WorldWideScience

Sample records for schemes electronic resource

  1. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  2. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  4. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  5. Analyses of resource reservation schemes for optical burst switching networks

    Science.gov (United States)

    Solanska, Michaela; Scholtz, Lubomir; Ladanyi, Libor; Mullerova, Jarmila

    2017-12-01

    With growing demands of Internet Protocol services for transmission capacity and speed, the Optical Burst Switching presents the solution for future high-speed optical networks. Optical Burst Switching is a technology for transmitting large amounts of data bursts through a transparent optical switching network. To successfully transmit bursts over OBS network and reach the destination node, resource reservation schemes have to be implemented to allocate resources and configure optical switches for that burst at each node. The one-way resource reservation schemes and the performance evaluation of reservation schemes are presented. The OBS network model is performed using OMNeT++ simulation environment. During the reservation of network resources, the optical cross-connect based on semiconductor optical amplifier is used as the core node. Optical switches based on semiconductor optical amplifiers are a promising technology for high-speed optical communication networks.

  6. A Classification Scheme for Career Education Resource Materials.

    Science.gov (United States)

    Koontz, Ronald G.

    The introductory section of the paper expresses its purpose: to devise a classification scheme for career education resource material, which will be used to develop the USOE Office of Career Education Resource Library and will be disseminated to interested State departments of education and local school districts to assist them in classifying…

  7. A simple photoionization scheme for characterizing electron and ion spectrometers

    Energy Technology Data Exchange (ETDEWEB)

    Wituschek, A.; Vangerow, J. von; Grzesiak, J.; Stienkemeier, F.; Mudrich, M., E-mail: mudrich@physik.uni-freiburg.de [Physikalisches Institut, Universität Freiburg, 79104 Freiburg (Germany)

    2016-08-15

    We present a simple diode laser-based photoionization scheme for generating electrons and ions with well-defined spatial and energetic (≲2 eV) structures. This scheme can easily be implemented in ion or electron imaging spectrometers for the purpose of off-line characterization and calibration. The low laser power ∼1 mW needed from a passively stabilized diode laser and the low flux of potassium atoms in an effusive beam make our scheme a versatile source of ions and electrons for applications in research and education.

  8. PS-CARA: Context-Aware Resource Allocation Scheme for Mobile Public Safety Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Kaleem

    2018-05-01

    Full Text Available The fifth-generation (5G communications systems are expecting to support users with diverse quality-of-service (QoS requirements. Beside these requirements, the task with utmost importance is to support the emergency communication services during natural or man-made disasters. Most of the conventional base stations are not properly functional during a disaster situation, so deployment of emergency base stations such as mobile personal cell (mPC is crucial. An mPC having moving capability can move in the disaster area to provide emergency communication services. However, mPC deployment causes severe co-channel interference to the users in its vicinity. The problem in the existing resource allocation schemes is its support for static environment, that does not fit well for mPC. So, a resource allocation scheme for mPC users is desired that can dynamically allocate resources based on users’ location and its connection establishment priority. In this paper, we propose a public safety users priority-based context-aware resource allocation (PS-CARA scheme for users sum-rate maximization in disaster environment. Simulations results demonstrate that the proposed PS-CARA scheme can increase the user average and edge rate around 10.3% and 32.8% , respectively because of context information availability and by prioritizing the public safety users. The simulation results ensure that call blocking probability is also reduced considerably under the PS-CARA scheme.

  9. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  10. Adaptive multi-objective Optimization scheme for cognitive radio resource management

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem

    2014-01-01

    configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance

  11. Electronic Resource Management and Design

    Science.gov (United States)

    Abrams, Kimberly R.

    2015-01-01

    We have now reached a tipping point at which electronic resources comprise more than half of academic library budgets. Because of the increasing work associated with the ever-increasing number of e-resources, there is a trend to distribute work throughout the library even in the presence of an electronic resources department. In 2013, the author…

  12. Schemes of Superradiant Emission from Electron Beams and "Spin-Flip Emission of Radiation"

    CERN Document Server

    Gover, A

    2005-01-01

    A unified analysis for Superradiant emission from bunched electron beams in various kinds of radiation scheme is presented. Radiation schemes that can be described by the formulation include Pre-bunched FEL (PB-FEL), Coherent Synchrotron Radiation (CSR), Smith-Purcell Radiation, Cerenkov-Radiation, Transition-Radiation and more. The theory is based on mode excitation formulation - either discrete or continuous (the latter - in open structures). The discrete mode formulation permits simple evaluation of the spatially coherent power and spectral power of the source. These figures of merit of the radiation source are useful for characterizing and comparing the performance of different radiation schemes. When the bunched electron beam emits superradiantly, these parameters scale like the square of the number of electrons, orders of magnitude more than spontaneous emission. The formulation applies to emission from single electron bunches, periodically bunched beams, or emission from a finite number of bunches in a...

  13. Longitudinal profile diagnostic scheme with subfemtosecond resolution for high-brightness electron beams

    Directory of Open Access Journals (Sweden)

    G. Andonian

    2011-07-01

    Full Text Available High-resolution measurement of the longitudinal profile of a relativistic electron beam is of utmost importance for linac based free-electron lasers and other advanced accelerator facilities that employ ultrashort bunches. In this paper, we investigate a novel scheme to measure ultrashort bunches (subpicosecond with exceptional temporal resolution (hundreds of attoseconds and dynamic range. The scheme employs two orthogonally oriented deflecting sections. The first imparts a short-wavelength (fast temporal resolution horizontal angular modulation on the beam, while the second imparts a long-wavelength (slow angular kick in the vertical dimension. Both modulations are observable on a standard downstream screen in the form of a streaked sinusoidal beam structure. We demonstrate, using scaled variables in a quasi-1D approximation, an expression for the temporal resolution of the scheme and apply it to a proof-of-concept experiment at the UCLA Neptune high-brightness injector facility. The scheme is also investigated for application at the SLAC NLCTA facility, where we show that the subfemtosecond resolution is sufficient to resolve the temporal structure of the beam used in the echo-enabled free-electron laser. We employ beam simulations to verify the effect for typical Neptune and NLCTA parameter sets and demonstrate the feasibility of the concept.

  14. Sophisticated Online Learning Scheme for Green Resource Allocation in 5G Heterogeneous Cloud Radio Access Networks

    KAUST Repository

    Alqerm, Ismail

    2018-01-23

    5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.

  15. Efficient resource allocation scheme for visible-light communication system

    Science.gov (United States)

    Kim, Woo-Chan; Bae, Chi-Sung; Cho, Dong-Ho; Shin, Hong-Seok; Jung, D. K.; Oh, Y. J.

    2009-01-01

    A visible-light communication utilizing LED has many advantagies such as visibility of information, high SNR (Signal to Noise Ratio), low installation cost, usage of existing illuminators, and high security. Furthermore, exponentially increasing needs and quality of LED have helped the development of visible-light communication. The visibility is the most attractive property in visible-light communication system, but it is difficult to ensure visibility and transmission efficiency simultaneously during initial access because of the small amount of initial access process signals. In this paper, we propose an efficient resource allocation scheme at initial access for ensuring visibility with high resource utilization rate and low data transmission failure rate. The performance has been evaluated through the numerical analysis and simulation results.

  16. Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch injection scheme

    NARCIS (Netherlands)

    Khachatryan, A.G.; van Goor, F.A.; Boller, Klaus J.; Reitsma, A.J.W.; Jaroszynski, D.A.

    2004-01-01

    Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001); Phys. Rev. E 65, 046504 (2002)]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser

  17. Willingness of upstream and downstream resource managers to engage in compensation schemes for environmental services

    Directory of Open Access Journals (Sweden)

    Chapika Sangkapitux

    2009-04-01

    Full Text Available Providing compensation for agricultural conservation practices adopted by upstream farmers is still an alien concept in the Thai political context. The governance of common-pool natural resources, such as forest and water, has traditionally been under the control of powerful government line agencies, while the contribution of local communities to natural resource conservation have been hardly recognized by policy-makers. Drawing on a case study in Mae Sa watershed, Chiang Mai province, northern Thailand, this paper discusses the potential of developing compensation schemes in a socio-political context where upland farmers – mostly belonging to ethnic minority groups – tend to be considered a threat to the natural resource base rather than providers of environmental services. Based on data obtained from 371 households in the upstream communities and 151 households in the downstream communities of the watershed, upstream resource managers’ willingness to accept compensation for the conservation measures and downstream resource managers’ willingness to pay for water resource improvements were estimated through the use of choice experiments. Results from the study suggest that downstream resource managers would be willing to provide on average nearly 1% of their annual income for a substantial improvement of the quantity and quality of water resources, which could be achieved by compensating upstream farmers’ change of their agricultural systems towards more environment-friendly practices. Both willingness to pay of downstream respondents and willingness of upstream resource managers to accept compensation were positively correlated with age, education, participation in environmental conservation activities and previous experiences with droughts and/or erosion. The paper concludes that there is a clear potential for establishing compensation schemes for provision of environmental services in northern Thai watersheds. The important policy

  18. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  19. Adaptive multi-objective Optimization scheme for cognitive radio resource management

    KAUST Repository

    Alqerm, Ismail

    2014-12-01

    Cognitive Radio is an intelligent Software Defined Radio that is capable to alter its transmission parameters according to predefined objectives and wireless environment conditions. Cognitive engine is the actuator that performs radio parameters configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance. The optimization relies on adapting radio transmission parameters to environment conditions using constrained optimization modeling called fitness functions in an iterative manner. These functions include minimizing power consumption, Bit Error Rate, delay and interference. On the other hand, maximizing throughput and spectral efficiency. Cross-layer optimization is exploited to access environmental parameters from all TCP/IP stack layers. AMOS uses adaptive Genetic Algorithm in terms of its parameters and objective weights as the vehicle of optimization. The proposed scheme has demonstrated quick response and efficiency in three different scenarios compared to other schemes. In addition, it shows its capability to optimize the performance of TCP/IP layers as whole not only the physical layer.

