB)

    White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  14. World Federation of Vascular Societies: presidential address

    DEFF Research Database (Denmark)

    Sillesen, Henrik Hegaard

    2010-01-01

    The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally imp...... throughout the world. In addition, for introduction of new treatments, training issues and dissemination of science a global organisation like the WFVS is needed.......The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally...

  15. 'Students-as-partners' scheme enhances postgraduate students' employability skills while addressing gaps in bioinformatics education.

    Science.gov (United States)

    Mello, Luciane V; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student-staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators' teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability.

  16. Secure Metering Schemes

    Science.gov (United States)

    Blundo, Carlo; Cimato, Stelvio; Masucci, Barbara

    The current trend on the Internet suggests that the majority of revenues of web sites come from the advertising potential of the World Wide Web. Advertising is arguably the type of commercial information exchange of the greatest economic importance in the real world. Indeed, advertising is what funds most other forms of information exchange, including radio stations, television stations, cable networks, magazines, and newspapers. According to the figures provided by the Internet Advertising Bureau [24] and Price Waterhouse Coopers [43], advertising revenue results for the first 9 months of 2004 totaled slightly over 7.0 billion dollars.

  17. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    Science.gov (United States)

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  18. The EU Emissions Trading Scheme and Biomass. Final Report

    International Nuclear Information System (INIS)

    Schwaiger, H.; Tuerk, A.; Arasto, A.; Vehlow, J.; Kautto, N.; Sijm, J.; Hunder, M.; Brammer, J.

    2009-02-01

    Within its Energy and Climate Package, adopted by the European Parliament in December 2008, the European commission set a 10% minimum for the market share of renewables in the transport sector in 2020. To find the appropriate instruments to reach this target and the instrument mix with which biomass use in general could be best stimulated are the main questions of this project. An important instrument of the European Climate Policy is the European Emissions Trading Scheme (EU-ETS), which started operation in 2005. Previous work done within Bioenergy NoE showed that only a high share of auctioning of allowances and a high CO2 price provide necessary incentives for a higher biomass use. According to the Energy and Climate Package, all allowances will be auctioned in the energy sector from 2013 on, with exceptions for a few CEE countries. Based on work done within the project, a model has been developed to analyse at which CO2 price biomass becomes competitive in case of 100 per cent auctioning or at a lower level. The European Commission furthermore decided not to include the road transport sector into the EU-ETS until 2020. Whether the inclusion of the road transport sector in the EU-ETS, could help introducing biofuels, a separate trading scheme for biofuels should be set up, or biofuels should be addressed with other policy instruments, was another main question of this project. The first result shows that an integrated scheme would hardly have any effects on the use of liquid biofuels in the transportation sector, but might cause higher CO2 prices for the energy and industry sector. A separate trading scheme has been implemented in the UK in 2008, California is planning such as scheme in addition to include the road transport sector into the future ETS. Within this project the design of such as system has been elaborated based on the comparison of several policy instruments to increase the use of liquid biofuels in the transportation sector. Policy interaction

  19. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  20. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    Full Text Available Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  1. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  2. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  3. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  4. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  5. CERN Health Insurance Scheme

    CERN Multimedia

    HR Department

    2011-01-01

    Changes implemented on 1 January 2011 In addition to the information provided in the Official News section of the Bulletin concerning the CHIS, the following changes are in place since 1 January 2011. Benefits The list of benefits including the ceilings will remain initially unchanged while the CHIS Board prepares proposals to the Director-General, who has been authorized by the Council to take timely measures to limit the increase of the CHIS expenses, by encouraging the use of health care providers and treatments which provide the best quality-to-cost ratio. Termination of the agreement with “La Metairie” Attempts to find an agreement with the management of “La Metairie” on the conditions to continue to collaborate failed. The present agreement that CHIS, as well as the other international organisations (WHO, ILO/ITU, UNOG) had signed, therefore came to an end on 31 December 2010. As a result, the rules applicable to hospitals without an agreement will apply to &...

  6. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  7. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  8. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  9. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  10. A Hidden Crisis: Including the LGBT Community When Addressing Sexual Violence on College Campuses

    Science.gov (United States)

    Pérez, Zenen Jaimes; Hussey, Hannah

    2014-01-01

    Recently, sexual assault on college campuses has received increased national attention. In its first report, the White House Task Force to Protect Students from Sexual Assault highlighted steps colleges and universities can take to curb the number of sexual assaults on campuses. For the first time, the U.S. Department of Education has released the…

  11. Addressing techniques of liquid crystal displays

    CERN Document Server

    Ruckmongathan, Temkar N

    2014-01-01

    Unique reference source that can be used from the beginning to end of a design project to aid choosing an appropriate LCD addressing technique for a given application This book will be aimed at design engineers who are likely to embed LCD drivers and controllers in many systems including systems on chip. Such designers face the challenge of making the right choice of an addressing technique that will serve them with best performance at minimal cost and complexity. Readers will be able to learn about various methods available for driving matrix LCDs and the comparisons at the end of each chap

  12. Performance comparison of binary modulation schemes for visible light communication

    KAUST Repository

    Park, Kihong

    2015-09-11

    In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.

  13. AUS - the Australian modular scheme for reactor neutronics computations

    International Nuclear Information System (INIS)

    Robinson, G.S.

    1975-12-01

    A general description is given of the AUS modular scheme for reactor neutronics calculations. The scheme currently includes modules which provide the capacity for lattice calculations, 1D transport calculations, 1 and 2D diffusion calculations (with feedback-free kinetics), and burnup calculations. Details are provided of all system aspects of AUS, but individual modules are only outlined. A complete specification is given of that part of user input which controls the calculation sequence. The report also provides sufficient details of the supervisor program and of the interface data sets to enable additional modules to be incorporated in the scheme. (author)

  14. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    Science.gov (United States)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  15. Addressing problems of employee performance.

    Science.gov (United States)

    McConnell, Charles R

    2011-01-01

    Employee performance problems are essentially of 2 kinds: those that are motivational in origin and those resulting from skill deficiencies. Both kinds of problems are the province of the department manager. Performance problems differ from problems of conduct in that traditional disciplinary processes ordinarily do not apply. Rather, performance problems are addressed through educational and remedial processes. The manager has a basic responsibility in ensuring that everything reasonable is done to help each employee succeed. There are a number of steps the manager can take to address employee performance problems.

  16. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  17. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  18. Complete snake and rotator schemes for spin polarization in proton rings and large electron rings

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-11-01

    In order to maintain spin polarization in proton rings and large electron rings, some generalized Siberian Snake scheme may be required to make the spin tune almost independent of energy and thus avoid depolarizing resonances. The practical problem of finding such schemes that, at reasonable technical effort, can be made to work over large energy ranges has been addressed before and is here revisited in a broadened view and with added new suggestions. As a result, possibly optimum schemes for electron rings (LEP) and proton rings are described. In the proposed LEP scheme, spin rotation is devised such that, at the interaction points, the spin direction is longitudinal as required for experiments. (orig.)

  19. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  20. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  1. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  2. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  3. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  4. Factors affecting sustainability of rural water schemes in Swaziland

    Science.gov (United States)

    Peter, Graciana; Nkambule, Sizwe E.

    maintenance; existence of fund for operation and maintenance; willingness to contribute money; existence of a user’s committee; participation in the initial planning and design of the water scheme; and coordination between the local leaders and user’s committee. The main factors which made the schemes unsustainable were: long fetching time; non-involvement in decision making; lack of willingness to contribute funds; absence of users committee; and lack of cooperation between local leaders and the users committee. Water service providers should address the technical, social, financial and institutional factors identified affecting sustainability in their planning and implementation of rural water schemes.

  5. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  6. Zone memories and pseudorandom addressing

    International Nuclear Information System (INIS)

    Marino, D.; Mirizzi, N.; Stella, R.; Visaggio, G.

    1975-01-01

    A quantitative comparison between zone memories, pseudorandom addressed memories and an alternative special purpose memory (spread zone memory) in which the distance between any two transformed descriptors, at first adjacent, is independent of the descriptors pair and results the maximum one is presented. This memory has not been particularly considered at present in spite of its efficiency and its simple implementation

  7. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  8. The Design and Analysis of Split Row-Column Addressing Array for 2-D Transducer

    Directory of Open Access Journals (Sweden)

    Xu Li

    2016-09-01

    Full Text Available For 3-D ultrasound imaging, the row-column addressing (RCA with 2N connections for an N × N 2-D array makes the fabrication and interconnection simpler than the fully addressing with N2 connections. However, RCA degrades the image quality because of defocusing in signal channel direction in the transmit event. To solve this problem, a split row-column addressing scheme (SRCA is proposed in this paper. Rather than connecting all the elements in the signal channel direction together, this scheme divides the elements in the signal channel direction into several disconnected blocks, thus enables focusing beam access in both signal channel and switch channel directions. Selecting an appropriate split scheme is the key for SRCA to maintaining a reasonable tradeoff between the image quality and the number of connections. Various split schemes for a 32 × 32 array are fully investigated with point spread function (PSF analysis and imaging simulation. The result shows the split scheme with five blocks (4, 6, 12, 6, and 4 elements of each block can provide similar image quality to fully addressing. The splitting schemes for different array sizes from 16 × 16 to 96 × 96 are also discussed.

  9. The Belgian deposit guarantee scheme in a European perspective

    OpenAIRE

    Ch. Van Nieuwenhuyze; M. D. Zachary

    2010-01-01

    During the recent financial crisis, the deposit guarantee scheme in Belgium – as in other European countries – played a role in preventing bank runs and restoring confidence : to that end, the intervention ceilings were raised substantially and the scope of the scheme was extended to include certain life insurance policies. Finally, the expansion of the system’s coverage had to be financed by a sharp increase in the contributions from financial institutions. First of all, that measure had a p...

  10. New seismograph includes filters

    Energy Technology Data Exchange (ETDEWEB)

    1979-11-02

    The new Nimbus ES-1210 multichannel signal enhancement seismograph from EG and G geometrics has recently been redesigned to include multimode signal fillers on each amplifier. The ES-1210F is a shallow exploration seismograph for near subsurface exploration such as in depth-to-bedrock, geological hazard location, mineral exploration, and landslide investigations.

  11. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  12. Meal box schemes a convenient way to avoid convenience food? Uses and understandings of meal box schemes among Danish consumers.

    Science.gov (United States)

    Hertz, Frej Daniel; Halkier, Bente

    2017-07-01

    The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Analytic device including nanostructures

    KAUST Repository

    Di Fabrizio, Enzo M.; Fratalocchi, Andrea; Totero Gongora, Juan Sebastian; Coluccio, Maria Laura; Candeloro, Patrizio; Cuda, Gianni

    2015-01-01

    A device for detecting an analyte in a sample comprising: an array including a plurality of pixels, each pixel including a nanochain comprising: a first nanostructure, a second nanostructure, and a third nanostructure, wherein size of the first nanostructure is larger than that of the second nanostructure, and size of the second nanostructure is larger than that of the third nanostructure, and wherein the first nanostructure, the second nanostructure, and the third nanostructure are positioned on a substrate such that when the nanochain is excited by an energy, an optical field between the second nanostructure and the third nanostructure is stronger than an optical field between the first nanostructure and the second nanostructure, wherein the array is configured to receive a sample; and a detector arranged to collect spectral data from a plurality of pixels of the array.

  14. Saskatchewan resources. [including uranium

    Energy Technology Data Exchange (ETDEWEB)

    1979-09-01

    The production of chemicals and minerals for the chemical industry in Saskatchewan are featured, with some discussion of resource taxation. The commodities mentioned include potash, fatty amines, uranium, heavy oil, sodium sulfate, chlorine, sodium hydroxide, sodium chlorate and bentonite. Following the successful outcome of the Cluff Lake inquiry, the uranium industry is booming. Some developments and production figures for Gulf Minerals, Amok, Cenex and Eldorado are mentioned.

  15. Radio frequency selective addressing of localized atoms in a periodic potential

    International Nuclear Information System (INIS)

    Ott, H.; De Mirandes, E.; Ferlaino, F.; Roati, G.; Tuerck, V.; Modugno, G.; Inguscio, M.

    2004-01-01

    We study the localization and addressability of ultracold atoms in a combined parabolic and periodic potential. Such a potential supports the existence of localized stationary states and we show that applying a radio frequency field allows us to selectively address atoms in these states. This method is used to measure the energy and momentum distribution of the atoms in the localized states. We also discuss possible extensions of this scheme to address and manipulate atoms in single lattice sites

  16. A diagonal address generator for a Josephson memory circuit

    International Nuclear Information System (INIS)

    Suzuki, H.; Hasuo, S.

    1987-01-01

    The authors propose that a diagonal D address generator, which is useful for a single flux quantum (SFQ) memory cell in the triple coincidence scheme, can be performed by a full adder circuit. For the purpose of evaluating the D address generator for a 16-kbit memory circuit, a 6-bit full adder circuit, using a current-steering flip-flop circuit, has been designed and fabricated with the lead-alloy process. Operating times for the address latch, carry generator, and sum generator were 150 ps, 250 ps/stage, and 1.4 ns, respectively. From these results, they estimate that the time necessary for the diagonal signal generation is 2.8 ns

  17. Certification and equity: Applying an “equity framework” to compare certification schemes across product sectors and scales

    International Nuclear Information System (INIS)

    McDermott, Constance L.

    2013-01-01

    Highlights: ► Assessing equity requires a comprehensive conceptual framework. ► The framing of equity varies across sectors and schemes. ► Schemes vary in prioritizing the environment, communities or equity in the supply chain. ► Addressing contextual equity is essential lest certification reinforce inequities of global trade. -- Abstract: This paper applies a comprehensive equity framework to compare the priorities and trade-offs of different environmental and social certification schemes. The schemes selected for comparison are the Forest Stewardship Council (FSC), the Programme for the Endorsement of Forest Certification Schemes (PEFC), the Fairtrade Labelling Organization (FLO), and the Climate, Community and Biodiversity Alliance (CCBA). The framework considers how the parameters of equity are set in certification scheme governance, including who are the primary decision-makers and intended beneficiaries, and how this is reflected in the content of scheme standards and certification outcomes. Each of these parameters is assessed across the dimensions of procedural, contextual and distributive equity. Results reveal significant variation in the prioritization of the environment, non-commercial stakeholders or equity across the supply chain. In forestry, the FSC has placed primary emphasis on the procedural rights of non-commercial interests in standard-setting processes, the contextual rights of indigenous peoples, and the conservation of natural ecosystems, while the PEFC places more emphasis on procedural equity for producers and the legitimacy of sovereign governments as rule-makers. Both FLO and CCBA prioritize distributive equity regarding the sharing of material benefits with small-scale and/or community producers or workers, while FLO also emphasizes the contextual issue of “empowerment” and capacity-building. In all schemes, contextual factors related to capacity and access have disproportionately advantaged Northern and large

  18. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  19. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  20. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  1. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  2. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  3. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  4. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  5. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  6. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  7. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  8. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  9. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  10. Being Included and Excluded

    DEFF Research Database (Denmark)

    Korzenevica, Marina

    2016-01-01

    Following the civil war of 1996–2006, there was a dramatic increase in the labor mobility of young men and the inclusion of young women in formal education, which led to the transformation of the political landscape of rural Nepal. Mobility and schooling represent a level of prestige that rural...... politics. It analyzes how formal education and mobility either challenge or reinforce traditional gendered norms which dictate a lowly position for young married women in the household and their absence from community politics. The article concludes that women are simultaneously excluded and included from...... community politics. On the one hand, their mobility and decision-making powers decrease with the increase in the labor mobility of men and their newly gained education is politically devalued when compared to the informal education that men gain through mobility, but on the other hand, schooling strengthens...

  11. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  13. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  14. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  15. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  16. The radiology of abdominal calcification including demonstration of a readily useful and comprehensive classification scheme

    International Nuclear Information System (INIS)

    Baker, S.R.

    1995-01-01

    The analysis of abdominal calcifications and other radiopacities on plain radiographs is often a diagnostic challenge. Occasionally, historical information will be a value; at times, physical examination will contribute important clues. Laboratory date such as the presence of microscopic hematuria will sometimes be helpful. Yet, very frequently, the appearance of the opacity is unexpected. The contents are morphology; concretions; conduit wall, cyst wall, solid mass calcification; mobility; effect of respiration; effect of peristalsis, growth of masses

  17. The radiology of abdominal calcification including demonstration of a readily useful and comprehensive classification scheme

    Energy Technology Data Exchange (ETDEWEB)

    Baker, S R [University Hospital, Newark, New Jersey (United States)

    1996-12-31

    The analysis of abdominal calcifications and other radiopacities on plain radiographs is often a diagnostic challenge. Occasionally, historical information will be a value; at times, physical examination will contribute important clues. Laboratory date such as the presence of microscopic hematuria will sometimes be helpful. Yet, very frequently, the appearance of the opacity is unexpected. The contents are morphology; concretions; conduit wall, cyst wall, solid mass calcification; mobility; effect of respiration; effect of peristalsis, growth of masses.

  18. Addressing the workforce pipeline challenge

    Energy Technology Data Exchange (ETDEWEB)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  19. Funding schemes in OECD countries for future decommissioning of nuclear power

    International Nuclear Information System (INIS)

    Stevens, G.H.; Yasui, M.

    1993-01-01

    This paper provides a brief overview of the funding schemes for decommissioning implemented in selected OECD countries. The scope of this paper includes only the schemes for future decommissioning costs of private company's nuclear power plants. Countries such as Finland, Spain and Sweden have an official funding scheme, in which the government fixes the amount of money to be put aside, specifies a funding scheme and control the fund. In Belgium and Usa, the government do the same but leaves the management of the fund to the facility owners or external organization. In Canada, France, Germany, Italy, Japan, Netherlands and UK, there is no official funding scheme

  20. An extrapolation scheme for solid-state NMR chemical shift calculations

    Science.gov (United States)

    Nakajima, Takahito

    2017-06-01

    Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.

  1. A Life’s Addresses

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious relations......According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious...... to a number of different aspects of Koch’s own life such as marijuana, the Italian language, World War Two, etc. In this way, the book quite conventionally inscribes itself in the tradition of post-enlightenment apostrophic poetry as characterized by Culler, just as all its poems belong to the favourite......, are literally troped as and addressed in the manner of so many acquaintances, personal connections, relatives, friends, lovers, and family members in Koch’s life. My main claim is that Koch’s poetics in New Addresses is one that slightly dislocates the romantic dichotomy between the world of things...

  2. A Classification Scheme for Glaciological AVA Responses

    Science.gov (United States)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  3. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  4. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  5. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  6. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  7. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  8. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  9. Evaluation of the subsidy scheme for heat pumps, pellet-fuelled fireplaces and control systems; Evaluering av tilskuddsordningen til varmepumper, pelletskaminer og styringssystemer

    Energy Technology Data Exchange (ETDEWEB)

    Bjoernstad, Even; Grande, Jorunn; Sand, Roar; Wendelborg, Christian

    2005-07-01

    Enova's subsidy scheme for energy economising in households was carried out in 2003. Subsidies were given to investments in heat pumps, pellet-fuelled fireplaces and electric energy management systems. The primary objective for this evaluation is to build knowledge about the effect of such subsidy schemes, and determine if they contribute to the reduction of electricity consumption in households. Questions that are addressed include Enova's administration of the subsidy scheme, the effects on households, the effects on the energy market, prices and technology. It is concluded that the scheme had a varied effect for the three technologies entitled to subsidies, and heat pump applications got 92,5 percent of the total sum. The households that received subsidies are in general positive, and the households that did not are in general not so satisfied with the service. It is concluded Enova has administered the subsidy scheme well, especially considering the time-frame and the changed economical conditions given (ml)

  10. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  11. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  12. Impacts of Rotation Schemes on Ground-Dwelling Beneficial Arthropods.

    Science.gov (United States)

    Dunbar, Mike W; Gassmann, Aaron J; O'Neal, Matthew E

    2016-10-01

    Crop rotation alters agroecosystem diversity temporally, and increasing the number of crops in rotation schemes can increase crop yields and reduce reliance on pesticides. We hypothesized that increasing the number of crops in annual rotation schemes would positively affect ground-dwelling beneficial arthropod communities. During 2012 and 2013, pitfall traps were used to measure activity-density and diversity of ground-dwelling communities within three previously established, long-term crop rotation studies located in Wisconsin and Illinois. Rotation schemes sampled included continuous corn, a 2-yr annual rotation of corn and soybean, and a 3-yr annual rotation of corn, soybean, and wheat. Insects captured were identified to family, and non-insect arthropods were identified to class, order, or family, depending upon the taxa. Beneficial arthropods captured included natural enemies, granivores, and detritivores. The beneficial community from continuous corn plots was significantly more diverse compared with the community in the 2-yr rotation, whereas the community in the 3-yr rotation did not differ from either rotation scheme. The activity-density of the total community and any individual taxa did not differ among rotation schemes in either corn or soybean. Crop species within all three rotation schemes were annual crops, and are associated with agricultural practices that make infield habitat subject to anthropogenic disturbances and temporally unstable. Habitat instability and disturbance can limit the effectiveness and retention of beneficial arthropods, including natural enemies, granivores, and detritivores. Increasing non-crop and perennial species within landscapes in conjunction with more diverse rotation schemes may increase the effect of biological control of pests by natural enemies. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Impacts of the EU emissions trading scheme on the industrial competitiveness in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Graichen, Verena; Schumacher, Katja; Matthes, Felix C.; Mohr, Lennart [Oeko Institut e.V., Berlin (Germany); Duscha, Vicky; Schleich, Joachim [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany); Diekmann, Jochen [DIW, Berlin (Germany)

    2008-09-15

    The authors of the contribution under consideration present a discussion of methods, and provide empirical results for the analysis of effects of the EU Emissions Trading Scheme on product costs and subsequent impacts on international competitiveness. The discussion shows that the combination of intensity of trade indicators and value at stake indicators reveals meaningful results that allow assessing the potential for distortion in competitiveness by the EU Emissions Trading Schemes. The analysis of trade intensities and value at stake showed that a small number of sectors may in fact be exposed to distortions in competitiveness due to both high trade intensity and high value at stake. For Germany, these include 'basic iron and steel', 'fertilizers and nitrogen compounds', 'paper and paperboard', 'aluminium and aluminium products' and 'other basic inorganic chemicals'. A number of other sectors reveal a high intensity of trade but low value at stake which implies that the increase in product costs due to the EU Emissions Trading Scheme is relatively small and negative effects on competitiveness may not be likely. For the sectors that reveal high values at stake and high trade intensities, market positions are likely to change under the EU Emissions Trading system due to increased production costs and high exposure to international competition. When deciding on which sectors are highly exposed to possible distortions in competitiveness and which measures should be implemented to address competitiveness and leakage it should be kept in mind that CO{sub 2} costs are only one of multiple factors affecting companies' production and investment decisions. Other factors that may deserve detailed investigation include product differentiation and market segmentation within a sector (including specialty products), close cooperation with domestic/European partners and intrafirm trade, differences across countries in the

  14. Dynamic remedial action scheme using online transient stability analysis

    Science.gov (United States)

    Shrestha, Arun

    Economic pressure and environmental factors have forced the modern power systems to operate closer to their stability limits. However, maintaining transient stability is a fundamental requirement for the operation of interconnected power systems. In North America, power systems are planned and operated to withstand the loss of any single or multiple elements without violating North American Electric Reliability Corporation (NERC) system performance criteria. For a contingency resulting in the loss of multiple elements (Category C), emergency transient stability controls may be necessary to stabilize the power system. Emergency control is designed to sense abnormal conditions and subsequently take pre-determined remedial actions to prevent instability. Commonly known as either Remedial Action Schemes (RAS) or as Special/System Protection Schemes (SPS), these emergency control approaches have been extensively adopted by utilities. RAS are designed to address specific problems, e.g. to increase power transfer, to provide reactive support, to address generator instability, to limit thermal overloads, etc. Possible remedial actions include generator tripping, load shedding, capacitor and reactor switching, static VAR control, etc. Among various RAS types, generation shedding is the most effective and widely used emergency control means for maintaining system stability. In this dissertation, an optimal power flow (OPF)-based generation-shedding RAS is proposed. This scheme uses online transient stability calculation and generator cost function to determine appropriate remedial actions. For transient stability calculation, SIngle Machine Equivalent (SIME) technique is used, which reduces the multimachine power system model to a One-Machine Infinite Bus (OMIB) equivalent and identifies critical machines. Unlike conventional RAS, which are designed using offline simulations, online stability calculations make the proposed RAS dynamic and adapting to any power system

  15. Constraining Stochastic Parametrisation Schemes Using High-Resolution Model Simulations

    Science.gov (United States)

    Christensen, H. M.; Dawson, A.; Palmer, T.

    2017-12-01

    Stochastic parametrisations are used in weather and climate models as a physically motivated way to represent model error due to unresolved processes. Designing new stochastic schemes has been the target of much innovative research over the last decade. While a focus has been on developing physically motivated approaches, many successful stochastic parametrisation schemes are very simple, such as the European Centre for Medium-Range Weather Forecasts (ECMWF) multiplicative scheme `Stochastically Perturbed Parametrisation Tendencies' (SPPT). The SPPT scheme improves the skill of probabilistic weather and seasonal forecasts, and so is widely used. However, little work has focused on assessing the physical basis of the SPPT scheme. We address this matter by using high-resolution model simulations to explicitly measure the `error' in the parametrised tendency that SPPT seeks to represent. The high resolution simulations are first coarse-grained to the desired forecast model resolution before they are used to produce initial conditions and forcing data needed to drive the ECMWF Single Column Model (SCM). By comparing SCM forecast tendencies with the evolution of the high resolution model, we can measure the `error' in the forecast tendencies. In this way, we provide justification for the multiplicative nature of SPPT, and for the temporal and spatial scales of the stochastic perturbations. However, we also identify issues with the SPPT scheme. It is therefore hoped these measurements will improve both holistic and process based approaches to stochastic parametrisation. Figure caption: Instantaneous snapshot of the optimal SPPT stochastic perturbation, derived by comparing high-resolution simulations with a low resolution forecast model.

  16. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  17. CLAS: A Novel Communications Latency Based Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Zuochao Dou

    2017-01-01

    Full Text Available We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL between clients and authenticators. In addition to the traditional credentials, CLAS profiles RTL values of clients and uses them to defend against password compromise. The key challenges are (i to prevent RTL manipulation, (ii to alleviate network instabilities, and (iii to address mobile clients. CLAS addresses the first challenge by introducing a novel network architecture, which makes it extremely difficult for attackers to simulate legitimate RTL values. The second challenge is addressed by outlier removal and multiple temporal profiling, while the last challenge is addressed by augmenting CLAS with out-of-band-channels or other authentication schemes. CLAS restricts login to profiled locations while demanding additional information for nonprofiled ones, which highly reduces the attack surface even when the legitimate credentials are compromised. Additionally, unlike many state-of-the-art authentication mechanisms, CLAS is resilient to phishing, pharming, man-in-the-middle, and social engineering attacks. Furthermore, CLAS is transparent to users and incurs negligible overhead. The experimental results show that CLAS can achieve very low false positive and false negative rates.

  18. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  19. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  20. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  1. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  2. Addressing inadequate compensation | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-08-12

    Aug 12, 2016 ... The issue LSLAs raise a number of concerns regarding compensation, including ... at a meeting with traders in Lamu, Kenya, where a new port is planned. ... compensation and a fair share of benefits and risks in land deals.

  3. Opportunities within the Revised EU Common Agricultural Policy to Address the Decline of Farmland Birds: An Irish Perspective

    Directory of Open Access Journals (Sweden)

    Daire Ó hUallacháin

    2015-08-01

    Full Text Available The loss of global biological diversity continues despite on-going conservation efforts. Agriculture is the major terrestrial land use in Europe and any conservation efforts to protect biological diversity must address sustainable use of these food production systems. Using Ireland, within the European Union policy framework, as an example, the declines in farmland birds are discussed. The opportunities afforded to farmland bird conservation as a result of the recent reform to the Common Agricultural Policy (CAP are outlined. The potential for revised and refined CAP, specifically agri-environment schemes, to deliver benefits for biodiversity and for farmland bird species within Irish agricultural ecosystems is explored. Despite all the efforts to date and the significant resources invested in implementing agri-environment measures and schemes, few attempts have been made to collect monitoring and surveillance data with which to quantitatively assess the effectiveness of schemes, and measures that are designed to assist in the recovery of farmland biodiversity, including bird species, in Ireland.

  4. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Science.gov (United States)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  5. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  6. First keynote address - biological monitoring

    International Nuclear Information System (INIS)

    Turner, J.E.

    1984-01-01

    The author describes the interplay of physical research and the practice of radiation protection. There are both analogies in and differences between the problems of health protection from radiation and chemical pollutants. In formulating research objectives for synfuel technologies, it is important to take what lessons there are to be learned from the radiation experience. The regulation of the exposure of persons to radiation probably rests on a firmer scientific basis than does the regulation of exposure to many toxic chemicals. Some things in radiation protection - in both applied work and in research - should help to guide in approaching chemicals. The second section of this paper gives a brief description of the practice of radiation protection. The next section mentions some fundamental deficiencies that exist in radiation protection. Some physical research avenues illustrate how such deficiencies are being addressed as part of an integrated radiation research program. In the fourth section the author focuses on chemical pollutants, drawing some lessons from the radiation experience

  7. A region addresses patient safety.

    Science.gov (United States)

    Feinstein, Karen Wolk; Grunden, Naida; Harrison, Edward I

    2002-06-01

    The Pittsburgh Regional Healthcare Initiative (PRHI) is a coalition of 35 hospitals, 4 major insurers, more than 30 major and small-business health care purchasers, dozens of corporate and civic leaders, organized labor, and partnerships with state and federal government all working together to deliver perfect patient care throughout Southwestern Pennsylvania. PRHI believes that in pursuing perfection, many of the challenges facing today's health care delivery system (eg, waste and error in the delivery of care, rising costs, frustration and shortage among clinicians and workers, financial distress, overcapacity, and lack of access to care) will be addressed. PRHI has identified patient safety (nosocomial infections and medication errors) and 5 clinical areas (obstetrics, orthopedic surgery, cardiac surgery, depression, and diabetes) as ideal starting points. In each of these areas of work, PRHI partners have assembled multifacility/multidisciplinary groups charged with defining perfection, establishing region-wide reporting systems, and devising and implementing recommended improvement strategies and interventions. Many design and conceptual elements of the PRHI strategy are adapted from the Toyota Production System and its Pittsburgh derivative, the Alcoa Business System. PRHI is in the proof-of-concept phase of development.

  8. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...... for quality of life, information about acoustic conditions is rarely available, neither for new or existing housing. Regulatory acoustic requirements will, if enforced, ensure a corresponding quality for new dwellings, but satisfactory conditions for occupants are not guaranteed. Consequently, several...

  9. Novel scheme for efficient and cost-effective forwarding of packets in optical networks without header modification

    DEFF Research Database (Denmark)

    Wessing, Henrik; Fjelde, Tina; Christiansen, Henrik Lehrmann

    2001-01-01

    We present a novel scheme for addressing the outputs in optical packet switches and demonstrate its good scalability. The scheme requires neither header modification nor distribution of routing information to the packet switches, thus reducing optical component count while simplifying network...

  10. Single-spin addressing in an atomic Mott insulator

    DEFF Research Database (Denmark)

    Weitenberg, Christof; Endres, Manuel; Sherson, Jacob

    2011-01-01

    directly monitored the tunnelling quantum dynamics of single atoms in the lattice prepared along a single line, and observed that our addressing scheme leaves the atoms in the motional ground state. The results should enable studies of entropy transport and the quantum dynamics of spin impurities...... and quantum spin dynamics. Here we demonstrate how such control can be implemented at the most fundamental level of a single spin at a specific site of an optical lattice. Using a tightly focused laser beam together with a microwave field, we were able to flip the spin of individual atoms in a Mott insulator...... with sub-diffraction-limited resolution, well below the lattice spacing. The Mott insulator provided us with a large two-dimensional array of perfectly arranged atoms, in which we created arbitrary spin patterns by sequentially addressing selected lattice sites after freezing out the atom distribution. We...

  11. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  12. Harmonisation between National and International Tradeable Permit Schemes. CATEP Synthesis Paper

    International Nuclear Information System (INIS)

    Haites, E.

    2003-01-01

    It is technically possible to link national emissions trading schemes with widely divergent designs. Where design differences create potential problems, technical solutions are available. The greater the similarity of their designs, the easier schemes are to link. During the 2005 - 2007 period the EU Directive, if it is adopted, will lead to the establishment of at least 25 national emissions trading schemes. The Directive specifies many of the design features of these schemes, but leaves the allocation of allowances, rules for banking allowances into the commitment period, use of the opt-out provision, and a few other design features to Member States. The resulting differences among Member State schemes are unlikely to undermine the links between the schemes established by the Directive. The Community may enter into agreements with non-members for mutual recognition of allowances between their emissions trading schemes, but few, if any, links of this type are expected prior to 2008 for practical reasons. Beginning in 2008, Article 17 of the Kyoto Protocol establishes an international emissions trading scheme that can link the national trading schemes of Annex I Parties. It imposes no requirements for harmonisation on the national emissions trading schemes linked. Some design differences could create technical problems, although solutions are available and at least one of the governments involved has an incentive to solve the problem. Adverse competitiveness impacts due to differences in the distribution of allowances across national schemes may need to be addressed through institutions such as the WTO. Most of the national trading schemes will also be subject to the EU Directive and be subject to greater harmonisation after 2008. The result is likely to be a progressive expansion and integration of greenhouse gas allowance markets over the next decade

  13. A user-driven treadmill control scheme for simulating overground locomotion.

    Science.gov (United States)

    Kim, Jonghyun; Stanley, Christopher J; Curatalo, Lindsey A; Park, Hyung-Soon

    2012-01-01

    Treadmill-based locomotor training should simulate overground walking as closely as possible for optimal skill transfer. The constant speed of a standard treadmill encourages automaticity rather than engagement and fails to simulate the variable speeds encountered during real-world walking. To address this limitation, this paper proposes a user-driven treadmill velocity control scheme that allows the user to experience natural fluctuations in walking velocity with minimal unwanted inertial force due to acceleration/deceleration of the treadmill belt. A smart estimation limiter in the scheme effectively attenuates the inertial force during velocity changes. The proposed scheme requires measurement of pelvic and swing foot motions, and is developed for a treadmill of typical belt length (1.5 m). The proposed scheme is quantitatively evaluated here with four healthy subjects by comparing it with the most advanced control scheme identified in the literature.

  14. A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Meizi Li

    2015-01-01

    Full Text Available User sentiment analysis has become a flourishing frontier in data mining mobile social network platform since the mobile social network plays a significant role in users’ daily communication and sentiment interaction. This study studies the scheme of sentiment estimate by using the users’ trustworthy relationships for evaluating sentiment delivering. First, we address an overview of sentiment delivering estimate scheme and propose its related definitions, that is, trust chain among users, sentiment semantics, and sentiment ontology. Second, this study proposes the trust chain model and its evaluation method, which is composed of evaluation of atomic, serial, parallel, and combined trust chains. Then, we propose sentiment modeling method by presenting its modeling rules. Further, we propose the sentiment delivering estimate scheme from two aspects: explicit and implicit sentiment delivering estimate schemes, based on trust chain and sentiment modeling method. Finally, examinations and results are given to further explain effectiveness and feasibility of our scheme.