  20. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-11-05

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration is to consolidate all electronic resources into a single and centralized location. This would allow for better information sharing among library staff.

  1. Complete snake and rotator schemes for spin polarization in proton rings and large electron rings

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-11-01

    In order to maintain spin polarization in proton rings and large electron rings, some generalized Siberian Snake scheme may be required to make the spin tune almost independent of energy and thus avoid depolarizing resonances. The practical problem of finding such schemes that, at reasonable technical effort, can be made to work over large energy ranges has been addressed before and is here revisited in a broadened view and with added new suggestions. As a result, possibly optimum schemes for electron rings (LEP) and proton rings are described. In the proposed LEP scheme, spin rotation is devised such that, at the interaction points, the spin direction is longitudinal as required for experiments. (orig.)

  2. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  3. PRINCIPLES OF CONTENT FORMATION EDUCATIONAL ELECTRONIC RESOURCE

    Directory of Open Access Journals (Sweden)

    О Ю Заславская

    2017-12-01

    Full Text Available The article considers modern possibilities of information and communication technologies for the design of electronic educational resources. The conceptual basis of the open educational multimedia system is based on the modular architecture of the electronic educational resource. The content of the electronic training module can be implemented in several versions of the modules: obtaining information, practical exercises, control. The regularities in the teaching process in modern pedagogical theory are considered: general and specific, and the principles for the formation of the content of instruction at different levels are defined, based on the formulated regularities. On the basis of the analysis, the principles of the formation of the electronic educational resource are determined, taking into account the general and didactic patterns of teaching.As principles of the formation of educational material for obtaining information for the electronic educational resource, the article considers: the principle of methodological orientation, the principle of general scientific orientation, the principle of systemic nature, the principle of fundamentalization, the principle of accounting intersubject communications, the principle of minimization. The principles of the formation of the electronic training module of practical studies in the article include: the principle of systematic and dose based consistency, the principle of rational use of study time, the principle of accessibility. The principles of the formation of the module for monitoring the electronic educational resource can be: the principle of the operationalization of goals, the principle of unified identification diagnosis.

  4. Implementing CORAL: An Electronic Resource Management System

    Science.gov (United States)

    Whitfield, Sharon

    2011-01-01

    A 2010 electronic resource management survey conducted by Maria Collins of North Carolina State University and Jill E. Grogg of University of Alabama Libraries found that the top six electronic resources management priorities included workflow management, communications management, license management, statistics management, administrative…

  5. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  6. Managing electronic resources a LITA guide

    CERN Document Server

    Weir, Ryan O

    2012-01-01

    Informative, useful, current, Managing Electronic Resources: A LITA Guide shows how to successfully manage time, resources, and relationships with vendors and staff to ensure personal, professional, and institutional success.

  7. Dynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in Machine to Machine (M2M) Communications.

    Science.gov (United States)

    Li, Ning; Cao, Chao; Wang, Cong

    2017-06-15

    Supporting simultaneous access of machine-type devices is a critical challenge in machine-to-machine (M2M) communications. In this paper, we propose an optimal scheme to dynamically adjust the Access Class Barring (ACB) factor and the number of random access channel (RACH) resources for clustered machine-to-machine (M2M) communications, in which Delay-Sensitive (DS) devices coexist with Delay-Tolerant (DT) ones. In M2M communications, since delay-sensitive devices share random access resources with delay-tolerant devices, reducing the resources consumed by delay-sensitive devices means that there will be more resources available to delay-tolerant ones. Our goal is to optimize the random access scheme, which can not only satisfy the requirements of delay-sensitive devices, but also take the communication quality of delay-tolerant ones into consideration. We discuss this problem from the perspective of delay-sensitive services by adjusting the resource allocation and ACB scheme for these devices dynamically. Simulation results show that our proposed scheme realizes good performance in satisfying the delay-sensitive services as well as increasing the utilization rate of the random access resources allocated to them.

  8. Natural Resource Management Schemes as Entry Points for Integrated Landscape Approaches: Evidence from Ghana and Burkina Faso.

    Science.gov (United States)

    Foli, Samson; Ros-Tonen, Mirjam A F; Reed, James; Sunderland, Terry

    2017-04-20

    In recognition of the failures of sectoral approaches to overcome global challenges of biodiversity loss, climate change, food insecurity and poverty, scientific discourse on biodiversity conservation and sustainable development is shifting towards integrated landscape governance arrangements. Current landscape initiatives however very much depend on external actors and funding, raising the question of whether, and how, and under what conditions, locally embedded resource management schemes can serve as entry points for the implementation of integrated landscape approaches. This paper assesses the entry point potential for three established natural resource management schemes in West Africa that target landscape degradation with involvement of local communities: the Chantier d'Aménagement Forestier scheme encompassing forest management sites across Burkina Faso and the Modified Taungya System and community wildlife resource management initiatives in Ghana. Based on a review of the current literature, we analyze the extent to which design principles that define a landscape approach apply to these schemes. We found that the CREMA meets most of the desired criteria, but that its scale may be too limited to guarantee effective landscape governance, hence requiring upscaling. Conversely, the other two initiatives are strongly lacking in their design principles on fundamental components regarding integrated approaches, continual learning, and capacity building. Monitoring and evaluation bodies and participatory learning and negotiation platforms could enhance the schemes' alignment with integrated landscape approaches.

  9. Z-Slicer: A Scheme for Shaping the Electron Beam Profile in a Linac

    Energy Technology Data Exchange (ETDEWEB)

    Thangaraj, J. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Crawford, D. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Broemmelsiek, D. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Thurman-Keup, R. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Baffes, C. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Wortley, W. [Univ. of Rochester, NY (United States)

    2014-01-01

    A train of short bunches ( 100 fs) are at a premium at accelerator facilities and their applications include terahertz (THz) generation, short bunch diagnostics, advanced accelerator R&D, etc. In this work we report on the design and simulation of an experiment involving a 20 MeV electron beam, that will be intercepted by a set of metallic slits inside a bunch compressor. After the mask, some electrons are scattered while other pass through unaffected. After exiting the bunch compressor, those electrons that were not affected by the slits will appear as short electron bunches. The key advantage of our scheme is its simplicity, tunability and low cost. The scheme does not require any additional hardware such as lasers, undulator, or transverse deflecting cavity. The tuning variable is only the RF-chirp. The detection of the bunching requires just a skew quad in the chicane and a transverse screen downstream.

  10. Iterative scheme for electronic systems: using one-electron Green's functions

    International Nuclear Information System (INIS)

    Hyslop, J.; Rees, D.

    1976-01-01

    An iterative generalization of the minimum principle proposed for electronic systems by Hall, Hyslop, and Rees is investigated. It is shown that this generalization still retains the advantage of using members of a larger class of trial wave functions, for example those with discontinuities, as initial approximations to the wave functions. This scheme has the advantage that, at each stage of iteration, an upper bound is obtained which is at least as good as that obtained previously. The theory is first applied to the hydrogen atom. It is then adapted to estimate the Hartree--Fock energy of the helium atom, the Hartree--Fock limit being obtained after a relatively small number of iterations

  11. Feedback scheme for kink instability in ERL based electron ion collider

    International Nuclear Information System (INIS)

    Hao, Y.; Litvinenko, V.N.; Ptitsyn, V.

    2011-01-01

    Kink instability presents one of the limiting factors from achieving higher luminosity in ERL based electron ion collider (EIC). However, we can take advantage of the flexibility of the linac and design a feedback system to cure the instability. This scheme raises the threshold of kink instability dramatically and provides opportunity for higher luminosity. We studied the effectiveness of this system and its dependence on the amplitude and phase of the feedback. In this paper we present results of theses studies of this scheme and describe its theoretical and practical limitations. The main advantage of an energy recovery linac (ERL) based electron ion collider (EIC) over a ring-ring type counterpart is the higher achievable luminosity. In ERL-based version, one electron beam collides with the opposing ion beam only once so that the beam-beam parameter can largely exceed the usual limitation in an electron collider ring, while the beam-beam parameter for the ion beam remains small values. The resulting luminosity may be enhanced by one order of magnitude. The beam dynamics related challenges also arise as the luminosity boost in ERL based EIC due to the significant beam-beam effect on the electron beam. The effects on the electron beam include the additional large beam-beam tune shift and nonlinear emittance growth, which are discussed. The ion beam may develop a head-tail type instability, referred as 'kink instability', through the interaction with the electron beam. In this paper, we discuss the feasibility of an active feedback system to mitigate the kink instability, by taking advantage of the flexibility of ERL. Throughout the paper, we will discuss the collision between proton and electron beam. Any other ion species can be scaled by its charge Z and ion mass A.