  15. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  16. Hybrid flux splitting schemes for numerical resolution of two-phase flows

    Energy Technology Data Exchange (ETDEWEB)

    Flaatten, Tore

    2003-07-01

    This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)

  17. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  18. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  19. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  20. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  1. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  2. Addresses of herbaria in Malesia

    NARCIS (Netherlands)

    NN,

    1998-01-01

    In the Spring issue of next year I would like to include a new list of institutes, herbaria, and people for the Malesian area. Please e-mail to me directly: veldkamp@rulrhb.leidenuniv.nl Do NOT use attachments! Half the time I cannot read them, and then I have to write to you, and you again to me,

  3. Addressing Transgender Issues in Schools

    Science.gov (United States)

    Cavanagh, Marian

    2016-01-01

    As mainstream media focus more attention on transgender issues, and as anti-discrimination laws evolve, a shift is taking place on campuses. Many schools now include gender identity and expression in their inclusivity work and seek to establish policies and procedures to support transgender students and their families. It's not an easy task. In…

  4. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  5. Meal box schemes as a convenient way to avoid convenience food?

    DEFF Research Database (Denmark)

    Hertz, Frej; Halkier, Bente

    2017-01-01

    to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical......The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological...

  6. Readout scheme for the Baby-MIND detector

    CERN Document Server

    Noah, Etam; Cadoux, F; Favre, Y; Martinez, B; Nicola, L; Parsa, S; Rayner, M; Antonova, M; Fedotov, S; Izmaylov, A; Kleymenova, A; Khabibullin, M; Khotyantsev, A; Kudenko, Y; Likhacheva, V; Mefodiev, A; Mineev, O; Ovsiannikova, T; Shaykhiev, A; Suvorov, S; Yershov, N; Tsenov, R

    2016-01-01

    A readout scheme has been designed for the plastic scintillator bars of the Baby-MIND detector modules. This spectrometer will measure momentum and identify the charge of 1 GeV/c muons with magnetized iron plates interleaved with detector modules. One challenge the detector aims to address is that of keeping high charge identification efficiencies for momenta below 1 GeV/c where multiple scattering in the iron plates degrades momentum resolution. A front-end board has been developed, with 3 CITIROC readout chips per board and up to 96 channels. Hamamatsu MPPCs type S12571-025C photosensors were chosen for readout of wavelength shifting fibers embedded in plastic scintillators. Procurement of the MPPCs has been carried out to instrument 3000 channels in total. Design choices and first results of this readout scheme are presented.

  7. A fast and accurate dihedral interpolation loop subdivision scheme

    Science.gov (United States)

    Shi, Zhuo; An, Yalei; Wang, Zhongshuai; Yu, Ke; Zhong, Si; Lan, Rushi; Luo, Xiaonan

    2018-04-01

    In this paper, we propose a fast and accurate dihedral interpolation Loop subdivision scheme for subdivision surfaces based on triangular meshes. In order to solve the problem of surface shrinkage, we keep the limit condition unchanged, which is important. Extraordinary vertices are handled using modified Butterfly rules. Subdivision schemes are computationally costly as the number of faces grows exponentially at higher levels of subdivision. To address this problem, our approach is to use local surface information to adaptively refine the model. This is achieved simply by changing the threshold value of the dihedral angle parameter, i.e., the angle between the normals of a triangular face and its adjacent faces. We then demonstrate the effectiveness of the proposed method for various 3D graphic triangular meshes, and extensive experimental results show that it can match or exceed the expected results at lower computational cost.

  8. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  9. New Schemes for Positive Real Truncation

    Directory of Open Access Journals (Sweden)

    Kari Unneland

    2007-07-01

    Full Text Available Model reduction, based on balanced truncation, of stable and of positive real systems are considered. An overview over some of the already existing techniques are given: Lyapunov balancing and stochastic balancing, which includes Riccati balancing. A novel scheme for positive real balanced truncation is then proposed, which is a combination of the already existing Lyapunov balancing and Riccati balancing. Using Riccati balancing, the solution of two Riccati equations are needed to obtain positive real reduced order systems. For the suggested method, only one Lyapunov equation and one Riccati equation are solved in order to obtain positive real reduced order systems, which is less computationally demanding. Further it is shown, that in order to get positive real reduced order systems, only one Riccati equation needs to be solved. Finally, this is used to obtain positive real frequency weighted balanced truncation.

  10. Forms of Address as Discrete Modal Operators

    Directory of Open Access Journals (Sweden)

    Wojciech Paweł Sosnowski

    2016-12-01

    Full Text Available Forms of Address as Discrete Modal Operators The category of expressions of politeness includes, among others, forms of address. Forms of address express honorification. Honorification can be defined as a special type of meaning that consists of information about the social and interpersonal relations between the speaker and the addressee, the speaker and the hearer, and the speaker and the protagonist of the predication. As far as their place in the syntactic structure is concerned, forms of address can either be integrated with the other elements of a predication or not. However, they are always part of a predication’s semantic structure. Moreover, forms of address convey the speaker’s attitude to the meaning of the predicate that they want to convey, which consequently means that forms of address also carry a modal element. Modality can be defined as a situation in which an individual is in a particular mental state, i.e. exhibits some kind of attitude to a situation or a type of situations. Forms of address can be categorised as modal operators conveying imperatives, requests, suppositions, etc. The term "operator" can be used for a unit of language when it changes the semantic structure of the predication. My research on honorification is mainly based on contemporary corpora, both monolingual and multilingual. In the present study, I analyse forms of address which carry imperative and optative meanings.   Formy adresatywne jako dyskretne operatory modalne W obrębie wyrażeń realizujących funkcje grzecznościowe znajduje się grupa form adresatywnych. Są one częścią kategorii honoryfikatywności rozumianej jako szczególny rodzaj znaczenia zawartego w treści wypowiedzi, informację o towarzysko-społecznej relacji między nadawcą a odbiorcą, nadawcą a słuchaczem oraz nadawcą a bohaterem wypowiedzi. Gramatycznie formy adresatywne mogą być zarówno zintegrowane, jak i niezintegrowane syntaktycznie z resztą wypowiedzi, ale

  11. Charge Transfer Scheme for Atmospheric Ice Sensing

    Directory of Open Access Journals (Sweden)

    Umair Najeeb MUGHAL

    2015-01-01

    Full Text Available The atmospheric icing parameters are being measured nowadays with the aid of more customized yet limited commercial equipment. The parameters include atmospheric ice detection, icing load and icing rate. The robustness of such equipment is usually under scrutiny when it comes to cold/harsh environment operations. This phenomenon was experienced consistently by the atmospheric Icing Research Team at Narvik University College during data retrieval exercises from its atmospheric icing stations installed at Fargnesfjellet during 2012-13. In this paper it is aimed to address the potential feasibility to produce a robust hardware addressing the icing measurements signals, which includes instrumentation hardware giving icing indications, icing type and de- icing rate measurements in a single platform (not commercially available till date.

  12. Realization and Addressing Analysis In Blockchain Bitcoin

    Science.gov (United States)

    Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.

  13. Addressing firefighter safety around solar PV systems

    Energy Technology Data Exchange (ETDEWEB)

    Harris, B. [Sustainable Energy Technologies, Calgary, AB (Canada)

    2010-11-15

    The article discussed new considerations for installing photovoltaic (PV) systems that address the needs of fire service personnel. The presence of a PV system presents a multitude of dangers for firefighters, including electrical shock, the inhalation of toxic gases from being unable to cut a hole through the roof, falling debris and flying glass, and dead loading on a compromised structure and tripping on conduits. Mapping systems should be modified so that buildings with PV systems are identified for first responders, including firefighters who should learn that solar modules present an electrical hazard during the day but not at night; covering PV modules with foam or salvage covers may not shut the system down to a safe level; it takes a few moments for the power in PV modules to reduce to zero; and PV modules or conduit should never be cut, broke, chopped, or walked upon. The California Department of Forestry and Fire Protection recommends creating pathways and allowing easier access to the roof by setting the modules back from roof edges, creating a structurally sound pathway for firefighters to walk on and space to cut ventilation holes. However, the setback rule makes the economics of solar installation less viable for residential applications. The technological innovations aimed at addressing system safety all focus on limiting firefighter contact with live electrical components to within the extra-low-voltage (ELV) band. Some of the inverters on the market that support ELV system architecture were described. 1 fig.

  14. Universal health coverage in 'One ASEAN': are migrants included?

    Science.gov (United States)

    Guinto, Ramon Lorenzo Luis R; Curran, Ufara Zuwasti; Suphanchaimat, Rapeepong; Pocock, Nicola S

    2015-01-01

    As the Association of South East Asian Nations (ASEAN) gears toward full regional integration by 2015, the cross-border mobility of workers and citizens at large is expected to further intensify in the coming years. While ASEAN member countries have already signed the Declaration on the Protection and Promotion of the Rights of Migrant Workers, the health rights of migrants still need to be addressed, especially with ongoing universal health coverage (UHC) reforms in most ASEAN countries. This paper seeks to examine the inclusion of migrants in the UHC systems of five ASEAN countries which exhibit diverse migration profiles and are currently undergoing varying stages of UHC development. A scoping review of current migration trends and policies as well as ongoing UHC developments and migrant inclusion in UHC in Indonesia, Malaysia, Philippines, Singapore, and Thailand was conducted. In general, all five countries, whether receiving or sending, have schemes that cover migrants to varying extents. Thailand even allows undocumented migrants to opt into its Compulsory Migrant Health Insurance scheme, while Malaysia and Singapore are still yet to consider including migrants in their government-run UHC systems. In terms of predominantly sending countries, the Philippines's social health insurance provides outbound migrants with portable insurance yet with limited benefits, while Indonesia still needs to strengthen the implementation of its compulsory migrant insurance which has a health insurance component. Overall, the five ASEAN countries continue to face implementation challenges, and will need to improve on their UHC design in order to ensure genuine inclusion of migrants, including undocumented migrants. However, such reforms will require strong political decisions from agencies outside the health sector that govern migration and labor policies. Furthermore, countries must engage in multilateral and bilateral dialogue as they redefine UHC beyond the basis of

  15. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  16. Community Based Health Insurance Schemes and Protection of the ...

    African Journals Online (AJOL)

    The objectives of this study are two folds: firstly to explore the magnitude of catastrophic expenditure, and secondly to determine its contributing factor,s including the protective impact of the voluntary community based health insurance schemes in Tanzania. The study covered 274 respondents. Study findings have shown ...

  17. Establishment of water quality classification scheme: a case study of ...

    African Journals Online (AJOL)

    A water quality classification scheme based on 11 routinely measured physicochemical variables has been developed for the Calabar River Estuary. The variables considered include water temperature, pH. Eh, DO, DO saturation, BOD5, COD, TSS, turbidity, NH4-N and electrical conductivity. Classification of water source ...

  18. New Course Design: Classification Schemes and Information Architecture.

    Science.gov (United States)

    Weinberg, Bella Hass

    2002-01-01

    Describes a course developed at St. John's University (New York) in the Division of Library and Information Science that relates traditional classification schemes to information architecture and Web sites. Highlights include functional aspects of information architecture, that is, the way content is structured; assignments; student reactions; and…

  19. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  20. Importance biasing scheme implemented in the PRIZMA code

    International Nuclear Information System (INIS)

    Kandiev, I.Z.; Malyshkin, G.N.

    1997-01-01

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities

  1. Conserving GW scheme for nonequilibrium quantum transport in molecular contacts

    DEFF Research Database (Denmark)

    Thygesen, Kristian Sommer; Rubio, Angel

    2008-01-01

    We give a detailed presentation of our recent scheme to include correlation effects in molecular transport calculations using the nonequilibrium Keldysh formalism. The scheme is general and can be used with any quasiparticle self-energy, but for practical reasons, we mainly specialize to the so......-called GW self-energy, widely used to describe the quasiparticle band structures and spectroscopic properties of extended and low-dimensional systems. We restrict the GW self-energy to a finite, central region containing the molecule, and we describe the leads by density functional theory (DFT). A minimal...

  2. Power corrections in the N-jettiness subtraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Boughezal, Radja [High Energy Physics Division, Argonne National Laboratory,Argonne, IL 60439 (United States); Liu, Xiaohui [Department of Physics, Beijing Normal University,Beijing, 100875 (China); Center of Advanced Quantum Studies, Beijing Normal University,Beijing, 100875 (China); Center for High-Energy Physics, Peking University,Beijing, 100871 (China); Maryland Center for Fundamental Physics, University of Maryland,College Park, MD 20742 (United States); Petriello, Frank [Department of Physics & Astronomy, Northwestern University,Evanston, IL 60208 (United States); High Energy Physics Division, Argonne National Laboratory,Argonne, IL 60439 (United States)

    2017-03-30

    We discuss the leading-logarithmic power corrections in the N-jettiness subtraction scheme for higher-order perturbative QCD calculations. We compute the next-to-leading order power corrections for an arbitrary N-jet process, and we explicitly calculate the power correction through next-to-next-to-leading order for color-singlet production for both qq̄ and gg initiated processes. Our results are compact and simple to implement numerically. Including the leading power correction in the N-jettiness subtraction scheme substantially improves its numerical efficiency. We discuss what features of our techniques extend to processes containing final-state jets.

  3. Discontinuous nodal schemes applied to the bidimensional neutron transport equation

    International Nuclear Information System (INIS)

    Delfin L, A.; Valle G, E. Del; Hennart B, J.P.

    1996-01-01

    In this paper several strong discontinuous nodal schemes are described, starting from the one that has only two interpolation parameters per cell to the one having ten. Their application to the spatial discretization of the neutron transport equation in X-Y geometry is also described, giving, for each one of the nodal schemes, the approximation for the angular neutron flux that includes the set of interpolation parameters and the corresponding polynomial space. Numerical results were obtained for several test problems presenting here the problem with the highest degree of difficulty and their comparison with published results 1,2 . (Author)

  4. A note on macro-financial implications of mobile money schemes

    OpenAIRE

    Mas, Ignacio; Klein, Michael

    2012-01-01

    Across the world mobile money schemes are being launched. In such schemes financial service providers interact with clients via mobile phones or other mobile devices such as tablets. Service offerings include payments and saving as well as basic insurance products and sometimes credit based on scoring methods that use information about the client’s payment history. The world of mobile money is still in the experimental stage. Some schemes like M-PESA in Kenya have, at least initially, been ru...

  5. Emissions trading to combat climate change: The impact of scheme design on transaction costs

    OpenAIRE

    Betz, Regina

    2006-01-01

    This paper explores the likely impact of emissions trading design on transaction costs. Transaction costs include both the costs for the private sector to comply with the scheme rules and the costs of scheme administration. In economic theory transaction costs are often assumed to be zero. But transaction costs are real costs and there is no reason for treating them differently to other costs. Thus, in setting up an emissions trading scheme, transaction costs have to be taken into account in ...

  6. An Implicit Scheme of Lattice Boltzmann Method for Sine-Gordon Equation

    International Nuclear Information System (INIS)

    Hui-Lin, Lai; Chang-Feng, Ma

    2008-01-01

    We establish an implicit scheme of lattice Boltzmann method for simulating the sine-Gordon equation, which can be transformed into the explicit one, so the computation of the scheme is simple. Moreover, the parameter θ of the implicit scheme is independent of the relaxation time, which makes the model more flexible. The numerical results show that this method is very effective. (fundamental areas of phenomenology (including applications))

  7. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  8. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  9. Energy sales targets: An alternative to White Certificate schemes

    International Nuclear Information System (INIS)

    Passey, Robert; MacGill, Iain

    2009-01-01

    White Certificate schemes are currently being implemented or proposed in a growing number of jurisdictions as a means to drive greater energy efficiency uptake. After briefly discussing some of the strengths and weaknesses of such schemes, this paper outlines a proposed alternative approach-the use of Energy Sales Targets. This approach essentially involves the imposition of a cap on the greenhouse gas (GHG) emissions associated with annual energy sales and, in its simplest version, requires no tradeable certificates or permits. The proposed approach creates a clear measurable link between how compliance is enforced (the retailers' targets) and the desired outcomes of the scheme (measurable reductions in GHG emissions). This drives physical additionality of the scheme, including negation of any rebound effect within the covered sectors. It also avoids the need to define the activities eligible to create certificates, and likewise, no deeming, auditing, monitoring or verification would be required by government beyond ensuring retailer compliance-significantly reducing administration costs. There does not appear to be a clear precedent for this type of scheme anywhere in the world, and so this paper should be seen as a preliminary scoping of options that are deserving of more in-depth assessment.

  10. Relationship of Occlusal Schemes with the Occurrence of Temporomandibular Disorders

    Directory of Open Access Journals (Sweden)

    Dina H. Sugiaman

    2013-07-01

    Full Text Available Masticatory system is a complex functional unit of the body responsible for mastication, speech, and deglutition process. Temporomandibular disorders (TMD is used to describe all functional disturbances of the masticatory system. The etiology of TMD is multifactorial, such as occlusal disharmony and emotional stress. The relationship between occlusion and TMD has been highly debated in dentistry, one of the occlusal factors is the occlusal scheme. Occlusal schemes are defined as bilateral canine guidance, unilateral canine guidance, group function and balanced occlusion. However, studies about the relationship of occlusal schemes and the occurrence of the TMD are still limited and remained controversial. Objective: To investigate the relationship of occlusal schemes witht he occurrence of TMD. Methods: A cross-sectional study was conducted at the Faculty of Dentistry, Uniiversitas Indonesia. A total of 127 students were included in this study. Subjects were examined based on Clinical Helkimo Index and divided into TMD and non-TMD groups. Subjects were categorized as non-TMD groups if the value of the clinical Helkimo index was 0 and as TMD group when the value ranged between 1-25. Results: Balanced occlusion schemes has a greater risk of TMD occurrence with odds ratio value 5.6 and 95% confidence interval 1.188 to 26.331 (p=0.021. Conclusion: Balanced occlusion has a significant relationship with the occurrence of TMD.

  11. Nonstandard approximation schemes for lower dimensional quantum field theories

    International Nuclear Information System (INIS)

    Fitzpatrick, D.A.