  12. Gender Analysis Of Electronic Information Resource Use: The Case ...

    African Journals Online (AJOL)

    Based on the findings the study concluded that access and use of electronic information resources creates a “social digital divide” along gender lines. The study ... Finally, the library needs to change its marketing strategies on the availability of electronic information resources to increase awareness of these resources.

  13. Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch injection scheme

    Directory of Open Access Journals (Sweden)

    A. G. Khachatryan

    2004-12-01

    Full Text Available Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001JTPLA20021-364010.1134/1.1427124; Phys. Rev. E 65, 046504 (2002PLEEE81063-651X10.1103/PhysRevE.65.046504]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser wakefield, considerably compressed and accelerated to an ultrarelativistic energy. In this paper we show the possibility of the generation of an extremely short (on the order of 1   μm long or a few femtoseconds in duration relativistic-electron-bunch by this mechanism. The initial electron bunch, which can be generated, for example, by a laser-driven photocathode rf gun, should have an energy of a few hundred keVs to a few MeVs, a duration in the picosecond range or less and a relatively low concentration. The trapping conditions and parameters of an accelerated bunch are investigated. The laser pulse dynamics as well as a possible experimental setup for the demonstration of the injection scheme are also considered.

  14. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  15. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  16. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem

    2016-01-01

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  17. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail

    2016-07-26

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  18. Closed-Loop Autofocus Scheme for Scanning Electron Microscope

    Directory of Open Access Journals (Sweden)

    Cui Le

    2015-01-01

    Full Text Available In this paper, we present a full scale autofocus approach for scanning electron microscope (SEM. The optimal focus (in-focus position of the microscope is achieved by maximizing the image sharpness using a vision-based closed-loop control scheme. An iterative optimization algorithm has been designed using the sharpness score derived from image gradient information. The proposed method has been implemented and validated using a tungsten gun SEM at various experimental conditions like varying raster scan speed, magnification at real-time. We demonstrate that the proposed autofocus technique is accurate, robust and fast.

  19. Distributed Joint Cluster Formation and Resource Allocation Scheme for Cooperative Data Collection in Virtual MIMO-Based M2M Networks

    Directory of Open Access Journals (Sweden)

    Xi Luan

    2015-01-01

    Full Text Available An efficient data collection scheme plays an important role for the real-time intelligent monitoring in many machine-to-machine (M2M networks. In this paper, a distributed joint cluster formation and resource allocation scheme for data collection in cluster-based M2M networks is proposed. Specifically, in order to utilize the advantages of cooperation, we first propose a hierarchical transmission model which contains two communication phases. In the first phase, the intracluster information sharing is carried out by all the nodes within the same cluster. Then these nodes transmit the total information to the BS cooperatively with virtual-MIMO (VMIMO protocol in the second phase. To grasp the properties and advantages of this cooperative transmission strategy, the theoretical analysis results are provided. The key issue in this system is to form the clusters and allocate resources efficiently. Since the optimization problem on this issue is an NP-hard problem, a feasible joint scheme for the cluster formation and resource allocation is proposed in this paper, which is carried out via coalition formation game with a distributed algorithm. This scheme can reduce the complexity while keeping an attractive performance. Simulation results show the properties of the proposed scheme and its advantages when comparing with the noncooperative scheme for the data collection in a practical scenario.

  20. Organizational matters of competition in electronic educational resources

    Directory of Open Access Journals (Sweden)

    Ирина Карловна Войтович

    2015-12-01

    Full Text Available The article examines the experience of the Udmurt State University in conducting competitions of educational publications and electronic resources. The purpose of such competitions is to provide methodological support to educational process. The main focus is on competition of electronic educational resources. The technology of such contests is discussed through detailed analysis of the main stages of the contest. It is noted that the main task of the preparatory stage of the competition is related to the development of regulations on competition and the definition of criteria for selection of the submitted works. The paper also proposes a system of evaluation criteria of electronic educational resources developed by members of the contest organizing committee and jury members. The article emphasizes the importance of not only the preparatory stages of the competition, but also measures for its completion, aimed at training teachers create quality e-learning resources.

  1. CHALLENGES OF ELECTRONIC INFORMATION RESOURCES IN ...

    African Journals Online (AJOL)

    This paper discusses the role of policy for proper and efficient library services in the electronic era. It points out some of the possible dangers of embarking in electronic resources without a proper focus at hand. Thus, it calls for today's librarians and policy makers to brainstorm and come up with working policies suitable to ...

  2. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  3. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks

    KAUST Repository

    Alqerm, Ismail

    2018-02-15

    Heterogeneous cloud radio access networks (H-CRAN) is a new trend of 5G that aims to leverage the heterogeneous and cloud radio access networks advantages. Low power remote radio heads (RRHs) are exploited to provide high data rates for users with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRAN. Therefore, we propose a centralized resource allocation scheme using online learning, which guarantees interference mitigation and maximizes energy efficiency while maintaining QoS requirements for all users. To foster the performance of such scheme with a model-free learning, we consider users\\' priority in resource blocks (RBs) allocation and compact state representation based learning methodology to enhance the learning process. Simulation results confirm that the proposed resource allocation solution can mitigate interference, increase energy and spectral efficiencies significantly, and maintain users\\' QoS requirements.

  4. Use of Electronic Resources in a Private University in Nigeria ...

    African Journals Online (AJOL)

    The study examined awareness and constraints in the use of electronic resources by lecturers and students of Ajayi Crowther University, Oyo, Nigeria. It aimed at justifying the resources expended in the provision of electronic resources in terms of awareness, patronage and factors that may be affecting awareness and use ...

  5. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-05-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system as potential replacements namely: Proquest 360 Resource Manager, Ex Libris Alma and Open Source CORAL ERMS. After comparing and trialling the systems, it was decided to go for Proquest 360 Resource Manager.

  6. The resource adequacy scheme in the Korean electricity market

    International Nuclear Information System (INIS)

    Kim, Hyunsook; Kim, Sung-Soo

    2012-01-01

    In South Korea, the incentive scheme for generators to add new power generation is based on the system marginal price (SMP) and the capacity payment (CP). The infra-marginal generators receive an extra margin due to the high SMP level and the new infra-marginal generators need to be built to achieve the optimal fuel mix. However, the Metropolitan zone needs more marginal generators due to the transmission congestion and environmental regulations, but the marginal generator in the Metropolitan zone does not have adequate profits for the new investment under the current CP. This paper suggests the appropriate investment incentive scheme for different zones. The introduction of forward capacity markets for different regions creates higher capacity market prices in the Metropolitan zone than those in the Southern zone. The introduction of forward capacity market also induces a new LNG generator investment in the Metropolitan zone while only new infra-marginal generators need to be added in the Southern zone. - Highlights: ► We suggest the introduction of a capacity market for resource adequacy in Korea. ► The current capacity payment does not induce the optimal fuel mix. ► The Southern zone needs more infra-marginal generators. ► The Metropolitan zone needs marginal generators due to transmission congestion. ► Zonal capacity markets induce the efficient generation investment across zones.

  7. use of electronic resources by graduate students of the department

    African Journals Online (AJOL)

    respondent's access electronic resources from the internet via Cybercafé .There is a high ... KEY WORDS: Use, Electronic Resources, Graduate Students, Cybercafé. INTRODUCTION ... Faculty of Education, University of Uyo, Uyo. Olu Olat ...

  8. Electronic resource management practical perspectives in a new technical services model

    CERN Document Server

    Elguindi, Anne

    2012-01-01

    A significant shift is taking place in libraries, with the purchase of e-resources accounting for the bulk of materials spending. Electronic Resource Management makes the case that technical services workflows need to make a corresponding shift toward e-centric models and highlights the increasing variety of e-formats that are forcing new developments in the field.Six chapters cover key topics, including: technical services models, both past and emerging; staffing and workflow in electronic resource management; implementation and transformation of electronic resource management systems; the ro

  9. An Electron Bunch Compression Scheme for a Superconducting Radio Frequency Linear Accelerator Driven Light Source

    Energy Technology Data Exchange (ETDEWEB)

    C. Tennant, S.V. Benson, D. Douglas, P. Evtushenko, R.A. Legg

    2011-09-01

    We describe an electron bunch compression scheme suitable for use in a light source driven by a superconducting radio frequency (SRF) linac. The key feature is the use of a recirculating linac to perform the initial bunch compression. Phasing of the second pass beam through the linac is chosen to de-chirp the electron bunch prior to acceleration to the final energy in an SRF linac ('afterburner'). The final bunch compression is then done at maximum energy. This scheme has the potential to circumvent some of the most technically challenging aspects of current longitudinal matches; namely transporting a fully compressed, high peak current electron bunch through an extended SRF environment, the need for a RF harmonic linearizer and the need for a laser heater. Additional benefits include a substantial savings in capital and operational costs by efficiently using the available SRF gradient.