    1981-01-01

    The purpose of this thesis has been to apply two different nonstandard approximation schemes to a variety of lower-dimensional schemes. In doing this, we show their applicability where (e.g., Feynman or Rayleigh-Schroedinger) approximation schemes are inapplicable. We have applied the well-known mean-field approximation scheme by Guralnik et al. to general lower dimensional theories - the phi 4 field theory in one dimension, and the massive and massless Thirring models in two dimensions. In each case, we derive a bound-state propagator and then expand the theory in terms of the original and bound-state propagators. The results obtained can be compared with previously known results thereby show, in general, reasonably good convergence. In the second half of the thesis, we develop a self-consistent quantum mechanical approximation scheme. This can be applied to any monotonic polynomial potential. It has been applied in detail to the anharmonic oscillator, and the results in several analytical domains are very good, including extensive tables of numerical results

  12. A more accurate scheme for calculating Earth's skin temperature

    Science.gov (United States)

    Tsuang, Ben-Jei; Tu, Chia-Ying; Tsai, Jeng-Lin; Dracup, John A.; Arpe, Klaus; Meyers, Tilden

    2009-02-01

    The theoretical framework of the vertical discretization of a ground column for calculating Earth’s skin temperature is presented. The suggested discretization is derived from the evenly heat-content discretization with the optimal effective thickness for layer-temperature simulation. For the same level number, the suggested discretization is more accurate in skin temperature as well as surface ground heat flux simulations than those used in some state-of-the-art models. A proposed scheme (“op(3,2,0)”) can reduce the normalized root-mean-square error (or RMSE/STD ratio) of the calculated surface ground heat flux of a cropland site significantly to 2% (or 0.9 W m-2), from 11% (or 5 W m-2) by a 5-layer scheme used in ECMWF, from 19% (or 8 W m-2) by a 5-layer scheme used in ECHAM, and from 74% (or 32 W m-2) by a single-layer scheme used in the UCLA GCM. Better accuracy can be achieved by including more layers to the vertical discretization. Similar improvements are expected for other locations with different land types since the numerical error is inherited into the models for all the land types. The proposed scheme can be easily implemented into state-of-the-art climate models for the temperature simulation of snow, ice and soil.

  13. Frequency Stabilizing Scheme for a Danish Island Grid

    DEFF Research Database (Denmark)

    Cha, Seung-Tae; Wu, Qiuwei; Østergaard, Jacob

    2012-01-01

    of wind power is necessary to avoid unwanted power oscillations, which lead to uncontrolled oscillations in the power plant control. Since this might deteriorate power quality including frequency in an island grid, a frequency stabilizing control scheme or strategies using intelligent controller......This paper describes the development of frequency stabilizing control scheme for a small Danish island of Bornholm. The Bornholm power system is able to transit from interconnected operation with the Nordic power system to isolated islanding operation. During islanding operation the shedding...... with a battery energy storage system (BESS) has been proposed. The real-time models of distribution grids of Bornholm power system were used to carry out case studies to illustrate the performance of centralized load frequency control as well as coordinated control scheme. Case study results show...

  14. A General Symbolic PDE Solver Generator: Beyond Explicit Schemes

    Directory of Open Access Journals (Sweden)

    K. Sheshadri

    2003-01-01

    Full Text Available This paper presents an extension of our Mathematica- and MathCode-based symbolic-numeric framework for solving a variety of partial differential equation (PDE problems. The main features of our earlier work, which implemented explicit finite-difference schemes, include the ability to handle (1 arbitrary number of dependent variables, (2 arbitrary dimensionality, and (3 arbitrary geometry, as well as (4 developing finite-difference schemes to any desired order of approximation. In the present paper, extensions of this framework to implicit schemes and the method of lines are discussed. While C++ code is generated, using the MathCode system for the implicit method, Modelica code is generated for the method of lines. The latter provides a preliminary PDE support for the Modelica language. Examples illustrating the various aspects of the solver generator are presented.

  15. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  16. A Cell-Centered Multiphase ALE Scheme With Structural Coupling

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, Timothy Alan [Univ. of California, Davis, CA (United States)

    2012-04-16

    A novel computational scheme has been developed for simulating compressible multiphase flows interacting with solid structures. The multiphase fluid is computed using a Godunov-type finite-volume method. This has been extended to allow computations on moving meshes using a direct arbitrary-Eulerian- Lagrangian (ALE) scheme. The method has been implemented within a Lagrangian hydrocode, which allows modeling the interaction with Lagrangian structural regions. Although the above scheme is general enough for use on many applications, the ultimate goal of the research is the simulation of heterogeneous energetic material, such as explosives or propellants. The method is powerful enough for application to all stages of the problem, including the initial burning of the material, the propagation of blast waves, and interaction with surrounding structures. The method has been tested on a number of canonical multiphase tests as well as fluid-structure interaction problems.

  17. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  18. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Load Experiment of the vDACS Scheme in case of the 300 Clients

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-09-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 300.

  1. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  2. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  3. Women into Non-Traditional Sectors: Addressing Gender Segregation in the Northern Ireland Workplace

    Science.gov (United States)

    Potter, Michael; Hill, Myrtle

    2009-01-01

    The horizontal segregation of the workforce along gender lines tends to assign women to lower paid, lower status employment. Consequently, schemes to address segregation have focused on preparing women to enter non-traditional occupations through training and development processes. This article examines models to encourage women into…

  4. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  5. Evaluation of Janani Shishu Suraksha Karyakram scheme and out of pocket expenditure in a rural area of Northern India

    Directory of Open Access Journals (Sweden)

    Sandeep Chaudhary

    2017-01-01

    Full Text Available Introduction: The stagnant performance of countries with regard to maternal and child health is linked to low investment in health and out of pocket expenditure (OOP. To address issue of OOP expenses related to maternal and newborn care, Janani Shishu SUraksha Karyakram (JSSK was launched in the year 2011 in Mewat district of Haryana with the objective to eliminate OOP expenses of obstetric women and sick infants. Methods: A community based cross-sectional study was undertaken in rural area of Haryana to know the utilization of JSSK scheme and OOP expenditure. A total of 200 delivered mothers were included as study subjects. The study was conducted from July 20113 to September 2014. Results: Out of 200, 134 subjects delivered in government institutions and hence were eligible for benefits of JSSK scheme. Twenty nine percent of deliveries occurred in private facilities and 17% newborns were sick within 30 days of birth. OOP expenditure was done by 83.5% subjects with median amount Rs. 1100. Most common suggestions given by subjects were the availability of ultrasound facility, cooperative staff and crowd management in hospitals. Conclusion: For reducing OOP expenses, up-gradation and constant supervision is required to maintain the adequacy of services. More evaluation studies need to be conducted to know the utilization pattern of JSSK so as to improve the coverage and removing the bottlenecks to further increase the utilization of JSSK scheme.

  6. Comparison of three ice cloud optical schemes in climate simulations with community atmospheric model version 5

    Science.gov (United States)

    Zhao, Wenjie; Peng, Yiran; Wang, Bin; Yi, Bingqi; Lin, Yanluan; Li, Jiangnan

    2018-05-01

    A newly implemented Baum-Yang scheme for simulating ice cloud optical properties is compared with existing schemes (Mitchell and Fu schemes) in a standalone radiative transfer model and in the global climate model (GCM) Community Atmospheric Model Version 5 (CAM5). This study systematically analyzes the effect of different ice cloud optical schemes on global radiation and climate by a series of simulations with a simplified standalone radiative transfer model, atmospheric GCM CAM5, and a comprehensive coupled climate model. Results from the standalone radiative model show that Baum-Yang scheme yields generally weaker effects of ice cloud on temperature profiles both in shortwave and longwave spectrum. CAM5 simulations indicate that Baum-Yang scheme in place of Mitchell/Fu scheme tends to cool the upper atmosphere and strengthen the thermodynamic instability in low- and mid-latitudes, which could intensify the Hadley circulation and dehydrate the subtropics. When CAM5 is coupled with a slab ocean model to include simplified air-sea interaction, reduced downward longwave flux to surface in Baum-Yang scheme mitigates ice-albedo feedback in the Arctic as well as water vapor and cloud feedbacks in low- and mid-latitudes, resulting in an overall temperature decrease by 3.0/1.4 °C globally compared with Mitchell/Fu schemes. Radiative effect and climate feedback of the three ice cloud optical schemes documented in this study can be referred for future improvements on ice cloud simulation in CAM5.

  7. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  8. Sensitivity experiments of a regional climate model to the different convective schemes over Central Africa

    Science.gov (United States)

    Armand J, K. M.

    2017-12-01

    In this study, version 4 of the regional climate model (RegCM4) is used to perform 6 years simulation including one year for spin-up (from January 2001 to December 2006) over Central Africa using four convective schemes: The Emmanuel scheme (MIT), the Grell scheme with Arakawa-Schulbert closure assumption (GAS), the Grell scheme with Fritsch-Chappell closure assumption (GFC) and the Anthes-Kuo scheme (Kuo). We have investigated the ability of the model to simulate precipitation, surface temperature, wind and aerosols optical depth. Emphasis in the model results were made in December-January-February (DJF) and July-August-September (JAS) periods. Two subregions have been identified for more specific analysis namely: zone 1 which corresponds to the sahel region mainly classified as desert and steppe and zone 2 which is a region spanning the tropical rain forest and is characterised by a bimodal rain regime. We found that regardless of periods or simulated parameters, MIT scheme generally has a tendency to overestimate. The GAS scheme is more suitable in simulating the aforementioned parameters, as well as the diurnal cycle of precipitations everywhere over the study domain irrespective of the season. In JAS, model results are similar in the representation of regional wind circulation. Apart from the MIT scheme, all the convective schemes give the same trends in aerosols optical depth simulations. Additional experiment reveals that the use of BATS instead of Zeng scheme to calculate ocean flux appears to improve the quality of the model simulations.

  9. GEOSS: Addressing Big Data Challenges

    Science.gov (United States)

    Nativi, S.; Craglia, M.; Ochiai, O.

    2014-12-01

    In the sector of Earth Observation, the explosion of data is due to many factors including: new satellite constellations, the increased capabilities of sensor technologies, social media, crowdsourcing, and the need for multidisciplinary and collaborative research to face Global Changes. In this area, there are many expectations and concerns about Big Data. Vendors have attempted to use this term for their commercial purposes. It is necessary to understand whether Big Data is a radical shift or an incremental change for the existing digital infrastructures. This presentation tries to explore and discuss the impact of Big Data challenges and new capabilities on the Global Earth Observation System of Systems (GEOSS) and particularly on its common digital infrastructure called GCI. GEOSS is a global and flexible network of content providers allowing decision makers to access an extraordinary range of data and information at their desk. The impact of the Big Data dimensionalities (commonly known as 'V' axes: volume, variety, velocity, veracity, visualization) on GEOSS is discussed. The main solutions and experimentation developed by GEOSS along these axes are introduced and analyzed. GEOSS is a pioneering framework for global and multidisciplinary data sharing in the Earth Observation realm; its experience on Big Data is valuable for the many lessons learned.

  10. Quantitative tools for addressing hospital readmissions

    Directory of Open Access Journals (Sweden)

    Lagoe Ronald J

    2012-11-01

    Full Text Available Abstract Background Increased interest in health care cost containment is focusing attention on reduction of hospital readmissions. Major payors have already developed financial penalties for providers that generate excess readmissions. This subject has benefitted from the development of resources such as the Potentially Preventable Readmissions software. This process has encouraged hospitals to renew efforts to improve these outcomes. The aim of this study was to describe quantitative tools such as definitions, risk estimation, and tracking of patients for reducing hospital readmissions. Findings This study employed the Potentially Preventable Readmissions software to develop quantitative tools for addressing hospital readmissions. These tools included two definitions of readmissions that support identification and management of patients. They also included analytical approaches for estimation of the risk of readmission for individual patients by age, discharge status of the initial admission, and severity of illness. They also included patient specific spreadsheets for tracking of target populations and for evaluation of the impact of interventions. Conclusions The study demonstrated that quantitative tools including the development of definitions of readmissions, estimation of the risk of readmission, and patient specific spreadsheets could contribute to the improvement of patient outcomes in hospitals.

  11. Analysis of Paper reduction schemes to develop selection criteria for ofdm signals

    International Nuclear Information System (INIS)

    Abro, F.R.

    2015-01-01

    This paper presents a review of different PAPR (Peak to Average Power Ratio) reduction schemes of OFDM (Orthogonal Frequency Division Multiplexing) signals. The schemes that have been considered include Clipping and Filtering, Coding, ACE (Active Contstellation Extension), SLM (Selected Mapping), PTS (Partial Transmit Sequence), TI (Tone Injection) and TR (Tone Reservation). A comparative analysis has been carried out qualitatively. It has been demonstrated how these schemes can be combined with MIMO (Multiple Input Multiple Output) technologies. Finally, criteria for selection of PAPR reduction schemes of OFDM systems are discussed. (author)

  12. A perturbational h4 exponential finite difference scheme for the convective diffusion equation

    International Nuclear Information System (INIS)

    Chen, G.Q.; Gao, Z.; Yang, Z.F.

    1993-01-01

    A perturbational h 4 compact exponential finite difference scheme with diagonally dominant coefficient matrix and upwind effect is developed for the convective diffusion equation. Perturbations of second order are exerted on the convective coefficients and source term of an h 2 exponential finite difference scheme proposed in this paper based on a transformation to eliminate the upwind effect of the convective diffusion equation. Four numerical examples including one- to three-dimensional model equations of fluid flow and a problem of natural convective heat transfer are given to illustrate the excellent behavior of the present exponential schemes. Besides, the h 4 accuracy of the perturbational scheme is verified using double precision arithmetic

  13. Universal block diagram based modeling and simulation schemes for fractional-order control systems.

    Science.gov (United States)

    Bai, Lu; Xue, Dingyü

    2017-05-08

    Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  15. On usage of CABARET scheme for tracer transport in INM ocean model

    International Nuclear Information System (INIS)

    Diansky, Nikolay; Kostrykin, Sergey; Gusev, Anatoly; Salnikov, Nikolay

    2010-01-01

    The contemporary state of ocean numerical modelling sets some requirements for the numerical advection schemes used in ocean general circulation models (OGCMs). The most important requirements are conservation, monotonicity and numerical efficiency including good parallelization properties. Investigation of some advection schemes shows that one of the best schemes satisfying the criteria is CABARET scheme. 3D-modification of the CABARET scheme was used to develop a new transport module (for temperature and salinity) for the Institute of Numerical Mathematics ocean model (INMOM). Testing of this module on some common benchmarks shows a high accuracy in comparison with the second-order advection scheme used in the INMOM. This new module was incorporated in the INMOM and experiments with the modified model showed a better simulation of oceanic circulation than its previous version.

  16. Understanding the types of fraud in claims to South African medical schemes.

    Science.gov (United States)

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  17. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  18. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  19. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  20. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  1. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  2. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  3. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  4. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  5. Keynote Address from V. Sucha

    International Nuclear Information System (INIS)

    Sucha, V.; )

    2015-01-01

    1. Nuclear Energy in Europe: In the EU, the whole nuclear fuel cycle is fully monitored, from uranium enrichment, to fuel production, power reactors, including the two largest plants for reprocessing of spent fuel in the world and final disposal: It goes without saying that the European Union sees nuclear safety, security and safeguards as one of its utmost priorities. 2. Euratom Nuclear safeguards system: The Euratom treaty introduced a strict system of safeguards throughout the EU to ensure that nuclear materials are used only for declared, peaceful purposes; The European Commission's Safeguards Service-better known internationally as Euratom - is a global and quite unique safeguards actor with exceptional enforcement powers; Inspections in the Non-Nuclear Weapon States and in certain installations in the two Nuclear Weapon States of the EU, France and the UK, are carried out jointly by Euratom and IAEA inspectors. More generally, Euratom and IAEA safeguards activities complement each other, which requires close cooperation. In 2013, 1300 inspections took place in the EU in accordance with the Comprehensive Safeguards Agreement in place for the Non-Nuclear Weapon States of the EU and the voluntary Safeguards Agreements for UK and France; In this regard, it is important to mention that Euratom has historically supported all measures aimed to strengthen the effectiveness and efficiency of the Agency's safeguards system, and currently this is the case with the IAEA's State-Level Concept. State-level Approaches are being used by the IAEA for a couple of years for all non-nuclear weapon EU member states; these should now be further developed by putting more emphasis on utilizing the unique features of the Euratom regional system of safeguards. 3. EU current support to IAEA in the field of nuclear safeguards: The obligations for the European Commission to safeguard a large variety of nuclear facilities, which are becoming ever more sophisticated

  6. Experimental Study on Intelligent Control Scheme for Fan Coil Air-Conditioning System

    Directory of Open Access Journals (Sweden)

    Yanfeng Li

    2013-01-01

    Full Text Available An intelligent control scheme for fan coil air-conditioning systems has been put forward in order to overcome the shortcomings of the traditional proportion-integral-derivative (PID control scheme. These shortcomings include the inability of anti-interference and large inertia. An intelligent control test rig of fan coil air-conditioning system has been built, and MATLAB/Simulink dynamics simulation software has been adopted to implement the intelligent control scheme. A software for data exchange has been developed to combine the intelligence control system and the building automation (BA system. Experimental tests have been conducted to investigate the effectiveness of different control schemes including the traditional PID control, fuzzy control, and fuzzy-PID control for fan coil air-conditioning system. The effects of control schemes have been compared and analyzed in robustness, static and dynamic character, and economy. The results have shown that the developed data exchange interface software can induce the intelligent control scheme of the BA system more effectively. Among the proposed control strategies, fuzzy-PID control scheme which has the advantages of both traditional PID and fuzzy schemes is the optimal control scheme for the fan coil air-conditioning system.

  7. Selected international efforts to address climate change

    Energy Technology Data Exchange (ETDEWEB)

    Seki, M.; Christ, R. [Atmosphere Unit, United Nations Environment Programme UNEP, Nairobi (Kenya)

    1995-12-31

    Over the past two decades, concern about human-induced climate change has become an increasingly important item on the environmental and political agenda. The signing of the United Nations Framework Convention on Climate Change and the adoption of Agenda 21 at the United Nations Conference on Environment and Development in Rio de Janeiro in 1992 provided international organizations and the nations of the world with a new focus for climate-related activities. Although there remains considerable scientific uncertainty about the extent, magnitude, and rate of climate change and the impacts of such change, actions to address climate change have been initiated both internationally and nationally. Major international activities include the World Climate Programme, the Intergovernmental Panel on Climate Change, the United Nations Framework Convention on Climate Change. and the United Nations Environment Program me. 16 refs.