  10. Utilization of electronic information resources by academic staff at ...

    African Journals Online (AJOL)

    The study investigated the utilization of Electronic Information resources by the academic staff of Makerere University in Uganda. It examined the academic staff awareness of the resources available, the types of resources provided by the Makerere University Library, the factors affecting resource utilization. The study was ...

  11. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-01-01

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration

  12. A conservative scheme of drift kinetic electrons for gyrokinetic simulation of kinetic-MHD processes in toroidal plasmas

    Science.gov (United States)

    Bao, J.; Liu, D.; Lin, Z.

    2017-10-01

    A conservative scheme of drift kinetic electrons for gyrokinetic simulations of kinetic-magnetohydrodynamic processes in toroidal plasmas has been formulated and verified. Both vector potential and electron perturbed distribution function are decomposed into adiabatic part with analytic solution and non-adiabatic part solved numerically. The adiabatic parallel electric field is solved directly from the electron adiabatic response, resulting in a high degree of accuracy. The consistency between electrostatic potential and parallel vector potential is enforced by using the electron continuity equation. Since particles are only used to calculate the non-adiabatic response, which is used to calculate the non-adiabatic vector potential through Ohm's law, the conservative scheme minimizes the electron particle noise and mitigates the cancellation problem. Linear dispersion relations of the kinetic Alfvén wave and the collisionless tearing mode in cylindrical geometry have been verified in gyrokinetic toroidal code simulations, which show that the perpendicular grid size can be larger than the electron collisionless skin depth when the mode wavelength is longer than the electron skin depth.

  13. Exponential discontinuous numerical scheme for electron transport in the continuous slowing down approximation

    International Nuclear Information System (INIS)

    Prinja, A.K.

    1997-01-01

    A nonlinear discretization scheme in space and energy, based on the recently developed exponential discontinuous method, is applied to continuous slowing down dominated electron transport (i.e., in the absence of scattering.) Numerical results for dose and charge deposition are obtained and compared against results from the ONELD and ONEBFP codes, and against exact results from an adjoint Monte Carlo code. It is found that although the exponential discontinuous scheme yields strictly positive and monotonic solutions, the dose profile is considerably straggled when compared to results from the linear codes. On the other hand, the linear schemes produce negative results which, furthermore, do not damp effectively in some cases. A general conclusion is that while yielding strictly positive solutions, the exponential discontinuous method does not show the crude cell accuracy for charged particle transport as was apparent for neutral particle transport problems

  14. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things.

    Science.gov (United States)

    Sun, Yanjing; Guo, Yiyu; Li, Song; Wu, Dapeng; Wang, Bin

    2018-05-15

    In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.

  15. Practical guide to electronic resources in the humanities

    CERN Document Server

    Dubnjakovic, Ana

    2010-01-01

    From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy-to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key eme

  16. Utilisation of Electronic Information Resources By Lecturers in ...

    African Journals Online (AJOL)

    This study assesses the use of information resources, specifically, electronic databases by lecturers/teachers in Universities and Colleges of Education in South Western Nigeria. Information resources are central to teachers' education. It provides lecturers/teachers access to information that enhances research and ...

  17. Discipline, availability of electronic resources and the use of Finnish National Electronic Library - FinELib

    Directory of Open Access Journals (Sweden)

    Sanna Torma

    2004-01-01

    Full Text Available This study elaborated relations between digital library use by university faculty, users' discipline and the availability of key resources in the Finnish National Electronic Library (FinELib, Finnish national digital library, by using nationwide representative survey data. The results show that the perceived availability of key electronic resources by researchers in FinELib was a stronger predictor of the frequency and purpose of use of its services than users' discipline. Regardless of discipline a good perceived provision of central resources led to a more frequent use of FinELib. The satisfaction with the services did not vary with the discipline, but with the perceived availability of resources.

  18. The Role of the Acquisitions Librarian in Electronic Resources Management

    Science.gov (United States)

    Pomerantz, Sarah B.

    2010-01-01

    With the ongoing shift to electronic formats for library resources, acquisitions librarians, like the rest of the profession, must adapt to the rapidly changing landscape of electronic resources by keeping up with trends and mastering new skills related to digital publishing, technology, and licensing. The author sought to know what roles…

  19. Analysis of Pedagogic Potential of Electronic Educational Resources with Elements of Autodidactics

    Directory of Open Access Journals (Sweden)

    Igor A.

    2018-03-01

    Full Text Available Introduction: in recent years didactic properties of electronic educational resources undergo considerable changes, nevertheless, the question of studying of such complete phenomenon as “an electronic educational resource with autodidactics elements” remains open, despite sufficient scientific base of researches of the terms making this concept. Article purpose – determination of essence of electronic educational resources with autodidactics elements. Materials and Methods: the main method of research was the theoretical analysis of the pedagogical and psychological literature on the problem under study. We used the theoretical (analysis, synthesis, comparison and generalization methods, the method of interpretation, pedagogical modeling, and empirical methods (observation, testing, conversation, interview, analysis of students’ performance, pedagogical experiment, peer review. Results: we detected the advantages of electronic educational resources in comparison with traditional ones. The concept of autodidactics as applied to the subject of research is considered. Properties of electronic educational resources with a linear and nonlinear principle of construction are studied.The influence of the principle of construction on the development of the learners’ qualities is shown. We formulated an integral definition of electronic educational resources with elements of autodidactics, namely, the variability, adaptivity and cyclicity of training. A model of the teaching-learning process with electronic educational resources is developed. Discussion and Conclusions: further development of a problem will allow to define whether electronic educational resources with autodidactics elements pedagogical potential for realization of educational and self-educational activity of teachers have, to modify technological procedures taking into account age features of students, their specialties and features of the organization of process of training of

  20. Preservation and conservation of electronic information resources of ...

    African Journals Online (AJOL)

    The major holdings of the broadcast libraries of the Nigerian Television Authority (NTA) are electronic information resources; therefore, providing safe places for general management of these resources have aroused interest in the industry in Nigeria for sometimes. The need to study the preservation and conservation of ...

  1. Building an electronic resource collection a practical guide

    CERN Document Server

    Lee, Stuart D

    2004-01-01

    This practical book guides information professionals step-by-step through building and managing an electronic resource collection. It outlines the range of electronic products currently available in abstracting and indexing, bibliographic, and other services and then describes how to effectively select, evaluate and purchase them.

  2. Analysis of Human Resources Management Strategy in China Electronic Commerce Enterprises

    Science.gov (United States)

    Shao, Fang

    The paper discussed electronic-commerce's influence on enterprise human resources management, proposed and proved the human resources management strategy which electronic commerce enterprise should adopt from recruitment strategy to training strategy, keeping talent strategy and other ways.

  3. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  4. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  5. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  6. Using XML Technologies to Organize Electronic Reference Resources

    OpenAIRE

    Huser, Vojtech; Del Fiol, Guilherme; Rocha, Roberto A.

    2005-01-01

    Provision of access to reference electronic resources to clinicians is becoming increasingly important. We have created a framework for librarians to manage access to these resources at an enterprise level, rather than at the individual hospital libraries. We describe initial project requirements, implementation details, and some preliminary results.

  7. Teaching the Z-Scheme of electron transport in photosynthesis: a perspective.

    Science.gov (United States)

    Mohapatra, Pradipta Kumar; Singh, Nihar Ranjan

    2015-01-01

    This paper deals with how Govindjee taught the Z-Scheme of electron transport in oxygenic photosynthesis at Ravenshaw University, Cuttack, Odisha, India, in 2014, in a unique and highly effective fashion-using students to act as molecules, representing the entire electron transport chain from water to nicotinamide adenine dinucleotide phosphate (NADP(+)). It culminated in a show by B.Sc. students in the garden of the Department of Botany, Ravenshaw University. The first author (PKM) personally acted as Ferredoxin NADP Reductase (FNR) catalyzing the reduction of NADP(+) to NADPH, taking electrons from reduced ferredoxin at the end of Photosystem I. On the other hand, the Q-cycle was played by M.Sc. students, who acted as molecules running this ingenious cycle that produces extra protons. An interesting event was when a student, acting as a herbicide, who was dressed like a devil (fierce looking, in black clothes with a sword; "Yamaraj: The God of Death", as he called himself), stopped all reactions by throwing out QB, the second plastoquinone molecule of Photosystem II, and that too aggressively, taking its position instead. The second author was the major organizer of the Z-scheme show. We provide here a basic background on the process, a bit on Govindjee's teaching, and some selected pictures from the drama played in March, 2014 at Ravenshaw University. Here, we also recognize the teacher Govindjee for his ingenious and fun-filled teaching methods that touched the hearts and the souls of the students as well as the teachers of Ravenshaw University. He was rated as one of the most-admired teachers of plant biology at our university.

  8. Electronic Resources and Mission Creep: Reorganizing the Library for the Twenty-First Century

    Science.gov (United States)

    Stachokas, George

    2009-01-01

    The position of electronic resources librarian was created to serve as a specialist in the negotiation of license agreements for electronic resources, but mission creep has added more functions to the routine work of electronic resources such as cataloging, gathering information for collection development, and technical support. As electronic…

  9. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system

  10. New injection scheme using a pulsed quadrupole magnet in electron storage rings

    Directory of Open Access Journals (Sweden)

    Kentaro Harada

    2007-12-01

    Full Text Available We demonstrated a new injection scheme using a single pulsed quadrupole magnet (PQM with no pulsed local bump at the Photon Factory Advanced Ring (PF-AR in High Energy Accelerator Research Organization (KEK. The scheme employs the basic property of a quadrupole magnet, that the field at the center is zero, and nonzero elsewhere. The amplitude of coherent betatron oscillation of the injected beam is effectively reduced by the PQM; then, the injected beam is captured into the ring without largely affecting the already stored beam. In order to investigate the performance of the scheme with a real beam, we built the PQM providing a higher field gradient over 3  T/m and a shorter pulse width of 2.4  μs, which is twice the revolution period of the PF-AR. After the field measurements confirmed the PQM specifications, we installed it into the ring. Then, we conducted the experiment using a real beam and consequently succeeded in storing the beam current of more than 60 mA at the PF-AR. This is the first successful beam injection using a single PQM in electron storage rings.

  11. Generation of relativistic electron beam and its anomalous stopping in the fast ignition scheme

    International Nuclear Information System (INIS)

    Sengupta, S.; Sandhu, A.S.; Dharmadhikari, A.K.; Kumar, G.R.; Das, A.; Kaw, P.K.

    2005-01-01

    We present experimental/theoretical results concerning two main physics issues related to the fast ignition scheme viz. the nonlinear mechanism of conversion of incident laser energy into a relativistic electron beam at the critical layer and its subsequent transport through an overdense plasma. Theoretical/numerical modelling of the experimental data, firstly shows that the conversion of the laser energy into an inward propagating electron beam occurs through the nonlinear mechanism of wave breaking of plasma waves excited at the critical layer and, secondly the transport of the electron beam through the overdense plasma is influenced by electrostatically induced and/or turbulence induced anomalous resistivity. (author)

  12. Interest of seeing Precision Viticulture through two distributed competences: Determination of resources and schemes allowing some practical recommendations

    OpenAIRE

    Moreiro Leslie B.

    2017-01-01

    The aim of this article is to better understand resources needed and constraints to avoid in implementation of Precision Viticulture technologies. In this view, we adapt distributed cognition theory to multilevel model of competence in management sciences. We use a qualitative methodology based on semi-structured interviews in 7 cases study. The main results allow us to distinguish the two aspects of Precision Viticulture, artifacts, providers of resources, and their utilization scheme. Furth...

  13. The Internet School of Medicine: use of electronic resources by medical trainees and the reliability of those resources.

    Science.gov (United States)

    Egle, Jonathan P; Smeenge, David M; Kassem, Kamal M; Mittal, Vijay K

    2015-01-01

    Electronic sources of medical information are plentiful, and numerous studies have demonstrated the use of the Internet by patients and the variable reliability of these sources. Studies have investigated neither the use of web-based resources by residents, nor the reliability of the information available on these websites. A web-based survey was distributed to surgical residents in Michigan and third- and fourth-year medical students at an American allopathic and osteopathic medical school and a Caribbean allopathic school regarding their preferred sources of medical information in various situations. A set of 254 queries simulating those faced by medical trainees on rounds, on a written examination, or during patient care was developed. The top 5 electronic resources cited by the trainees were evaluated for their ability to answer these questions accurately, using standard textbooks as the point of reference. The respondents reported a wide variety of overall preferred resources. Most of the 73 responding medical trainees favored textbooks or board review books for prolonged studying, but electronic resources are frequently used for quick studying, clinical decision-making questions, and medication queries. The most commonly used electronic resources were UpToDate, Google, Medscape, Wikipedia, and Epocrates. UpToDate and Epocrates had the highest percentage of correct answers (47%) and Wikipedia had the lowest (26%). Epocrates also had the highest percentage of wrong answers (30%), whereas Google had the lowest percentage (18%). All resources had a significant number of questions that they were unable to answer. Though hardcopy books have not been completely replaced by electronic resources, more than half of medical students and nearly half of residents prefer web-based sources of information. For quick questions and studying, both groups prefer Internet sources. However, the most commonly used electronic resources fail to answer clinical queries more than half

  14. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    Science.gov (United States)

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  15. ANALYTICAL REVIEW OF ELECTRONIC RESOURCES FOR THE STUDY OF LATIN

    Directory of Open Access Journals (Sweden)

    Olena Yu. Balalaieva

    2014-04-01

    Full Text Available The article investigates the current state of development of e-learning content in the Latin language. It is noted that the introduction of ICT in the educational space has expanded the possibility of studying Latin, opened access to digital libraries resources, made it possible to use scientific and educational potential and teaching Latin best practices of world's leading universities. A review of foreign and Ukrainian information resources and electronic editions for the study of Latin is given. Much attention was paid to the didactic potential of local and online multimedia courses of Latin, electronic textbooks, workbooks of interactive tests and exercises, various dictionaries and software translators, databases and digital libraries. Based on analysis of the world market of educational services and products the main trends in the development of information resources and electronic books are examined. It was found that multimedia courses with interactive exercises or workbooks with interactive tests, online dictionaries and translators are the most widely represented and demanded. The noticeable lagging of Ukrainian education and computer linguistics in quantitative and qualitative measures in this industry is established. The obvious drawback of existing Ukrainian resources and electronic editions for the study of Latin is their noninteractive nature. The prospects of e-learning content in Latin in Ukraine are outlined.

  16. Elektronik Bilgi Kaynaklarının Seçimi / Selection of Electronic Information Resources

    Directory of Open Access Journals (Sweden)

    Pınar Al

    2003-04-01

    Full Text Available For many years, library users have used only from the printed media in order to get the information that they have needed. Today with the widespread use of the Web and the addition of electronic information resources to library collections, the use of information in the electronic environment as well as in printed media is started to be used. In time, such types of information resources as, electronic journals, electronic books, electronic encyclopedias, electronic dictionaries and electronic theses have been added to library collections. In this study, selection criteria that can be used for electronic information resources are discussed and suggestions are provided for libraries that try to select electronic information resources for their collections.

  17. Access to electronic resources by visually impaired people

    Directory of Open Access Journals (Sweden)

    Jenny Craven

    2003-01-01

    Full Text Available Research into access to electronic resources by visually impaired people undertaken by the Centre for Research in Library and Information Management has not only explored the accessibility of websites and levels of awareness in providing websites that adhere to design for all principles, but has sought to enhance understanding of information seeking behaviour of blind and visually impaired people when using digital resources.

  18. Transverse velocity modulator and generator schemes based on non-collinear radiation and electron beams

    CERN Document Server

    Varfolomeev, A A

    2000-01-01

    New non-collinear schemes are suggested for transverse velocity modulation of electron beams and for the generation of coherent spontaneous radiation by these transversely modulated beams. It is shown that due to the non-collinearity some orders of magnitude enhancement can be achieved for the coherent spontaneous radiation (CSR) power at both the fundamental and harmonic frequencies.

  19. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  20. Why and How to Measure the Use of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Jean Bernon

    2008-11-01

    Full Text Available A complete overview of library activity implies a complete and reliable measurement of the use of both electronic resources and printed materials. This measurement is based on three sets of definitions: document types, use types and user types. There is a common model of definitions for printed materials, but a lot of questions and technical issues remain for electronic resources. In 2006 a French national working group studied these questions. It relied on the COUNTER standard, but found it insufficient and pointed out the need for local tools such as web markers and deep analysis of proxy logs. Within the French national consortium COUPERIN, a new working group is testing ERMS, SUSHI standards, Shibboleth authentication, along with COUNTER standards, to improve the counting of the electronic resources use. At this stage this counting is insufficient and its improvement will be a European challenge for the future.

  1. Euler European Libraries and Electronic Resources in Mathematical Sciences

    CERN Document Server

    The Euler Project. Karlsruhe

    The European Libraries and Electronic Resources (EULER) Project in Mathematical Sciences provides the EulerService site for searching out "mathematical resources such as books, pre-prints, web-pages, abstracts, proceedings, serials, technical reports preprints) and NetLab (for Internet resources), this outstanding engine is capable of simple, full, and refined searches. It also offers a browse option, which responds to entries in the author, keyword, and title fields. Further information about the Project is provided at the EULER homepage.