  8. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  9. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  10. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  11. Upwind differencing scheme for the equations of ideal magnetohydrodynamics

    International Nuclear Information System (INIS)

    Brio, M.; Wu, C.C.

    1988-01-01

    Recently, upwind differencing schemes have become very popular for solving hyperbolic partial differential equations, especially when discontinuities exist in the solutions. Among many upwind schemes successfully applied to the problems in gas dynamics, Roe's method stands out for its relative simplicity and clarity of the underlying physical model. In this paper, an upwind differencing scheme of Roe-type for the MHD equations is constructed. In each computational cell, the problem is first linearized around some averaged state which preserves the flux differences. Then the solution is advanced in time by computing the wave contributions to the flux at the cell interfaces. One crucial task of the linearization procedure is the construction of a Roe matrix. For the special case γ = 2, a Roe matrix in the form of a mean value Jacobian is found, and for the general case, a simple averaging procedure is introduced. All other necessary ingredients of the construction, which include eigenvalues, and a complete set of right eigenvectors of the Roe matrix and decomposition coefficients are presented. As a numerical example, we chose a coplanar MHD Riemann problem. The problem is solved by the newly constructed second-order upwind scheme as well as by the Lax-Friedrichs, the Lax-Wendroff, and the flux-corrected transport schemes. The results demonstrate several advantages of the upwind scheme. In this paper, we also show that the MHD equations are nonconvex. This is a contrast to the general belief that the fast and slow waves are like sound waves in the Euler equations. As a consequence, the wave structure becomes more complicated; for example, compound waves consisting of a shock and attached to it a rarefaction wave of the same family can exist in MHD. copyright 1988 Academic Press, Inc

  12. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  13. 33 CFR 135.9 - Fund address.

    Science.gov (United States)

    2010-07-01

    ... FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.9 Fund address. The address to which correspondence relating to the Coast Guard's administration of the Fund... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Fund address. 135.9 Section 135.9...

  14. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  15. Galilean invariant lattice Boltzmann scheme for natural convection on square and rectangular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In this paper we present lattice Boltzmann (LB) schemes for convection diffusion coupled to fluid flow on two-dimensional rectangular lattices. Via inverse Chapman-Enskog analysis of LB schemes including source terms, we show that for consistency with physics it is required that the moments of the

  16. Analysis of the F. Calogero Type Projection-Algebraic Scheme for Differential Operator Equations

    International Nuclear Information System (INIS)

    Lustyk, Miroslaw; Bogolubov, Nikolai N. Jr.; Blackmore, Denis; Prykarpatsky, Anatoliy K.

    2010-12-01

    The existence, convergence, realizability and stability of solutions of differential operator equations obtained via a novel projection-algebraic scheme are analyzed in detail. This analysis is based upon classical discrete approximation techniques coupled with a recent generalization of the Leray-Schauder fixed point theorem. An example is included to illustrate the efficacy of the projection scheme and analysis strategy. (author)

  17. Management initiatives in a community-based health insurance scheme.

    Science.gov (United States)

    Sinha, Tara; Ranson, M Kent; Chatterjee, Mirai; Mills, Anne

    2007-01-01

    Community-based health insurance (CBHI) schemes have developed in response to inadequacies of alternate systems for protecting the poor against health care expenditures. Some of these schemes have arisen within community-based organizations (CBOs), which have strong links with poor communities, and are therefore well situated to offer CBHI. However, the managerial capacities of many such CBOs are limited. This paper describes management initiatives undertaken in a CBHI scheme in India, in the course of an action-research project. The existing structures and systems at the CBHI had several strengths, but fell short on some counts, which became apparent in the course of planning for two interventions under the research project. Management initiatives were introduced that addressed four features of the CBHI, viz. human resources, organizational structure, implementation systems, and data management. Trained personnel were hired and given clear roles and responsibilities. Lines of reporting and accountability were spelt out, and supportive supervision was provided to team members. The data resources of the organization were strengthened for greater utilization of this information. While the changes that were introduced took some time to be accepted by team members, the commitment of the CBHI's leadership to these initiatives was critical to their success. Copyright (c) 2007 John Wiley & Sons, Ltd.

  18. The Best Laid Plans: Access to the Rajiv Aarogyasri community health insurance scheme of Andhra Pradesh

    Directory of Open Access Journals (Sweden)

    H. Narasimhan

    2014-05-01

    Full Text Available This paper is a qualitative assessment of a public health insurance scheme in the state of Andhra Pradesh, south India, called the Rajiv Aarogyasri Community Health Insurance Scheme (or Aarogyasri, using the case-study method. Focusing on inpatient hospital care and especially on surgical treatments leaves the scheme wanting in meeting the health care needs of and addressing the impoverishing health expenditure incurred by the poor, especially those living in rural areas. Though well-intentioned, people from vulnerable sections of society may find the scheme ultimately unhelpful for their needs. Through an in-depth qualitative approach, the paper highlights not just financial difficulties but also the non-financial barriers to accessing health care, despite the existence of a scheme such as Aarogyasri. Narrative evidence from poor households offers powerful insights into why even the most innovative state health insurance schemes may not achieve their goals and systemic corrections needed to address barriers to health care.

  19. Addressing submarine geohazards through scientific drilling

    Science.gov (United States)

    Camerlenghi, A.

    2009-04-01

    Natural submarine geohazards (earthquakes, volcanic eruptions, landslides, volcanic island flank collapses) are geological phenomena originating at or below the seafloor leading to a situation of risk for off-shore and on-shore structures and the coastal population. Addressing submarine geohazards means understanding their spatial and temporal variability, the pre-conditioning factors, their triggers, and the physical processes that control their evolution. Such scientific endeavour is nowadays considered by a large sector of the international scientific community as an obligation in order to contribute to the mitigation of the potentially destructive societal effects of submarine geohazards. The study of submarine geohazards requires a multi-disciplinary scientific approach: geohazards must be studied through their geological record; active processes must be monitored; geohazard evolution must be modelled. Ultimately, the information must be used for the assessment of vulnerability, risk analysis, and development of mitigation strategies. In contrast with the terrestrial environment, the oceanic environment is rather hostile to widespread and fast application of high-resolution remote sensing techniques, accessibility for visual inspection, sampling and installation of monitoring stations. Scientific Drilling through the IODP (including the related pre site-survey investigations, sampling, logging and in situ measurements capability, and as a platform for deployment of long term observatories at the surface and down-hole) can be viewed as the centre of gravity of an international, coordinated, multi-disciplinary scientific approach to address submarine geohazards. The IODP Initial Science Plan expiring in 2013 does not address openly geohazards among the program scientific objectives. Hazards are referred to mainly in relation to earthquakes and initiatives towards the understanding of seismogenesis. Notably, the only drilling initiative presently under way is the

  20. The implications of Australia's carbon pollution reduction scheme for its National Electricity Market

    International Nuclear Information System (INIS)

    Betz, Regina; Owen, Anthony D.

    2010-01-01

    This paper assesses the major implications for the National Electricity Market of the introduction of a domestic cap-and-trade carbon pollution reduction scheme in Australia. The electricity sector is the largest source of emissions in the Australian economy, and it is this sector, therefore, that will bear the brunt of the impact of the proposed scheme. The paper addresses core issues for the electricity market up to 2020 operating under the scheme. It focuses specifically on its impact on electricity prices and generation technology mix. These two variables have been assessed using a number of models, each applying different assumptions about key impact factors. In this paper we present a comparative summary of the results of the three highest-profile models and compare their assumptions in order to explain differences in projected outcomes. This comparison will give an indication of the likely range of impacts on the market of the current design of the scheme. (author)

  1. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  2. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  3. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  4. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  5. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  6. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  7. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  8. The MEMOLED: Active addressing with passive driving

    NARCIS (Netherlands)

    Asadi, K.; Blom, P.W.M.; Leeuw, D.M. de

    2011-01-01

    Passive or active matrix driving schemes in large displays are prone to high power consumption and cost, respectively. For signage applications such as large out-door displays with low refresh rates there is as yet no technological solution. Here the MEMOLED solution, an organic light-emitting diode

  9. The MEMOLED : Active Addressing with Passive Driving

    NARCIS (Netherlands)

    Asadi, Kamal; Blom, Paul W. M.; de Leeuw, Dago M.

    2011-01-01

    Passive or active matrix driving schemes in large displays are prone to high power consumption and cost, respectively. For signage applications such as large outdoor displays with low refresh rates there is as yet no technological solution. Here the MEMOLED solution, an organic light-emitting diode

  10. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  11. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  12. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  13. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  14. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  15. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  16. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  17. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  18. Construction of Low Dissipative High Order Well-Balanced Filter Schemes for Non-Equilibrium Flows

    Science.gov (United States)

    Wang, Wei; Yee, H. C.; Sjogreen, Bjorn; Magin, Thierry; Shu, Chi-Wang

    2009-01-01

    The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. [26] to a class of low dissipative high order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. The class of filter schemes developed by Yee et al. [30], Sjoegreen & Yee [24] and Yee & Sjoegreen [35] consist of two steps, a full time step of spatially high order non-dissipative base scheme and an adaptive nonlinear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e., choosing a well-balanced base scheme with a well-balanced filter (both with high order). A typical class of these schemes shown in this paper is the high order central difference schemes/predictor-corrector (PC) schemes with a high order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady state solutions exactly; it is able to capture small perturbations, e.g., turbulence fluctuations; it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.

  19. A decision-support scheme for mapping endangered areas in pest risk analysis

    NARCIS (Netherlands)

    Baker, R.H.A.; Benninga, J.; Bremmer, J.; Brunel, S.; Dupin, M.; Eyre, D.; Ilieva, Z.; Jarosik, V.; Kehlenbeck, H.; Kriticos, D.J.; Makowski, D.; Pergl, J.; Reynaud, P.; Robinet, C.; Soliman, T.; Werf, van der W.; Worner, S.

    2012-01-01

    This paper describes a decision-support scheme (DSS) for mapping the area where economically important loss is likely to occur (the endangered area). It has been designed by the PRATIQUE project to help pest risk analysts address the numerous risk mapping challenges and decide on the most suitable

  20. Global mechanisms for sustaining and enhancing PES schemes

    International Nuclear Information System (INIS)

    Farley, Josh; Moulaert, Azur; Lee, Dan; Krause, Abby; Aquino, Andre; Daniels, Amy

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to entice countries to conserve natural capital in order to sustain critical non-marketed ecosystem services. We examine the biophysical characteristics of climate change and biodiversity to understand the obstacles to developing effective IPES schemes. We find that none of the existing schemes for providing GES are adequate, given the scale of the problem. A cap and auction scheme for CO 2 emissions among wealthy nations could fund IPES and simultaneously deter carbon emissions. To disburse funds, we should adapt Brazil's ICMS ecologico, and apportion available funds to targeted countries in proportion to how well they meet specific criteria designed to measure the provision of GES. Individual countries can then develop their own policies for increasing provision of these services, ensured of compensation if they do so. Indirect IPES should include funding for freely available technologies that protect or provide GES, such as the low carbon energy alternatives that will be essential for curbing climate change. Markets rely on the price mechanism to generate profits, which rations technology to those who can afford it, reducing adoption rates, innovation and total value. (author)

  1. Static and dynamic efficiency of white certificate schemes

    International Nuclear Information System (INIS)

    Giraudet, L.G.; Finon, D.

    2011-01-01

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  2. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  3. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  4. [Occlusal schemes of complete dentures--a review of the literature].

    Science.gov (United States)

    Tarazi, E; Ticotsky-Zadok, N

    2007-01-01

    movements). Linear occlusion scheme occludes cuspless teeth with anatomic teeth that have been modified (bladed teeth) in order to achieve linear occlusal contacts. Linear contacts are the pin-point contacts of the tips of the cusps of the bladed teeth against cuspless teeth that create a plane. The specific design of positioning upper modified teeth on the upper denture and non anatomic teeth on the lower one is called lingualized occlusion. It is characterized by contacts of only the lingual (palatinal, to be more accurate) cusps of the upper teeth with the lower teeth. The lingualized occlusal scheme provides better aesthetics than the monoplane occlusion scheme, and better stability (in the case of resorbed residual ridges) than bilateral occlusion scheme of anatomic teeth. The results of studies that compared different occlusal schemes may well be summarized as inconclusive. However, it does seem that patients preferred anatomic or semi-anatomic (modified) teeth, and that chewing efficiency with anatomic and modified teeth was better than with non anatomic teeth. Similar results were found in studies of occlusal schemes of implant-supported lower dentures opposed by complete upper dentures. There isn't one occlusal scheme that fits all patients in need of complete dentures, in fact, in many cases more than one occlusal scheme might be adequate. Selection of an occlusal scheme for a patient should include correlation of the characteristics of the patient with those of the various occlusal schemes. The characteristics of the patient include: height and width of the residual ridge, aesthetic demands of the patient, skeletal relations (class I/II/III), neuromuscular control, and tendency for para-functional activity. The multiple characteristics of the occlusal schemes were reviewed in this article. Considering all of those factors in relation to a specific patient, the dentist should be able to decide on the most suitable occlusal scheme for the case.

  5. Evaluating radiative transfer schemes treatment of vegetation canopy architecture in land surface models

    Science.gov (United States)

    Braghiere, Renato; Quaife, Tristan; Black, Emily

    2016-04-01

    Incoming shortwave radiation is the primary source of energy driving the majority of the Earth's climate system. The partitioning of shortwave radiation by vegetation into absorbed, reflected, and transmitted terms is important for most of biogeophysical processes, including leaf temperature changes and photosynthesis, and it is currently calculated by most of land surface schemes (LSS) of climate and/or numerical weather prediction models. The most commonly used radiative transfer scheme in LSS is the two-stream approximation, however it does not explicitly account for vegetation architectural effects on shortwave radiation partitioning. Detailed three-dimensional (3D) canopy radiative transfer schemes have been developed, but they are too computationally expensive to address large-scale related studies over long time periods. Using a straightforward one-dimensional (1D) parameterisation proposed by Pinty et al. (2006), we modified a two-stream radiative transfer scheme by including a simple function of Sun zenith angle, so-called "structure factor", which does not require an explicit description and understanding of the complex phenomena arising from the presence of vegetation heterogeneous architecture, and it guarantees accurate simulations of the radiative balance consistently with 3D representations. In order to evaluate the ability of the proposed parameterisation in accurately represent the radiative balance of more complex 3D schemes, a comparison between the modified two-stream approximation with the "structure factor" parameterisation and state-of-art 3D radiative transfer schemes was conducted, following a set of virtual scenarios described in the RAMI4PILPS experiment. These experiments have been evaluating the radiative balance of several models under perfectly controlled conditions in order to eliminate uncertainties arising from an incomplete or erroneous knowledge of the structural, spectral and illumination related canopy characteristics typical

  6. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  7. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  8. Betatron tune correction schemes in nuclotron

    International Nuclear Information System (INIS)

    Shchepunov, V.A.

    1992-01-01

    Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab

  9. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  10. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  11. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  12. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  13. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  14. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  15. Organization of Control Units with Operational Addressing

    OpenAIRE

    Alexander A. Barkalov; Roman M. Babakov; Larysa A. Titarenko

    2012-01-01

    The using of operational addressing unit as the block of control unit is proposed. The new structure model of Moore finite-state machine with reduced hardware amount is developed. The generalized structure of operational addressing unit is suggested. An example of synthesis process for Moore finite-state machine with operational addressing unit is given. The analytical researches of proposed structure of control unit are executed.

  16. A factorial assessment of the sensitivity of the BATS land-surface parameterization scheme. [BATS (Biosphere-Atmosphere Transfer Scheme)

    Energy Technology Data Exchange (ETDEWEB)

    Henderson-Sellers, A. (Macquarie Univ., North Ryde, New South Wales (Australia))

    1993-02-01

    Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.

  17. BJPsych Bulletin author mentoring scheme - helping trainees become published authors.

    Science.gov (United States)

    Pimm, Jonathan; Galbraith, Niall

    2016-02-01

    The publishing world is changing rapidly. Innovations include the move to open access, the rise of social media and the transition to digitalisation. In the light of these developments and with ever-increasing pressures on early career psychiatrists and trainees to publish papers in journals with a recognised pedigree, the BJPsych Bulletin is piloting an author mentoring scheme. Mentors will help clinicians and aspiring academics develop articles from a pedestrian manuscript to one that will hopefully provoke important debate and aid changes in current practices. The scheme will run on a trial basis for approximately 12 months and will then be reviewed. Mentoring has been found to have an important effect of research output including publication and grant success; the hope is that this new initiative at the BJPsych Bulletin will result in such dividends to all involved.

  18. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  19. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  20. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  1. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  2. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  3. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  4. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  5. Need for Modifying Modeling Scheme

    Indian Academy of Sciences (India)

    First page Back Continue Last page Graphics. Source and Drain depletion widths are to be accounted. Source and Drain depletion widths are to be accounted. Poisson equation is to be solved in source, drain, pocket, channel under cavity and channel under gate. The effect of Vgs on depletion width to be included ...

  6. Camouflage, Color Schemes, and Cubism.

    Science.gov (United States)

    Guhin, Paula

    2002-01-01

    Presents an art activity where students learn about Cubism and color mixing. Explains that the students create camouflaged animals after learning about the work, "Female Torso" (Pablo Picasso). Includes directions for how to create the pictures and states that the assignment can be used with students of all ages. (CMK)

  7. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  8. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  9. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  10. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  11. Constructing space difference schemes which satisfy a cell entropy inequality

    Science.gov (United States)

    Merriam, Marshal L.

    1989-01-01

    A numerical methodology for solving convection problems is presented, using finite difference schemes which satisfy the second law of thermodynamics on a cell-by-cell basis in addition to the usual conservation laws. It is shown that satisfaction of a cell entropy inequality is sufficient, in some cases, to guarantee nonlinear stability. Some details are given for several one-dimensional problems, including the quasi-one-dimensional Euler equations applied to flow in a nozzle.