  2. Effects of Electronic Information Resources Skills Training for Lecturers on Pedagogical Practices and Research Productivity

    Science.gov (United States)

    Bhukuvhani, Crispen; Chiparausha, Blessing; Zuvalinyenga, Dorcas

    2012-01-01

    Lecturers use various electronic resources at different frequencies. The university library's information literacy skills workshops and seminars are the main sources of knowledge of accessing electronic resources. The use of electronic resources can be said to have positively affected lecturers' pedagogical practices and their work in general. The…

  3. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  4. Electronic Commerce Resource Centers. An Industry--University Partnership.

    Science.gov (United States)

    Gulledge, Thomas R.; Sommer, Rainer; Tarimcilar, M. Murat

    1999-01-01

    Electronic Commerce Resource Centers focus on transferring emerging technologies to small businesses through university/industry partnerships. Successful implementation hinges on a strategic operating plan, creation of measurable value for customers, investment in customer-targeted training, and measurement of performance outputs. (SK)

  5. Scheme for secure swapping two unknown states of a photonic qubit and an electron-spin qubit using simultaneous quantum transmission and teleportation via quantum dots inside single-sided optical cavities

    Energy Technology Data Exchange (ETDEWEB)

    Heo, Jino [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Kang, Min-Sung [Center for Quantum Information, Korea Institute of Science and Technology (KIST), Seoul, 136-791 (Korea, Republic of); Hong, Chang-Ho [National Security Research Institute, P.O.Box 1, Yuseong, Daejeon, 34188 (Korea, Republic of); Choi, Seong-Gon [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Hong, Jong-Phil, E-mail: jongph@cbnu.ac.kr [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of)

    2017-06-15

    We propose a scheme for swapping two unknown states of a photon and electron spin confined to a charged quantum dot (QD) between two users by transferring a single photon. This scheme simultaneously transfers and teleports an unknown state (electron spin) between two users. For this bidirectional quantum communication, we utilize the interactions between a photonic and an electron-spin qubits of a QD located inside a single-sided optical cavity. Thus, our proposal using QD-cavity systems can obtain a certain success probability with high fidelity. Furthermore, compared to a previous scheme using cross-Kerr nonlinearities and homodyne detections, our scheme (using QD-cavity systems) can improve the feasibility under the decoherence effect in practice. - Highlights: • Design of Simultaneous quantum transmission and teleportation scheme via quantum dots and cavities. • We have developed the experimental feasibility of this scheme compared with the existing scheme. • Analysis of some benefits when our scheme is experimentally implemented using quantum dots and single-sided cavities.

  6. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  7. Design and implementation of an optimal laser pulse front tilting scheme for ultrafast electron diffraction in reflection geometry with high temporal resolution

    Directory of Open Access Journals (Sweden)

    Francesco Pennacchio

    2017-07-01

    Full Text Available Ultrafast electron diffraction is a powerful technique to investigate out-of-equilibrium atomic dynamics in solids with high temporal resolution. When diffraction is performed in reflection geometry, the main limitation is the mismatch in group velocity between the overlapping pump light and the electron probe pulses, which affects the overall temporal resolution of the experiment. A solution already available in the literature involved pulse front tilt of the pump beam at the sample, providing a sub-picosecond time resolution. However, in the reported optical scheme, the tilted pulse is characterized by a temporal chirp of about 1 ps at 1 mm away from the centre of the beam, which limits the investigation of surface dynamics in large crystals. In this paper, we propose an optimal tilting scheme designed for a radio-frequency-compressed ultrafast electron diffraction setup working in reflection geometry with 30 keV electron pulses containing up to 105 electrons/pulse. To characterize our scheme, we performed optical cross-correlation measurements, obtaining an average temporal width of the tilted pulse lower than 250 fs. The calibration of the electron-laser temporal overlap was obtained by monitoring the spatial profile of the electron beam when interacting with the plasma optically induced at the apex of a copper needle (plasma lensing effect. Finally, we report the first time-resolved results obtained on graphite, where the electron-phonon coupling dynamics is observed, showing an overall temporal resolution in the sub-500 fs regime. The successful implementation of this configuration opens the way to directly probe structural dynamics of low-dimensional systems in the sub-picosecond regime, with pulsed electrons.

  8. A novel experimental scheme of electron scattering off unstable nuclei with a self-confining radioactive ion target (SCRIT)

    International Nuclear Information System (INIS)

    Wakasugi, Masanori

    2005-01-01

    We proposed a new experimental scheme of an electron scattering off unstable nuclei using a Self-Confining Radioactive Ion Target (SCRIT). The SCRIT is an unstable ion target formed in the electron storage ring, and is based on completely new idea. We constructed prototype of the SCRIT device and installed it in the electron storage ring KSR in Kyoto University. In the test experiment, 10 7 -Cs ions are confined in the SCRIT with the lifetime of about 2 s and the feasibility of the SCRIT as the target has been confirmed. (author)

  9. USE OF ELECTRONIC EDUCATIONAL RESOURCES WHEN TRAINING IN WORK WITH SPREADSHEETS

    Directory of Open Access Journals (Sweden)

    Х А Гербеков

    2017-12-01

    Full Text Available Today the tools for maintaining training courses based on opportunities of information and communication technologies are developed. Practically in all directions of preparation and on all subject matters electronic textbook and self-instruction manuals are created. Nevertheless the industry of computer educational and methodical materials actively develops and gets more and more areas of development and introduction. In this regard more and more urgent is a problem of development of the electronic educational resources adequate to modern educational requirements. Creation and the organization of training courses with use of electronic educational resources in particular on the basis of Internet technologies remains a difficult methodical task.In article the questions connected with development of electronic educational resources for use when studying the substantial line “Information technologies” of a school course of informatics in particular for studying of spreadsheets are considered. Also the analysis of maintenance of a school course and the unified state examination from the point of view of representation of task in him corresponding to the substantial line of studying “Information technologies” on mastering technology of information processing in spreadsheets and the methods of visualization given by means of charts and schedules is carried out.

  10. A Harmonic Kicker Scheme for the Circulator Cooler Ring in the Proposed Medium Energy Electron-Ion Collider

    Energy Technology Data Exchange (ETDEWEB)

    Nissen, Edward W.; Hutton, Andrew M.; Kimber, Andrew J.

    2013-06-01

    The current electron cooler design for the proposed Medium Energy Electron-Ion collider (MEIC) at Jefferson Lab utilizes a circulator ring for reuse of the cooling electron bunch up to 100 times to cool the ion beams. This cooler requires a fast kicker system for injecting and extracting individual bunches in the circulator ring. Such a kicker must work at a high repetition rate, up to 7.5 to 75 MHz depending on the number of turns in the recirculator ring. It also must have a very short rise and fall time (of order of 1 ns) such that it will kick an individual bunch without disturbing the others in the ring. Both requirements are orders of magnitude beyond the present state-of-the-art as well as the goals of other on-going kicker R&D programs such as that for the ILC damping rings. In this paper we report a scheme of creating this fast, high repetition rate kicker by combining RF waveforms at multiple frequencies to create a kicker waveform that will, for example, kick every eleventh bunch while leaving the other ten unperturbed. We also present a possible implementation of this scheme as well as discuss its limitations.

  11. Interest of seeing Precision Viticulture through two distributed competences: Determination of resources and schemes allowing some practical recommendations

    Directory of Open Access Journals (Sweden)

    Moreiro Leslie B.

    2017-01-01

    Full Text Available The aim of this article is to better understand resources needed and constraints to avoid in implementation of Precision Viticulture technologies. In this view, we adapt distributed cognition theory to multilevel model of competence in management sciences. We use a qualitative methodology based on semi-structured interviews in 7 cases study. The main results allow us to distinguish the two aspects of Precision Viticulture, artifacts, providers of resources, and their utilization scheme. Furthermore, Precision Viticulture is decomposed here in two tasks. The first task is characterization of heterogeneity. The second is modulation of technical itineraries. These two tasks are complementary. In addition, we present ours results by highlighting resources used by firm using these technologies and constraints that they face. Finally, with these results, we can do some practical recommendations to designers and users of these technologies.

  12. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  13. Analytical Study of Usage of Electronic Information Resources at Pharmacopoeial Libraries in India

    Directory of Open Access Journals (Sweden)

    Sunil Tyagi

    2014-02-01

    Full Text Available The objective of this study is to know the rate and purpose of the use of e-resource by the scientists at pharmacopoeial libraries in India. Among other things, this study examined the preferences of the scientists toward printed books and journals, electronic information resources, and pattern of using e-resources. Non-probability sampling specially accidental and purposive technique was applied in the collection of primary data through administration of user questionnaire. The sample respondents chosen for the study consists of principle scientific officer, senior scientific officer, scientific officer, and scientific assistant of different division of the laboratories, namely, research and development, pharmaceutical chemistry, pharmacovigilance, pharmacology, pharmacogonosy, and microbiology. The findings of the study reveal the personal experiences and perceptions they have had on practice and research activity using e-resource. The major findings indicate that of the total anticipated participants, 78% indicated that they perceived the ability to use computer for electronic information resources. The data analysis shows that all the scientists belonging to the pharmacopoeial libraries used electronic information resources to address issues relating to drug indexes and compendia, monographs, drugs obtained through online databases, e-journals, and the Internet sources—especially polices by regulatory agencies, contacts, drug promotional literature, and standards.