  12. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-01

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  13. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-07

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  14. The Impact of Microphysical Schemes on Hurricane Intensity and Track

    Science.gov (United States)

    Tao, Wei-Kuo; Shi, Jainn Jong; Chen, Shuyi S.; Lang, Stephen; Lin, Pay-Liam; Hong, Song-You; Peters-Lidard, Christa; Hou, Arthur

    2011-01-01

    During the past decade, both research and operational numerical weather prediction models [e.g. the Weather Research and Forecasting Model (WRF)] have started using more complex microphysical schemes originally developed for high-resolution cloud resolving models (CRMs) with 1-2 km or less horizontal resolutions. WRF is a next-generation meso-scale forecast model and assimilation system. It incorporates a modern software framework, advanced dynamics, numerics and data assimilation techniques, a multiple moveable nesting capability, and improved physical packages. WRF can be used for a wide range of applications, from idealized research to operational forecasting, with an emphasis on horizontal grid sizes in the range of 1-10 km. The current WRF includes several different microphysics options. At NASA Goddard, four different cloud microphysics options have been implemented into WRF. The performance of these schemes is compared to those of the other microphysics schemes available in WRF for an Atlantic hurricane case (Katrina). In addition, a brief review of previous modeling studies on the impact of microphysics schemes and processes on the intensity and track of hurricanes is presented and compared against the current Katrina study. In general, all of the studies show that microphysics schemes do not have a major impact on track forecasts but do have more of an effect on the simulated intensity. Also, nearly all of the previous studies found that simulated hurricanes had the strongest deepening or intensification when using only warm rain physics. This is because all of the simulated precipitating hydrometeors are large raindrops that quickly fall out near the eye-wall region, which would hydrostatically produce the lowest pressure. In addition, these studies suggested that intensities become unrealistically strong when evaporative cooling from cloud droplets and melting from ice particles are removed as this results in much weaker downdrafts in the simulated

  15. Including social impacts in LCIA

    DEFF Research Database (Denmark)

    Dreyer, Louise Camilla; Hauschild, Michael Zwicky; Schierbeck, Jens

    2004-01-01

    Sustainability management in industries is often defined by measuring the performance against the trippel bottom-line, People, Planet and Profit in business decisions. The product chain perspective inherent in LCA is very suitable for sustainability management but LCA methodology only considers...... activities in the product life cycle. Workersø fundamental rights, as defined by the ILO, are used as baseline in the method, and as a consequence, some of the issues addressed by the method are: child labour, discrimination, right to organise, and forced labour....

  16. Perfect pattern formation of neutral atoms in an addressable optical lattice

    International Nuclear Information System (INIS)

    Vala, J.; Whaley, K.B.; Thapliyal, A.V.; Vazirani, U.; Myrgren, S.; Weiss, D.S.

    2005-01-01

    We propose a physical scheme for formation of an arbitrary pattern of neutral atoms in an addressable optical lattice. We focus specifically on the generation of a perfect optical lattice of simple orthorhombic structure with unit occupancy, as required for initialization of a neutral atom quantum computer. The scheme employs a compacting process that is accomplished by sequential application of two types of operations: a flip operator that changes the internal state of the atoms, and a shift operator that selectively moves the atoms in one internal state along the lattice principal axis. Realizations of these elementary operations and their physical limitations are analyzed. The complexity of the compacting scheme is analyzed and we show that this scales linearly with the number of lattice sites per row of the lattice

  17. A New Method of Chinese Address Extraction Based on Address Tree Model

    Directory of Open Access Journals (Sweden)

    KANG Mengjun

    2015-01-01

    Full Text Available Address is a spatial location encoding method of individual geographical area. In China, address planning is relatively backward due to the rapid development of the city, resulting in the presence of large number of non-standard address. The space constrain relationship of standard address model is analyzed in this paper and a new method of standard address extraction based on the tree model is proposed, which regards topological relationship as consistent criteria of space constraints. With this method, standard address can be extracted and errors can be excluded from non-standard address. Results indicate that higher math rate can be obtained with this method.

  18. Forms of Address in Chilean Spanish

    Science.gov (United States)

    Bishop, Kelley; Michnowicz, Jim

    2010-01-01

    The present investigation examines possible social and linguistic factors that influence forms of address used in Chilean Spanish with various interlocutors. A characteristic of the Spanish of Chile is the use of a variety of forms of address for the second person singular, "tu", "vos", and "usted", with corresponding…

  19. 29 CFR 4245.7 - PBGC address.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false PBGC address. 4245.7 Section 4245.7 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION INSOLVENCY, REORGANIZATION, TERMINATION, AND OTHER RULES APPLICABLE TO MULTIEMPLOYER PLANS NOTICE OF INSOLVENCY § 4245.7 PBGC address. See...

  20. Quantitative schemes in energy dispersive X-ray fluorescence implemented in AXIL

    International Nuclear Information System (INIS)

    Tchantchane, A.; Benamar, M.A.; Tobbeche, S.

    1995-01-01

    E.D.X.R.F (Energy Dispersive X-ray Fluorescence) has long been used for quantitative analysis of many types of samples including environment samples. the software package AXIL (Analysis of x-ray spectra by iterative least quares) is extensively used for the spectra analysis and the quantification of x-ray spectra. It includes several methods of quantitative schemes for evaluating element concentrations. We present the general theory behind each scheme implemented into the software package. The spectra of the performance of each of these quantitative schemes. We have also investigated their performance relative to the uncertainties in the experimental parameters and sample description

  1. Addressing Underrepresentation: Physics Teaching for All

    Science.gov (United States)

    Rifkin, Moses

    2016-02-01

    Every physics teacher wants to give his or her students the opportunity to learn physics well. Despite these intentions, certain groups of students—including women and underrepresented minorities (URMs)—are not taking and not remaining in physics. In many cases, these disturbing trends are more significant in physics than in any other science. This is a missed opportunity for our discipline because demographic diversity strengthens science. The question is what we can do about these trends in our classrooms, as very few physics teachers have been explicitly prepared to address them. In this article, I will share some steps that I've taken in my classroom that have moved my class in the right direction. In the words of Nobel Prize-winning physicist Carl Wieman and psychologists Lauren Aguilar and Gregory Walton: "By investing a small amount of class time in carefully designed and implemented interventions, physics teachers can promote greater success among students from diverse backgrounds. Ultimately, we hope such efforts will indeed improve the diversity and health of the physics profession."

  2. External Quality Assessment Scheme for Biological Monitoring of Occupational Exposure to Toxic Chemicals

    Directory of Open Access Journals (Sweden)

    Mi-Young Lee

    2011-09-01

    Conclusion: The EQAS has taken a primary role in improving the reliability of analytical data. A total quality assurance scheme is suggested, including the validation of technical documentation for the whole analytical procedure.

  3. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  4. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  5. DDT and Malaria Prevention: Addressing the Paradox

    Science.gov (United States)

    Bouwman, Hindrik; van den Berg, Henk; Kylin, Henrik

    2011-01-01

    Background The debate regarding dichlorodiphenyltrichloroethane (DDT) in malaria prevention and human health is polarized and can be classified into three positions: anti-DDT, centrist-DDT, pro-DDT. Objective We attempted to arrive at a synthesis by matching a series of questions on the use of DDT for indoor residual spraying (IRS) with literature and insights, and to identify options and opportunities. Discussion Overall, community health is significantly improved through all available malaria control measures, which include IRS with DDT. Is DDT “good”? Yes, because it has saved many lives. Is DDT safe as used in IRS? Recent publications have increasingly raised concerns about the health implications of DDT. Therefore, an unqualified statement that DDT used in IRS is safe is untenable. Are inhabitants and applicators exposed? Yes, and to high levels. Should DDT be used? The fact that DDT is “good” because it saves lives, and “not safe” because it has health and environmental consequences, raises ethical issues. The evidence of adverse human health effects due to DDT is mounting. However, under certain circumstances, malaria control using DDT cannot yet be halted. Therefore, the continued use of DDT poses a paradox recognized by a centrist-DDT position. At the very least, it is now time to invoke precaution. Precautionary actions could include use and exposure reduction. Conclusions There are situations where DDT will provide the best achievable health benefit, but maintaining that DDT is safe ignores the cumulative indications of many studies. In such situations, addressing the paradox from a centrist-DDT position and invoking precaution will help design choices for healthier lives. PMID:21245017

  6. Experimental Results of Network-Assisted Interference Suppression Scheme Using Adaptive Beam-Tilt Switching

    Directory of Open Access Journals (Sweden)

    Tomoki Murakami

    2017-01-01

    Full Text Available This paper introduces a network-assisted interference suppression scheme using beam-tilt switching per frame for wireless local area network systems and its effectiveness in an actual indoor environment. In the proposed scheme, two access points simultaneously transmit to their own desired station by adjusting angle of beam-tilt including transmit power assisted from network server for the improvement of system throughput. In the conventional researches, it is widely known that beam-tilt is effective for ICI suppression in the outdoor scenario. However, the indoor effectiveness of beam-tilt for ICI suppression has not yet been indicated from the experimental evaluation. Thus, this paper indicates the effectiveness of the proposed scheme by analyzing multiple-input multiple-output channel matrices from experimental measurements in an office environment. The experimental results clearly show that the proposed scheme offers higher system throughput than the conventional scheme using just transmit power control.

  7. A Non-blind Color Image Watermarking Scheme Resistent Against Geometric Attacks

    Directory of Open Access Journals (Sweden)

    A. Ghafoor

    2012-12-01

    Full Text Available A non-blind color image watermarking scheme using principle component analysis, discrete wavelet transform and singular value decomposition is proposed. The color components are uncorrelated using principle component analysis. The watermark is embedded into the singular values of discrete wavelet transformed sub-band associated with principle component containing most of the color information. The scheme was tested against various attacks (including histogram equalization, rotation, Gaussian noise, scaling, cropping, Y-shearing, X-shearing, median filtering, affine transformation, translation, salt & pepper, sharpening, to check robustness. The results of proposed scheme are compared with state-of-the-art existing color watermarking schemes using normalized correlation coefficient and peak signal to noise ratio. The simulation results show that proposed scheme is robust and imperceptible.

  8. ‘Students-as-partners’ scheme enhances postgraduate students’ employability skills while addressing gaps in bioinformatics education

    Science.gov (United States)

    Mello, Luciane V.; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Abstract Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student–staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators’ teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability. PMID:29098185

  9. "Students-as-Partners" Scheme Enhances Postgraduate Students' Employability Skills While Addressing Gaps in Bioinformatics Education

    Science.gov (United States)

    Mello, Luciane V.; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student-staff partnership and peer-learning. It was centred on the experiences of peer-facilitators,…

  10. MEMS mass-spring-damper systems using an out-of-plane suspension scheme

    KAUST Repository

    Abdel Aziz, Ahmed Kamal Said; Sharaf, Abdel Hameed; Serry, Mohamed Yousef; Sedky, Sherif Salah

    2014-01-01

    MEMS mass-spring-damper systems (including MEMS gyroscopes and accelerometers) using an out-of-plane (or vertical) suspension scheme, wherein the suspensions are normal to the proof mass, are disclosed. Such out-of-plane suspension scheme helps such MEMS mass-spring-damper systems achieve inertial grade performance. Methods of fabricating out-of-plane suspensions in MEMS mass-spring-damper systems (including MEMS gyroscopes and accelerometers) are also disclosed.

  11. MEMS mass-spring-damper systems using an out-of-plane suspension scheme

    KAUST Repository

    Abdel Aziz, Ahmed Kamal Said

    2014-02-04

    MEMS mass-spring-damper systems (including MEMS gyroscopes and accelerometers) using an out-of-plane (or vertical) suspension scheme, wherein the suspensions are normal to the proof mass, are disclosed. Such out-of-plane suspension scheme helps such MEMS mass-spring-damper systems achieve inertial grade performance. Methods of fabricating out-of-plane suspensions in MEMS mass-spring-damper systems (including MEMS gyroscopes and accelerometers) are also disclosed.

  12. Nuclear Reactor Component Code CUPID-I: Numerical Scheme and Preliminary Assessment Results

    International Nuclear Information System (INIS)

    Cho, Hyoung Kyu; Jeong, Jae Jun; Park, Ik Kyu; Kim, Jong Tae; Yoon, Han Young

    2007-12-01

    A component scale thermal hydraulic analysis code, CUPID (Component Unstructured Program for Interfacial Dynamics), is being developed for the analysis of components of a nuclear reactor, such as reactor vessel, steam generator, containment, etc. It adopted three-dimensional, transient, two phase and three-field model. In order to develop the numerical schemes for the three-field model, various numerical schemes have been examined including the SMAC, semi-implicit ICE, SIMPLE, Row Scheme and so on. Among them, the ICE scheme for the three-field model was presented in the present report. The CUPID code is utilizing unstructured mesh for the simulation of complicated geometries of the nuclear reactor components. The conventional ICE scheme that was applied to RELAP5 and COBRA-TF, therefore, were modified for the application to the unstructured mesh. Preliminary calculations for the unstructured semi-implicit ICE scheme have been conducted for a verification of the numerical method from a qualitative point of view. The preliminary calculation results showed that the present numerical scheme is robust and efficient for the prediction of phase changes and flow transitions due to a boiling and a flashing. These calculation results also showed the strong coupling between the pressure and void fraction changes. Thus, it is believed that the semi-implicit ICE scheme can be utilized for transient two-phase flows in a component of a nuclear reactor

  13. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  14. Nuclear Reactor Component Code CUPID-I: Numerical Scheme and Preliminary Assessment Results

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Hyoung Kyu; Jeong, Jae Jun; Park, Ik Kyu; Kim, Jong Tae; Yoon, Han Young

    2007-12-15

    A component scale thermal hydraulic analysis code, CUPID (Component Unstructured Program for Interfacial Dynamics), is being developed for the analysis of components of a nuclear reactor, such as reactor vessel, steam generator, containment, etc. It adopted three-dimensional, transient, two phase and three-field model. In order to develop the numerical schemes for the three-field model, various numerical schemes have been examined including the SMAC, semi-implicit ICE, SIMPLE, Row Scheme and so on. Among them, the ICE scheme for the three-field model was presented in the present report. The CUPID code is utilizing unstructured mesh for the simulation of complicated geometries of the nuclear reactor components. The conventional ICE scheme that was applied to RELAP5 and COBRA-TF, therefore, were modified for the application to the unstructured mesh. Preliminary calculations for the unstructured semi-implicit ICE scheme have been conducted for a verification of the numerical method from a qualitative point of view. The preliminary calculation results showed that the present numerical scheme is robust and efficient for the prediction of phase changes and flow transitions due to a boiling and a flashing. These calculation results also showed the strong coupling between the pressure and void fraction changes. Thus, it is believed that the semi-implicit ICE scheme can be utilized for transient two-phase flows in a component of a nuclear reactor.

  15. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  16. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  17. Linking payment to health outcomes: a taxonomy and examination of performance-based reimbursement schemes between healthcare payers and manufacturers.

    Science.gov (United States)

    Carlson, Josh J; Sullivan, Sean D; Garrison, Louis P; Neumann, Peter J; Veenstra, David L

    2010-08-01

    To identify, categorize and examine performance-based health outcomes reimbursement schemes for medical technology. We performed a review of performance-based health outcomes reimbursement schemes over the past 10 years (7/98-010/09) using publicly available databases, web and grey literature searches, and input from healthcare reimbursement experts. We developed a taxonomy of scheme types by inductively organizing the schemes identified according to the timing, execution, and health outcomes measured in the schemes. Our search yielded 34 coverage with evidence development schemes, 10 conditional treatment continuation schemes, and 14 performance-linked reimbursement schemes. The majority of schemes are in Europe and Australia, with an increasing number in Canada and the U.S. These schemes have the potential to alter the reimbursement and pricing landscape for medical technology, but significant challenges, including high transaction costs and insufficient information systems, may limit their long-term impact. Future studies regarding experiences and outcomes of implemented schemes are necessary. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  18. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  19. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  20. A suggested color scheme for reducing perception-related accidents on construction work sites.

    Science.gov (United States)

    Yi, June-seong; Kim, Yong-woo; Kim, Ki-aeng; Koo, Bonsang

    2012-09-01

    Changes in workforce demographics have led to the need for more sophisticated approaches to addressing the safety requirements of the construction industry. Despite extensive research in other industry domains, the construction industry has been passive in exploring the impact of a color scheme; perception-related accidents have been effectively diminished by its implementation. The research demonstrated that the use of appropriate color schemes could improve the actions and psychology of workers on site, thereby increasing their perceptions of potentially dangerous situations. As a preliminary study, the objects selected by rigorous analysis on accident reports were workwear, safety net, gondola, scaffolding, and safety passage. The colors modified on site for temporary facilities were adopted from existing theoretical and empirical research that suggests the use of certain colors and their combinations to improve visibility and conspicuity while minimizing work fatigue. The color schemes were also tested and confirmed through two workshops with workers and managers currently involved in actual projects. The impacts of color schemes suggested in this paper are summarized as follows. First, the color schemes improve the conspicuity of facilities with other on site components, enabling workers to quickly discern and orient themselves in their work environment. Secondly, the color schemes have been selected to minimize the visual work fatigue and monotony that can potentially increase accidents. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  2. MASHUP SCHEME DESIGN OF MAP TILES USING LIGHTWEIGHT OPEN SOURCE WEBGIS PLATFORM

    Directory of Open Access Journals (Sweden)

    T. Hu

    2018-04-01

    Full Text Available To address the difficulty involved when using existing commercial Geographic Information System platforms to integrate multi-source image data fusion, this research proposes the loading of multi-source local tile data based on CesiumJS and examines the tile data organization mechanisms and spatial reference differences of the CesiumJS platform, as well as various tile data sources, such as Google maps, Map World, and Bing maps. Two types of tile data loading schemes have been designed for the mashup of tiles, the single data source loading scheme and the multi-data source loading scheme. The multi-sources of digital map tiles used in this paper cover two different but mainstream spatial references, the WGS84 coordinate system and the Web Mercator coordinate system. According to the experimental results, the single data source loading scheme and the multi-data source loading scheme with the same spatial coordinate system showed favorable visualization effects; however, the multi-data source loading scheme was prone to lead to tile image deformation when loading multi-source tile data with different spatial references. The resulting method provides a low cost and highly flexible solution for small and medium-scale GIS programs and has a certain potential for practical application values. The problem of deformation during the transition of different spatial references is an important topic for further research.

  3. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  4. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  5. Local address and emergency contact details

    CERN Multimedia

    2013-01-01

    The HR Department would like to remind members of the personnel that they are responsible for ensuring that their personal data concerning local address and preferred emergency contact details remains valid and up-to-date.   Both are easily accessible via the links below: Local address: https://edh.cern.ch/Document/Personnel/LocalAddressChange   Emergency contacts: https://edh.cern.ch/Document/Personnel/EC   Please take a few minutes to check your details and modify if necessary. Thank you in advance. HR Department Head Office

  6. Development of a parameterization scheme of mesoscale convective systems

    International Nuclear Information System (INIS)

    Cotton, W.R.

    1994-01-01

    The goal of this research is to develop a parameterization scheme of mesoscale convective systems (MCS) including diabatic heating, moisture and momentum transports, cloud formation, and precipitation. The approach is to: Perform explicit cloud-resolving simulation of MCSs; Perform statistical analyses of simulated MCSs to assist in fabricating a parameterization, calibrating coefficients, etc.; Test the parameterization scheme against independent field data measurements and in numerical weather prediction (NWP) models emulating general circulation model (GCM) grid resolution. Thus far we have formulated, calibrated, implemented and tested a deep convective engine against explicit Florida sea breeze convection and in coarse-grid regional simulations of mid-latitude and tropical MCSs. Several explicit simulations of MCSs have been completed, and several other are in progress. Analysis code is being written and run on the explicitly simulated data

  7. On applications of chimera grid schemes to store separation

    Science.gov (United States)

    Cougherty, F. C.; Benek, J. A.; Steger, J. L.

    1985-01-01

    A finite difference scheme which uses multiple overset meshes to simulate the aerodynamics of aircraft/store interaction and store separation is described. In this chimera, or multiple mesh, scheme, a complex configuration is mapped using a major grid about the main component of the configuration, and minor overset meshes are used to map each additional component such as a store. As a first step in modeling the aerodynamics of store separation, two dimensional inviscid flow calculations were carried out in which one of the minor meshes is allowed to move with respect to the major grid. Solutions of calibrated two dimensional problems indicate that allowing one mesh to move with respect to another does not adversely affect the time accuracy of an unsteady solution. Steady, inviscid three dimensional computations demonstrate the capability to simulate complex configurations, including closely packed multiple bodies.

  8. Conceptual scheme of a hybrid mesocatalytic fusion reactor

    International Nuclear Information System (INIS)

    Petrov, Yu.V.

    1988-01-01

    To test the practical realization of the mesocatalytic method for energy production a preliminary engineering analysis and calculation of the separate units of the conceptual scheme of the hybrid mesocatalytic reactor was made. The construction and efficiency of the most characteristic separate blocks of the conceptual scheme for muon-catalyzed fusion are examined. The muon catalysis cycle in a dt mixture was assessed. The kinetics and energetics of muon production through a pion-forming target and a converter were evaluated. Concomitant questions, particularly the removal of helium from hydrogen, are discussed. Fusion chamber requirements were calculated and problems of heat removal were assessed. Blanket construction and efficiency were examined. The efficiency of different methods for power generation were comparatively reviewed including hybrid thermonuclear, electronuclear nuclear, and hybrid mesocatalytic methods. Energy balances and economic restrictions were examined

  9. An Intelligent Actuator Fault Reconstruction Scheme for Robotic Manipulators.

    Science.gov (United States)

    Xiao, Bing; Yin, Shen

    2018-02-01

    This paper investigates a difficult problem of reconstructing actuator faults for robotic manipulators. An intelligent approach with fast reconstruction property is developed. This is achieved by using observer technique. This scheme is capable of precisely reconstructing the actual actuator fault. It is shown by Lyapunov stability analysis that the reconstruction error can converge to zero after finite time. A perfect reconstruction performance including precise and fast properties can be provided for actuator fault. The most important feature of the scheme is that, it does not depend on control law, dynamic model of actuator, faults' type, and also their time-profile. This super reconstruction performance and capability of the proposed approach are further validated by simulation and experimental results.

  10. Modern radiosurgical and endovascular classification schemes for brain arteriovenous malformations.

    Science.gov (United States)

    Tayebi Meybodi, Ali; Lawton, Michael T

    2018-05-04

    Stereotactic radiosurgery (SRS) and endovascular techniques are commonly used for treating brain arteriovenous malformations (bAVMs). They are usually used as ancillary techniques to microsurgery but may also be used as solitary treatment options. Careful patient selection requires a clear estimate of the treatment efficacy and complication rates for the individual patient. As such, classification schemes are an essential part of patient selection paradigm for each treatment modality. While the Spetzler-Martin grading system and its subsequent modifications are commonly used for microsurgical outcome prediction for bAVMs, the same system(s) may not be easily applicable to SRS and endovascular therapy. Several radiosurgical- and endovascular-based grading scales have been proposed for bAVMs. However, a comprehensive review of these systems including a discussion on their relative advantages and disadvantages is missing. This paper is dedicated to modern classification schemes designed for SRS and endovascular techniques.

  11. Transporter taxonomy - a comparison of different transport protein classification schemes.

    Science.gov (United States)

    Viereck, Michael; Gaulton, Anna; Digles, Daniela; Ecker, Gerhard F

    2014-06-01

    Currently, there are more than 800 well characterized human membrane transport proteins (including channels and transporters) and there are estimates that about 10% (approx. 2000) of all human genes are related to transport. Membrane transport proteins are of interest as potential drug targets, for drug delivery, and as a cause of side effects and drug–drug interactions. In light of the development of Open PHACTS, which provides an open pharmacological space, we analyzed selected membrane transport protein classification schemes (Transporter Classification Database, ChEMBL, IUPHAR/BPS Guide to Pharmacology, and Gene Ontology) for their ability to serve as a basis for pharmacology driven protein classification. A comparison of these membrane transport protein classification schemes by using a set of clinically relevant transporters as use-case reveals the strengths and weaknesses of the different taxonomy approaches.

  12. Network coding multiuser scheme for indoor visible light communications

    Science.gov (United States)

    Zhang, Jiankun; Dang, Anhong

    2017-12-01

    Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.

  13. Realization of the revival of silenced echo (ROSE) quantum memory scheme in orthogonal geometry

    Science.gov (United States)

    Minnegaliev, M. M.; Gerasimov, K. I.; Urmancheev, R. V.; Moiseev, S. A.; Chanelière, T.; Louchet-Chauvet, A.

    2018-02-01

    We demonstrated quantum memory scheme on revival of silenced echo in orthogonal geometry in Tm3+: Y3Al5O12 crystal. The retrieval efficiency of ˜14% was demonstrated with the 36 µs storage time. In this scheme for the first time we also implemented a suppression of the revived echo signal by applying an external electric field and the echo signal has been recovered on demand if we then applied a second electric pulse with opposite polarity. This technique opens the possibilities for realizing addressing in multi-qubit quantum memory in Tm3+: Y3Al5O12 crystal.

  14. Benchmarking and energy management schemes in SMEs

    Energy Technology Data Exchange (ETDEWEB)

    Huenges Wajer, Boudewijn [SenterNovem (Netherlands); Helgerud, Hans Even [New Energy Performance AS (Norway); Lackner, Petra [Austrian Energy Agency (Austria)

    2007-07-01

    Many companies are reluctant to focus on energy management or to invest in energy efficiency measures. Nevertheless, there are many good examples proving that the right approach to implementing energy efficiency can very well be combined with the business-priorities of most companies. SMEs in particular can benefit from a facilitated European approach because they normally have a lack of resources and time to invest in energy efficiency. In the EU supported pilot project BESS, 60 SMEs from 11 European countries of the food and drink industries successfully tested a package of interactive instruments which offers such a facilitated approach. A number of pilot companies show a profit increase of 3 up to 10 %. The package includes a user-friendly and web based E-learning scheme for implementing energy management as well as a benchmarking module for company specific comparison of energy performance indicators. Moreover, it has several practical and tested tools to support the cycle of continuous improvement of energy efficiency in the company such as checklists, sector specific measure lists, templates for auditing and energy conservation plans. An important feature and also a key trigger for companies is the possibility for SMEs to benchmark anonymously their energy situation against others of the same sector. SMEs can participate in a unique web based benchmarking system to interactively benchmark in a way which fully guarantees confidentiality and safety of company data. Furthermore, the available data can contribute to a bottom-up approach to support the objectives of (national) monitoring and targeting and thereby also contributing to the EU Energy Efficiency and Energy Services Directive. A follow up project to expand the number of participating SMEs of various sectors is currently being developed.

  15. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  16. Self regulation initiative to address the heavy vehicle overloading problem in South Africa

    CSIR Research Space (South Africa)

    Nordengen, Paul A

    2004-07-01

    Full Text Available vehicles; • Improve road safety; • Increase the productivity of the transport industry through adoption of good management practices; In reviewing the Australian scheme, which extends beyond vehicle mass/overload control to the crucial safety issues... number of aspects have been addressed, all of which have involved consultation with representatives of the timber industry and other role players: • Underlying principles and business rules • Rules of compliance for accreditation • Proposed...

  17. GAME ANALYSIS OF KYOTO AND POST-KYOTO SCHEMES

    Energy Technology Data Exchange (ETDEWEB)

    Haruo Imai [Kyoto Institute of Economic Research, Kyoto University, Sakyo, Kyoto (Japan)

    2008-09-30

    Kyoto protocol, put in force in Feb. 2005, is criticized from both sides, those demanding a stricter target for GHG (green house gas) emission reduction on the one side, and those claiming for more flexible and comprehensive controls of the emission on the other side, for its modest target and narrow coverage. Even though its value could be that of a mere precedent and experimentation, Kyoto protocol includes very special experimentation to assist the world wide cooperation for a mitigation of climate change, i.e. the introduction of three mechanisms, emissions trading, joint implementation, and clean development mechanism (CDM). Together, they are called Kyoto mechanisms. Evaluation of mechanisms is one important role of microeconomics and the game theory is a major tool for it. We shall scrutinize these mechanisms from such viewpoint. A special attention is placed on CDM, as it is the novel mechanism introduced by Kyoto protocol, and gives a unique link between Annex I nations (mostly developed countries) and non-Annex I nations (mostly developing countries). Next, we examine some of the currently proposed schemes after 2013, the post Kyoto schemes. One of the chief issues is the possibility of making a comprehensive agreement including both the USA and large developing countries with rapidly increasing emission levels of GHG like China and India. Adding to these, not only the proposed schemes themselves, but the process of negotiation itself inspired several researches in cooperative game theory and in particular, coalition formation theory. We shall touch upon this issue separately, and examine how successfully they predicted the outcome leading to Kyoto, retrospectively. Finally, we end our discussion with a brief consideration over the underlining normative argument concerning these schemes.

  18. VT E911 ESITE geocoder - address points

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 ESITE geocoder - address points. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be used to batch geocode...

  19. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  20. An adaptive Cartesian control scheme for manipulators

    Science.gov (United States)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  1. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  2. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  3. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  4. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  5. What is an address in South Africa?

    CSIR Research Space (South Africa)

    Coetzee, S

    2007-11-01

    Full Text Available Puccini Street, Constantia Park 546 Puccini Street, Glenstantia, 0181 A recent study in Denmark analysed the qualitative and quantitative impact of address ambiguities. The qualitative analysis confirmed that the ambiguities affect people every day... description consists of a land parcel number together with a registered name and registration division, and is recorded at a Surveyor-General’s office. An address complements a land parcel description with information such as the street name and the street...

  6. Research Note Consumer Addressability and Customized Pricing

    OpenAIRE

    Yuxin Chen; Ganesh Iyer

    2002-01-01

    The increasing availability of customer information is giving many firms the ability to reach and customize price and other marketing efforts to the tastes of the individual consumer. This ability is labeled as consumer addressability. Consumer addressability through sophisticated databases is particularly important for direct-marketing firms, catalog retailers such as L.L Bean and Land's End, credit card-issuing banks, and firms in the long-distance telephone market. We examine the strategic...

  7. Nuclear techniques to address HAB concerns

    International Nuclear Information System (INIS)

    Vu Nhu Ngoc; Phan Son; Nguyen Ngoc Lam and Chu Van Thuoc

    2004-01-01

    In December, 1998, The Project Formulation meeting on application of Nuclear Techniques to address red tide (Harmful Algal Bloom concerns) was held in Manila Philippines. This is an IAEA/RCA project with the participation of Australia, China, Indonesia, Malaysia, Pakistan, The Philippines, Thailand and Vietnam. The main objectives of this project (RAS/8/076) included: - Conduct of segmentation studies to gain information on the natural histories of sediments and to correlated these with Red Tide occurrences. - Development of descriptive and predictive of the behaviour of Algal Bloom as affected by the interplay of the causative organism with the environment parameters in the water column and sediments. - Development and field testing of a rapid assay technique based on tritium - labeled saxitoxin for toxin determination. The first phase has been completed in 2002 and the second phase will be completed in 2004. In the two years of 2001 - 2002 Ted Tide occurred in very larger area in Vietnam, for example, in the coast of Binh Thuan Province with the density of 39.10 9 cells/litre. The Ministry of science - technology environment of Vietnam has support 5.000 USD each years for sediment and algal sampling in Cam Ranh Bay (Nha Trang, 11 o 45N and 10 o 15E) and Ha Long Bay in the North - East of Vietnam (21 o 15 and 107 o 3E) and in 2003 in Tuy Phong Bay (Binh Thuan province) (10 o 15N, 108 o 45E). Three sediment core has been taken from Cam Ranh Bay, Ha Long Bay and Tuy Phong Bay. The volume of sediment core is Φ = 8 cm and h = 60 cm. The algal samples have been collected by Bongo nets in Cam Ranh, Ha Long Bay and Tuy Phong Bay. (author)

  8. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  9. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  10. Costs and economic consequences of a help-at-home scheme for older people in England.

    Science.gov (United States)

    Bauer, Annette; Knapp, Martin; Wistow, Gerald; Perkins, Margaret; King, Derek; Iemmi, Valentina

    2017-03-01

    Solutions to support older people to live independently and reduce the cost of an ageing population are high on the political agenda of most developed countries. Help-at-home schemes offer a mix of community support with the aim to address a range of well-being needs. However, not much is currently known about the costs, outcomes and economic consequences of such schemes. Understanding their impact on individuals' well-being and the economic consequences for local and central government can contribute to decisions about sustainable long-term care financing. This article presents results from a mixed-methods study of a voluntary sector-provided help-at-home scheme in England for people of 55 years and older. The study followed a participatory approach, which involved staff and volunteers. Data were collected during 2012 and 2013. Social care-related quality of life was measured with the Adult Social Care Outcomes Toolkit for 24 service users (59% response rate) when they started using the scheme and 4-6 months later. A customised questionnaire that captured resource use and well-being information was sent to 1064 service users (63% response rate). The same tool was used in assessment with service users who started using the scheme between November 2012 and April 2013 (100% response rate). Costs of the scheme were established from local budget and activity data. The scheme was likely to achieve a mean net benefit of £1568 per person from a local government and National Health Service (NHS) perspective and £3766 from the perspective of the individual. An expenditure of £2851 per person accrued to central government for the additional redistribution of benefit payments to older people. This article highlights the potential contribution of voluntary sector-run help-at-home schemes to an affordable welfare system for ageing societies. © 2016 John Wiley & Sons Ltd.

  11. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  12. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  13. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  14. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  15. Group Buying Schemes : A Sustainable Business Model?

    OpenAIRE

    Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus

    2013-01-01

    Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...

  16. New Imaging Operation Scheme at VLTI

    Science.gov (United States)

    Haubois, Xavier

    2018-04-01

    After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.

  17. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  18. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  19. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  20. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  1. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  2. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  3. Vehicle scheduling schemes for commercial and emergency logistics integration.

    Science.gov (United States)

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models.

  4. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  5. Cryptanalysis of a chaotic communication scheme using adaptive observer.

    Science.gov (United States)

    Liu, Ying; Tang, Wallace K S

    2008-12-01

    This paper addresses the cryptanalysis of a secure communication scheme recently proposed by Wu [Chaos 16, 043118 (2006)], where the information signal is modulated into a system parameter of a unified chaotic system. With the Kerckhoff principle, assuming that the structure of the cryptosystem is known, an adaptive observer can be designed to synchronize the targeted system, so that the transmitted information and the user-specific parameters are obtained. The success of adaptive synchronization is mathematically proved with the use of Lyapunov stability theory, based on the original assumption, i.e., the dynamical evolution of the information signal is available. A more practical case, but yet much more difficult, is also considered. As demonstrated with simulations, generalized synchronization is still possible, even if the derivative of the information signal is kept secret. Hence, the message can be coarsely estimated, making the security of the considered system questionable.

  6. Analysis of core calculation schemes for advanced water reactors

    International Nuclear Information System (INIS)

    Nicolas, Anne

    1989-01-01

    This research thesis addresses the analysis of the core control of sub-moderated water reactors with plutonium fuel and varying spectrum. Firstly, a calculation scheme is defined, based on transport theory for the three existing assembly configurations. It is based on the efficiency analysis of the control cluster and of the flow sheet shape in the assembly. Secondly, studies of the assembly with control cluster and within a theory of diffusion with homogenization or detailed assembly representation are performed by taking the environment into account in order to assess errors. Thirdly, due to the presence of a very efficient absorbent in control clusters, a deeper physical analysis requires the study of the flow gradient existing at the interface between assemblies. A parameter is defined to assess this gradient, and theoretically calculated by using finite elements. Developed software is validated [fr

  7. Low-power priority Address-Encoder and Reset-Decoder data-driven readout for Monolithic Active Pixel Sensors for tracker system

    Science.gov (United States)

    Yang, P.; Aglieri, G.; Cavicchioli, C.; Chalmet, P. L.; Chanlek, N.; Collu, A.; Gao, C.; Hillemanns, H.; Junique, A.; Kofarago, M.; Keil, M.; Kugathasan, T.; Kim, D.; Kim, J.; Lattuca, A.; Marin Tobon, C. A.; Marras, D.; Mager, M.; Martinengo, P.; Mazza, G.; Mugnier, H.; Musa, L.; Puggioni, C.; Rousset, J.; Reidt, F.; Riedler, P.; Snoeys, W.; Siddhanta, S.; Usai, G.; van Hoorne, J. W.; Yi, J.