  14. Page 170 Use of Electronic Resources by Undergraduates in Two ...

    African Journals Online (AJOL)

    undergraduate students use electronic resources such as NUC virtual library, HINARI, ... web pages articles from magazines, encyclopedias, pamphlets and other .... of Nigerian university libraries have Internet connectivity, some of the system.

  15. Model of e-learning with electronic educational resources of new generation

    Directory of Open Access Journals (Sweden)

    A. V. Loban

    2017-01-01

    Full Text Available Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with electronic educational resource of new generation is developed, conditionally decomposed into three basic components: the formalization model of the course in the form of the thesaurusclassifier (“Author of e-resource”, the model of learning as management (“Coordination. Consultation. Control”, the learning model with the thesaurus-classifier (“Student”. Model “Author of e-resource” allows the student to achieve completeness, high degree of didactic elaboration and structuring of the studied material in triples of variants: modules of education information, practical task and control tasks; the result of the student’s (author’s of e-resource activity is the thesaurus-classifier. Model of learning as management is based on the principle of personal orientation of learning in computer environment and determines the logic of interaction between the lecturer and the student when determining the triple of variants individually for each student; organization of a dialogue between the lecturer and the student for consulting purposes; personal control of the student’s success (report generation and iterative search for the concept of the class assignment in the thesaurus-classifier before acquiring the required level of training. Model “Student” makes it possible to concretize the learning tasks in relation to the personality of the student and to the training level achieved; the assumption of the lecturer about the level of training of a

  16. A survey of the use of electronic scientific information resources among medical and dental students

    Directory of Open Access Journals (Sweden)

    Aarnio Matti

    2006-05-01

    Full Text Available Abstract Background To evaluate medical and dental students' utilization of electronic information resources. Methods A web survey sent to 837 students (49.9% responded. Results Twenty-four per cent of medical students and ninteen per cent of dental students searched MEDLINE 2+ times/month for study purposes, and thiry-two per cent and twenty-four per cent respectively for research. Full-text articles were used 2+ times/month by thirty-three per cent of medical and ten per cent of dental students. Twelve per cent of respondents never utilized either MEDLINE or full-text articles. In multivariate models, the information-searching skills among students were significantly associated with use of MEDLINE and full-text articles. Conclusion Use of electronic resources differs among students. Forty percent were non-users of full-text articles. Information-searching skills are correlated with the use of electronic resources, but the level of basic PC skills plays not a major role in using these resources. The student data shows that adequate training in information-searching skills will increase the use of electronic information resources.

  17. Access to electronic information resources by students of federal ...

    African Journals Online (AJOL)

    The paper discusses access to electronic information resources by students of Federal Colleges of Education in Eha-Amufu and Umunze. Descriptive survey design was used to investigate sample of 526 students. Sampling technique used was a Multi sampling technique. Data for the study were generated using ...

  18. Adoption and use of electronic information resources by medical ...

    African Journals Online (AJOL)

    This study investigated the adoption and use of electronic information resources by medical science students of the University of Benin. The descriptive survey research design was adopted for the study and 390 students provided the data. Data collected were analysed with descriptive Statistics(Simple percentage and ...

  19. Economic scheme for remote preparation of an arbitrary five-qubit ...

    Indian Academy of Sciences (India)

    advantage of the present scheme is that the entanglement resource can be reduced ... tanglement is also a very important physical resource in quantum information processing. .... on the qubit B3, and thus the state (10) will be transformed into ... Hence, we claim our scheme is feasible according to current technologies, and.

  20. Quasi Path Restoration: A post-failure recovery scheme over pre-allocated backup resource for elastic optical networks

    Science.gov (United States)

    Yadav, Dharmendra Singh; Babu, Sarath; Manoj, B. S.

    2018-03-01

    Spectrum conflict during primary and backup routes assignment in elastic optical networks results in increased resource consumption as well as high Bandwidth Blocking Probability. In order to avoid such conflicts, we propose a new scheme, Quasi Path Restoration (QPR), where we divide the available spectrum into two: (1) primary spectrum (for primary routes allocation) and (2) backup spectrum (for rerouting the data on link failures). QPR exhibits three advantages over existing survivable strategies such as Shared Path Protection (SPP), Primary First Fit Backup Last Fit (PFFBLF), Jointly Releasing and re-establishment Defragmentation SPP (JRDSSPP), and Path Restoration (PR): (1) the conflict between primary and backup spectrum during route assignment is completely eliminated, (2) upon a link failure, connection recovery requires less backup resources compared to SPP, PFFBLF, and PR, and (3) availability of the same backup spectrum on each link improves the recovery guarantee. The performance of our scheme is analyzed with different primary backup spectrum partitions on varying connection-request demands and number of frequency slots. Our results show that QPR provides better connection recovery guarantee and Backup Resources Utilization (BRU) compared to bandwidth recovery of PR strategy. In addition, we compare QPR with Shared Path Protection and Primary First-Fit Backup Last Fit strategies in terms of Bandwidth Blocking Probability (BBP) and average frequency slots per connection request. Simulation results show that BBP of SPP, PFFBLF, and JRDSPP varies between 18.59% and 14.42%, while in QPR, BBP ranges from 2.55% to 17.76% for Cost239, NSFNET, and ARPANET topologies. Also, QPR provides bandwidth recovery between 93.61% and 100%, while in PR, the recovery ranges from 86.81% to 98.99%. It is evident from our analysis that QPR provides a reasonable trade-off between bandwidth blocking probability and connection recoverability.

  1. Where Do Electronic Books Fit in the College Research Arsenal of Resources?

    Science.gov (United States)

    Barbier, Patricia

    2007-01-01

    Student use of electronic books has become an accepted supplement to traditional resources. Student use and satisfaction was monitored through an online course discussion board. Increased use of electronic books indicate this service is an accepted supplement to the print book collection.

  2. Strategic Planning for Electronic Resources Management: A Case Study at Gustavus Adolphus College

    Science.gov (United States)

    Hulseberg, Anna; Monson, Sarah

    2009-01-01

    Electronic resources, the tools we use to manage them, and the needs and expectations of our users are constantly evolving; at the same time, the roles, responsibilities, and workflow of the library staff who manage e-resources are also in flux. Recognizing a need to be more intentional and proactive about how we manage e-resources, the…

  3. REVIEW OF MOODLE PLUGINS FOR DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES FROM LANGUAGE DISCIPLINES

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2015-09-01

    Full Text Available Today the problem of designing multimedia electronic educational resources from language disciplines in Moodle is very important. This system has a lot of different, powerful resources, plugins to facilitate the learning of students with language disciplines. This article presents an overview and comparative analysis of the five Moodle plugins for designing multimedia electronic educational resources from language disciplines. There have been considered their key features and functionality in order to choose the best for studying language disciplines in the Moodle. Plugins are compared by a group of experts according to the criteria: efficiency, functionality and easy use. For a comparative analysis of the plugins it is used the analytic hierarchy process.

  4. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  5. Modern ICT Tools: Online Electronic Resources Sharing Using Web ...

    African Journals Online (AJOL)

    Modern ICT Tools: Online Electronic Resources Sharing Using Web 2.0 and Its Implications For Library And Information Practice In Nigeria. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more ...

  6. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2017-10-01

    Full Text Available The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system should be assessed. Developed a model for the development of the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system, which is based on the main scientific approaches, used in adult education, and consists of five blocks: target, informative, technological, diagnostic and effective.

  7. Developing Humanities Collections in the Digital Age: Exploring Humanities Faculty Engagement with Electronic and Print Resources

    Science.gov (United States)

    Kachaluba, Sarah Buck; Brady, Jessica Evans; Critten, Jessica

    2014-01-01

    This article is based on quantitative and qualitative research examining humanities scholars' understandings of the advantages and disadvantages of print versus electronic information resources. It explores how humanities' faculty members at Florida State University (FSU) use print and electronic resources, as well as how they perceive these…

  8. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

    Directory of Open Access Journals (Sweden)

    Tsung-Chih Hsiao

    2017-01-01

    Full Text Available Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders. With the rapid development of technologies and network applications, electronization has been actively promoted globally during the social transformation period that the concept of electronic voting is further derived. The major advantages of electronic voting, comparing with traditional voting, lie in the mobility strength of electronic voting, reducing a large amount of election costs and enhancing the convenience for the public. Electronic voting allows voters completing voting on the Internet that not only are climate and location restrictions overcome, but the voter turnout is also increased and the voting time is reduced for the public. With the development in the past three decades, electronic voting presents outstanding performance theoretically and practically. Nevertheless, it is regrettable that electronic voting schemes still cannot be completely open because of lures by money and threats. People to lure by money and threats would confirm the voters following their instructions through various methods that more factors would appear on election results, affecting the quality and fairness of the election. In this study, this project aims to design an electronic voting scheme which could actually defend voters’ free will so that lure of money and threats would fail. Furthermore, an electronic voting system based on Elliptic Curve Cryptography is proposed to ensure the efficiency and security, and Ring Signature and Signcryption are applied to reducing the computing costs. Moreover, this project also focuses on applying voting system to mobile devices. As the system efficiency and security are emphasized, voters do not need to participate in the election, but simply complete voting with smart phones, i