    2015-06-01

    Active Pixel Sensors used in High Energy Particle Physics require low power consumption to reduce the detector material budget, low integration time to reduce the possibilities of pile-up and fast readout to improve the detector data capability. To satisfy these requirements, a novel Address-Encoder and Reset-Decoder (AERD) asynchronous circuit for a fast readout of a pixel matrix has been developed. The AERD data-driven readout architecture operates the address encoding and reset decoding based on an arbitration tree, and allows us to readout only the hit pixels. Compared to the traditional readout structure of the rolling shutter scheme in Monolithic Active Pixel Sensors (MAPS), AERD can achieve a low readout time and a low power consumption especially for low hit occupancies. The readout is controlled at the chip periphery with a signal synchronous with the clock, allows a good digital and analogue signal separation in the matrix and a reduction of the power consumption. The AERD circuit has been implemented in the TowerJazz 180 nm CMOS Imaging Sensor (CIS) process with full complementary CMOS logic in the pixel. It works at 10 MHz with a matrix height of 15 mm. The energy consumed to read out one pixel is around 72 pJ. A scheme to boost the readout speed to 40 MHz is also discussed. The sensor chip equipped with AERD has been produced and characterised. Test results including electrical beam measurement are presented.

  8. Low-power priority Address-Encoder and Reset-Decoder data-driven readout for Monolithic Active Pixel Sensors for tracker system

    International Nuclear Information System (INIS)

    Yang, P.; Aglieri, G.; Cavicchioli, C.; Chalmet, P.L.; Chanlek, N.; Collu, A.; Gao, C.; Hillemanns, H.; Junique, A.; Kofarago, M.; Keil, M.; Kugathasan, T.; Kim, D.; Kim, J.; Lattuca, A.; Marin Tobon, C.A.; Marras, D.; Mager, M.; Martinengo, P.; Mazza, G.

    2015-01-01

    Active Pixel Sensors used in High Energy Particle Physics require low power consumption to reduce the detector material budget, low integration time to reduce the possibilities of pile-up and fast readout to improve the detector data capability. To satisfy these requirements, a novel Address-Encoder and Reset-Decoder (AERD) asynchronous circuit for a fast readout of a pixel matrix has been developed. The AERD data-driven readout architecture operates the address encoding and reset decoding based on an arbitration tree, and allows us to readout only the hit pixels. Compared to the traditional readout structure of the rolling shutter scheme in Monolithic Active Pixel Sensors (MAPS), AERD can achieve a low readout time and a low power consumption especially for low hit occupancies. The readout is controlled at the chip periphery with a signal synchronous with the clock, allows a good digital and analogue signal separation in the matrix and a reduction of the power consumption. The AERD circuit has been implemented in the TowerJazz 180 nm CMOS Imaging Sensor (CIS) process with full complementary CMOS logic in the pixel. It works at 10 MHz with a matrix height of 15 mm. The energy consumed to read out one pixel is around 72 pJ. A scheme to boost the readout speed to 40 MHz is also discussed. The sensor chip equipped with AERD has been produced and characterised. Test results including electrical beam measurement are presented

  9. Low-power priority Address-Encoder and Reset-Decoder data-driven readout for Monolithic Active Pixel Sensors for tracker system

    Energy Technology Data Exchange (ETDEWEB)

    Yang, P., E-mail: yangping0710@126.com [Central China Normal University, Wuhan (China); Aglieri, G.; Cavicchioli, C. [CERN, 1210 Geneva 23 (Switzerland); Chalmet, P.L. [MIND, Archamps (France); Chanlek, N. [Suranaree University of Technology, Nakhon Ratchasima (Thailand); Collu, A. [University of Cagliari, Cagliari (Italy); INFN (Italy); Gao, C. [Central China Normal University, Wuhan (China); Hillemanns, H.; Junique, A. [CERN, 1210 Geneva 23 (Switzerland); Kofarago, M. [CERN, 1210 Geneva 23 (Switzerland); University of Utrecht, Utrecht (Netherlands); Keil, M.; Kugathasan, T. [CERN, 1210 Geneva 23 (Switzerland); Kim, D. [Dongguk and Yonsei University, Seoul (Korea, Republic of); Kim, J. [Pusan National University, Busan (Korea, Republic of); Lattuca, A. [University of Torino, Torino (Italy); INFN (Italy); Marin Tobon, C.A. [CERN, 1210 Geneva 23 (Switzerland); Marras, D. [University of Cagliari, Cagliari (Italy); INFN (Italy); Mager, M.; Martinengo, P. [CERN, 1210 Geneva 23 (Switzerland); Mazza, G. [University of Torino, Torino (Italy); INFN (Italy); and others

    2015-06-11

    Active Pixel Sensors used in High Energy Particle Physics require low power consumption to reduce the detector material budget, low integration time to reduce the possibilities of pile-up and fast readout to improve the detector data capability. To satisfy these requirements, a novel Address-Encoder and Reset-Decoder (AERD) asynchronous circuit for a fast readout of a pixel matrix has been developed. The AERD data-driven readout architecture operates the address encoding and reset decoding based on an arbitration tree, and allows us to readout only the hit pixels. Compared to the traditional readout structure of the rolling shutter scheme in Monolithic Active Pixel Sensors (MAPS), AERD can achieve a low readout time and a low power consumption especially for low hit occupancies. The readout is controlled at the chip periphery with a signal synchronous with the clock, allows a good digital and analogue signal separation in the matrix and a reduction of the power consumption. The AERD circuit has been implemented in the TowerJazz 180 nm CMOS Imaging Sensor (CIS) process with full complementary CMOS logic in the pixel. It works at 10 MHz with a matrix height of 15 mm. The energy consumed to read out one pixel is around 72 pJ. A scheme to boost the readout speed to 40 MHz is also discussed. The sensor chip equipped with AERD has been produced and characterised. Test results including electrical beam measurement are presented.

  10. Aggregate resource availability in the conterminous United States, including suggestions for addressing shortages, quality, and environmental concerns

    Science.gov (United States)

    Langer, William H.

    2011-01-01

    One-third of America's major roads are in poor or mediocre condition, and over one-quarter of the bridges are either structurally deficient or functionally obsolete. A 70-percent increase in annual aggregate production may be required to upgrade the transportation infrastructure. Natural aggregate is widespread throughout the conterminous United States, but the location of aggregate is determined by geology and is non-negotiable. Natural aggregate is in short supply in the Coastal Plain and Mississippi embayment, Colorado Plateau and Wyoming Basin, glaciated Midwest, High Plains, and the non-glaciated Northern Plains. A variety of techniques have been used to overcome local shortages, such as the use of substitute materials, recycling, and importing high-quality aggregates from more distant locations.

  11. Identifying and Addressing Themes of Job Dissatisfaction for Secondary Principals

    Science.gov (United States)

    De Jong, David; Grundmeyer, Trent; Yankey, Julie

    2017-01-01

    Secondary principals serve in important roles that are complex, high-stress, and include demanding job responsibilities. Key stakeholders such as superintendents, school board members, and legislators must understand the challenges facing secondary principals in order to address the current themes of job dissatisfaction. Using new survey data…

  12. Are Teacher and Principal Candidates Prepared to Address Student Cyberbullying?

    Science.gov (United States)

    Styron, Ronald A., Jr.; Bonner, Jessica L.; Styron, Jennifer L.; Bridgeforth, James; Martin, Cecelia

    2016-01-01

    The purpose of this study was to examine the preparation of teacher and principal candidates to address problems created in K-12 settings as a result of cyberbullying. Participants included teacher and principal preparation students. Findings indicated that respondents were familiar with the most common forms of cyberbullying and its impact on…

  13. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  14. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    Directory of Open Access Journals (Sweden)

    Yijun Yang

    2015-01-01

    Full Text Available A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  15. Stable explicit coupling of the Yee scheme with a linear current model in fluctuating magnetized plasmas

    International Nuclear Information System (INIS)

    Silva, Filipe da; Pinto, Martin Campos; Després, Bruno; Heuraux, Stéphane

    2015-01-01

    This work analyzes the stability of the Yee scheme for non-stationary Maxwell's equations coupled with a linear current model with density fluctuations. We show that the usual procedure may yield unstable scheme for physical situations that correspond to strongly magnetized plasmas in X-mode (TE) polarization. We propose to use first order clustered discretization of the vectorial product that gives back a stable coupling. We validate the schemes on some test cases representative of direct numerical simulations of X-mode in a magnetic fusion plasma including turbulence

  16. Sound classification schemes in Europe - Quality classes intended for renovated housing

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2010-01-01

    exposure in the home included in the proposed main objectives for a housing policy. In most countries in Europe, building regulations specify minimum requirements concerning acoustical conditions for new dwellings. In addition, several countries have introduced sound classification schemes with classes...... intended to reflect different levels of acoustical comfort. Consequently, acoustic requirements for a dwelling can be specified as the legal minimum requirements or as a specific class in a classification scheme. Most schemes have both higher classes than corresponding to the regulatory requirements...

  17. Modeling and Performance Analysis for Cell Access and Handoff Schemes in Two-Tier Cellular Networks

    Directory of Open Access Journals (Sweden)

    Kyungkoo Jun

    2014-01-01

    Full Text Available We investigate the effects of handoff on system performance in two-tier cellular networks. Two of the main performance metrics are new call blocking probability and handoff drop rate. We develop analytical models to evaluate the performance of two different handoff schemes. One scheme considers only femto-to-macrocell handoff while the other is bidirectional including macro-to-femtocell handoff. Our model is more elaborate than existing ones which have not considered the mobility of mobile stations. Numerical results show that the bidirectional scheme performs better than the femto-to-macrocell handoff as it achieves lower blocking probability and drop rate.

  18. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  19. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  20. Addressing inequality and poverty with tax instruments

    Directory of Open Access Journals (Sweden)

    Ranđelović Saša

    2011-01-01

    Full Text Available There is a consensus, in both academia and economic policy circles, that the reform of the personal income tax system in Serbia is necessary one. Two frequently discussed reform scenarios are East European style flat tax and the comprehensive income tax model of Western Europe. Most Central and Eastern European (CEE countries have recently reformed their income tax systems by introducing some form of flat tax scheme, while in numerous countries of Western Europe the possibility of flat tax reform is also seriously considered. Opponents of the reform usually stress the adverse distributional effects of flat tax schemes. The aim of our paper is to contribute to the empirical literature on the distributional effects of alternative tax reform scenarios. The analysis is based on the tax and benefit micro-simulation model for Serbia (SRMOD. The results suggest that redesigning the existing income tax system so as to introduce a uniform tax rate and increase the basic allowance would somewhat reduce inequality and improve vertical inequity in taxation. On the other hand, in the case of the introduction of comprehensive income tax, considerably larger equalizing and progressivity effects would be achieved. At the same time, since in both cases redistribution will not affect the bottom decile group, no significant effects (in either cases on poverty reduction will be achieved.

  1. A new MV bus transfer scheme for nuclear power plants

    International Nuclear Information System (INIS)

    Chang, C.K.

    2015-01-01

    The auxiliary power system of many generating stations consists of offsite power supply system and onsite power supply system, including emergency diesel generators (EDG) to provide secure power to auxiliary loads. If a normal power supply fails to supply power, then the power source is transferred to a standby power supply. In the case of nuclear power plants (NPP), the unit auxiliary transformer (UAT) and standby auxiliary transformer (SAT) - or station service transformer - are installed and powered from 2 offsite power circuits to meet regulatory requirements. The transfer methods of a motor bus from a normal source to a standby source used in power generating stations are fast bus transfer, in-phase transfer, or residual transfer. Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, un-interruptible bus transfer scheme utilizing the state of the art medium voltage UPS (Un-interruptible Power Supply) is discussed and elaborated

  2. Insights on different participation schemes to meet climate goals

    International Nuclear Information System (INIS)

    Russ, Peter; Ierland, Tom van

    2009-01-01

    Models and scenarios to assess greenhouse gas mitigation action have become more diversified and detailed, allowing the simulation of more realistic global climate policy set-ups. In this paper, different participation schemes to meet different levels of radiative forcing are analysed. The focus is on scenarios that are in line with the 2 deg. C target. Typical stylised participation schemes are based either on a perfect global carbon market or delayed participation with targets only for developed countries, no actions by developing countries and no access to credits from offsetting mechanisms in developing countries. This paper adds an intermediate policy scenario assuming a gradual incorporation of all countries, including a gradually developing carbon market, and taking into account the ability to contribute of different parties. Perfect participation by all parties would be optimal, but it is shown that participation schemes involving a gradual and differentiated participation by all parties can substantially decrease global costs and still meet the 2 deg. C target. Carbon markets can compensate in part for those costs incurred by developing countries' own, autonomous mitigation actions that do not generate tradable emission credits.

  3. An integrated urban drainage system model for assessing renovation scheme.

    Science.gov (United States)

    Dong, X; Zeng, S; Chen, J; Zhao, D

    2012-01-01

    Due to sustained economic growth in China over the last three decades, urbanization has been on a rapidly expanding track. In recent years, regional industrial relocations were also accelerated across the country from the east coast to the west inland. These changes have led to a large-scale redesign of urban infrastructures, including the drainage system. To help the reconstructed infrastructures towards a better sustainability, a tool is required for assessing the efficiency and environmental performance of different renovation schemes. This paper developed an integrated dynamic modeling tool, which consisted of three models for describing the sewer, the wastewater treatment plant (WWTP) and the receiving water body respectively. Three auxiliary modules were also incorporated to conceptualize the model, calibrate the simulations, and analyze the results. The developed integrated modeling tool was applied to a case study in Shenzhen City, which is one of the most dynamic cities and facing considerable challenges for environmental degradation. The renovation scheme proposed to improve the environmental performance of Shenzhen City's urban drainage system was modeled and evaluated. The simulation results supplied some suggestions for the further improvement of the renovation scheme.

  4. Energy harvesting schemes for building interior environment monitoring

    Science.gov (United States)

    Zylka, Pawel; Pociecha, Dominik

    2016-11-01

    A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).

  5. A missing-bending-magnet scheme for PEP

    International Nuclear Information System (INIS)

    Liu, R.Z.; Winick, H.

    1988-01-01

    This article presents a missing-bending-magnet scheme for PEP as a modification that could be considered if PEP were available as a fully dedicated synchrotron radiation source. The scheme can be applied to one or more PEP sextants without changing the rest. By removing some bending magnets, rearranging the remaining magnets, and adding two quadrupoles, ten additional straight sections per sextant can be created, each 5 m or more in length, for insertion devices. Beam lines therefrom, plus possible beam lines from bending magnets would enter a continuous experimental hall instead of individual tunnels and halls for each beam line. This should result in construction cost savings and increased operations efficiency. The ideal beam orbit is unchanged at the two ends and the middle of the sextant. At the end of the curved part of the sextant the lattice functions match those of the long interaction region straight section in the low emittance configuration of PEP. The electron beam characteristics in the newly created straight sections are described, including the enlargement of the horizontal beam size due to the nonzero dispersion. Some disadvantages of the scheme are increased operations complexity due to the need for nine new quadrupole families, increased beam emittance (by 14.5% is one sextant is modified), and reduced dynamic aperture. However, the dynamic aperture is still about as large as the physical aperture and should be adequate for good beam lifetime and injection. (orig.)

  6. Cluster synchronization for directed community networks via pinning partial schemes

    International Nuclear Information System (INIS)

    Hu Cheng; Jiang Haijun

    2012-01-01

    Highlights: ► Cluster synchronization for directed community networks is proposed by pinning partial schemes. ► Each community is considered as a whole. ► Several novel pinning criteria are derived based on the information of communities. ► A numerical example with simulation is provided. - Abstract: In this paper, we focus on driving a class of directed networks to achieve cluster synchronization by pinning schemes. The desired cluster synchronization states are no longer decoupled orbits but a set of un-decoupled trajectories. Each community is considered as a whole and the synchronization criteria are derived based on the information of communities. Several pinning schemes including feedback control and adaptive strategy are proposed to select controlled communities by analyzing the information of each community such as indegrees and outdegrees. In all, this paper answers several challenging problems in pinning control of directed community networks: (1) What communities should be chosen as controlled candidates? (2) How many communities are needed to be controlled? (3) How large should the control gains be used in a given community network to achieve cluster synchronization? Finally, an example with numerical simulations is given to demonstrate the effectiveness of the theoretical results.

  7. Power Peaking Effect of OTTO Fuel Scheme Pebble Bed Reactor

    Science.gov (United States)

    Setiadipura, T.; Suwoto; Zuhair; Bakhri, S.; Sunaryo, G. R.

    2018-02-01

    Pebble Bed Reactor (PBR) type of Hight Temperature Gas-cooled Reactor (HTGR) is a very interesting nuclear reactor design to fulfill the growing electricity and heat demand with a superior passive safety features. Effort to introduce the PBR design to the market can be strengthen by simplifying its system with the Once-through-then-out (OTTO) cycle PBR in which the pebble fuel only pass the core once. Important challenge in the OTTO fuel scheme is the power peaking effect which limit the maximum nominal power or burnup of the design. Parametric survey is perform in this study to investigate the contribution of different design parameters to power peaking effect of OTTO cycle PBR. PEBBED code is utilized in this study to perform the equilibrium PBR core analysis for different design parameter and fuel scheme. The parameters include its core diameter, height-per-diameter (H/D), power density, and core nominal power. Results of this study show that diameter and H/D effectsare stronger compare to the power density and nominal core power. Results of this study might become an importance guidance for design optimization of OTTO fuel scheme PBR.

  8. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  9. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  10. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  11. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  12. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.

  13. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  14. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  15. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  16. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  17. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  18. Parallel knock-out schemes in networks

    NARCIS (Netherlands)

    Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.

    2004-01-01

    We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel

  19. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  20. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and