  9. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  10. Multi-Objective Resource Allocation Scheme for D2D Multicast with QoS Guarantees in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Fangmin Li

    2016-09-01

    Full Text Available Device-to-device (D2D multicast communication can greatly improve the spectrum utilization in a content delivery scenario. However, the co-channel interference and power consumption brought by D2D bring new challenges. All the D2D multicast groups expect to achieve a higher system capacity with less extra energy cost. In this paper, we investigate the uplink resource allocation issue when D2D multicast groups share the resources with other cellular uses (CUs, while guaranteeing a certain level of quality of service (QoS to CUs and D2D users. Firstly we address a flexible tradeoff framework in which the system power consumption and the system capacity (i.e., the number of admitted D2D links are assigned with different weight factors so that these two objectives are jointly considered. Then we propose an efficient resource optimization scheme, which comprises sub-channel allocation and signal-to-interference- plus-noise ratio (SINR assignment. Numerical results validate the effectiveness of the proposed framework, and demonstrate the advantages in dealing with the proposed multi-objective optimization problem.

  11. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  12. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fapojuwo Abraham O

    2007-01-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  13. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2007-11-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  14. Electronic resource management systems a workflow approach

    CERN Document Server

    Anderson, Elsa K

    2014-01-01

    To get to the bottom of a successful approach to Electronic Resource Management (ERM), Anderson interviewed staff at 11 institutions about their ERM implementations. Among her conclusions, presented in this issue of Library Technology Reports, is that grasping the intricacies of your workflow-analyzing each step to reveal the gaps and problems-at the beginning is crucial to selecting and implementing an ERM. Whether the system will be used to fill a gap, aggregate critical data, or replace a tedious manual process, the best solution for your library depends on factors such as your current soft

  15. Electronic Resource Management System. Vernetzung von Lizenzinformationen

    Directory of Open Access Journals (Sweden)

    Michaela Selbach

    2014-12-01

    Full Text Available In den letzten zehn Jahren spielen elektronische Ressourcen im Bereich der Erwerbung eine zunehmend wichtige Rolle: Eindeutig lässt sich hier ein Wandel in den Bibliotheken (fort vom reinen Printbestand zu immer größeren E-Only-Beständen feststellen. Die stetig wachsende Menge an E-Ressourcen und deren Heterogenität stellt Bibliotheken vor die Herausforderung, die E-Ressourcen effizient zu verwalten. Nicht nur Bibliotheken, sondern auch verhandlungsführende Institutionen von Konsortial- und Allianzlizenzen benötigen ein geeignetes Instrument zur Verwaltung von Lizenzinformationen, welches den komplexen Anforderungen moderner E-Ressourcen gerecht wird. Die Deutsche Forschungsgemeinschaft (DFG unterstützt ein Projekt des Hochschulbibliothekszentrums des Landes Nordrhein-Westfalen (hbz, der Universitätsbibliothek Freiburg, der Verbundzentrale des Gemeinsamen Bibliotheksverbundes (GBV und der Universitätsbibliothek Frankfurt, in dem ein bundesweit verfügbares Electronic Ressource Managementsystem (ERMS aufgebaut werden soll. Ein solches ERMS soll auf Basis einer zentralen Knowledge Base eine einheitliche Nutzung von Daten zur Lizenzverwaltung elektronischer Ressourcen auf lokaler, regionaler und nationaler Ebene ermöglichen. Statistische Auswertungen, Rechteverwaltung für alle angeschlossenen Bibliotheken, kooperative Datenpflege sowie ein über standardisierte Schnittstellen geführter Datenaustausch stehen bei der Erarbeitung der Anforderungen ebenso im Fokus wie die Entwicklung eines Daten- und Funktionsmodells. In the last few years the importance of electronic resources in library acquisitions has increased significantly. There has been a shift from mere print holdings to both e- and print combinations and even e-only subscriptions. This shift poses a double challenge for libraries: On the one hand they have to provide their e-resource collections to library users in an appealing way, on the other hand they have to manage these

  16. The Electron Microscopy Outreach Program: A Web-based resource for research and education.

    Science.gov (United States)

    Sosinsky, G E; Baker, T S; Hand, G; Ellisman, M H

    1999-01-01

    We have developed a centralized World Wide Web (WWW)-based environment that serves as a resource of software tools and expertise for biological electron microscopy. A major focus is molecular electron microscopy, but the site also includes information and links on structural biology at all levels of resolution. This site serves to help integrate or link structural biology techniques in accordance with user needs. The WWW site, called the Electron Microscopy (EM) Outreach Program (URL: http://emoutreach.sdsc.edu), provides scientists with computational and educational tools for their research and edification. In particular, we have set up a centralized resource containing course notes, references, and links to image analysis and three-dimensional reconstruction software for investigators wanting to learn about EM techniques either within or outside of their fields of expertise. Copyright 1999 Academic Press.

  17. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  18. Technical Communicator: A New Model for the Electronic Resources Librarian?

    Science.gov (United States)

    Hulseberg, Anna

    2016-01-01

    This article explores whether technical communicator is a useful model for electronic resources (ER) librarians. The fields of ER librarianship and technical communication (TC) originated and continue to develop in relation to evolving technologies. A review of the literature reveals four common themes for ER librarianship and TC. While the…

  19. An improved experimental scheme for simultaneous measurement of high-resolution zero electron kinetic energy (ZEKE) photoelectron and threshold photoion (MATI) spectra

    Science.gov (United States)

    Michels, François; Mazzoni, Federico; Becucci, Maurizio; Müller-Dethlefs, Klaus

    2017-10-01

    An improved detection scheme is presented for threshold ionization spectroscopy with simultaneous recording of the Zero Electron Kinetic Energy (ZEKE) and Mass Analysed Threshold Ionisation (MATI) signals. The objective is to obtain accurate dissociation energies for larger molecular clusters by simultaneously detecting the fragment and parent ion MATI signals with identical transmission. The scheme preserves an optimal ZEKE spectral resolution together with excellent separation of the spontaneous ion and MATI signals in the time-of-flight mass spectrum. The resulting improvement in sensitivity will allow for the determination of dissociation energies in clusters with substantial mass difference between parent and daughter ions.

  20. MODEL OF AN ELECTRONIC EDUCATIONAL RESOURCE OF NEW GENERATION

    Directory of Open Access Journals (Sweden)

    Anatoliy V. Loban

    2016-01-01

    Full Text Available The mathematical structure of the modular architecture of an electronic educational resource (EER of new generation, which allows to decompose the process of studying the subjects of the course at a hierarchically ordered set of data (knowledge and procedures for manipulating them, to determine the roles of participants of process of training of and technology the development and use of EOR in the study procrate.

  1. Performance Analysis of Savonius Rotor Based Hydropower Generation Scheme with Electronic Load Controller

    Directory of Open Access Journals (Sweden)

    Rajen Pudur

    2016-01-01

    Full Text Available This paper describes the performance of electronic load controller (ELC of asynchronous generator (AG coupled to an uncontrolled Savonius turbine and variable water velocity. An AC-DC-AC converter with a dc link capacitor is employed to maintain the required frequency. The ELC which is feeding a resistive dump load is connected in parallel with the generating system and the power consumption is varied through the duty cycle of the chopper. Gate triggering of ELC is accomplished through sinusoidal pulse width modulation (SPWM by sensing the load current. A MATLAB/Simulink model of Savonius rotor, asynchronous generator, ELC, and three-phase load is presented. The proposed scheme is tested under various load conditions under varying water velocities and the performances are observed to be satisfactory.

  2. Note of the 20 December 2016 on the elaboration of regional biomass schemes

    International Nuclear Information System (INIS)

    Michel, Laurent; GESLAIN-LANEELLE, Catherine

    2016-01-01

    This official note informs Region prefects on modalities of elaboration of regional biomass schemes, and provides them with data on mobilizable biomass resources at the regional level. It briefly presents the legal framework of the scheme elaboration, the elaboration agenda, and the scope of usages of biomass to be considered within the scheme. It discusses the articulation between regional and national schemes, from a global point of view as well as in terms works of elaboration. It briefly describes how the regional scheme is to be assessed. Appendices present planning and programming elements to be taken into account, elements of explanation for the regional biomass table, institutions represented in the information and orientation committee of the national scheme, and regional biomass tables which contain detailed assessments of the various biomass resources for each French region

  3. A Cu-Zn nanoparticle promoter for selective carbon dioxide reduction and its application in visible-light-active Z-scheme systems using water as an electron donor.

    Science.gov (United States)

    Yin, Ge; Sako, Hiroshi; Gubbala, Ramesh V; Ueda, Shigenori; Yamaguchi, Akira; Abe, Hideki; Miyauchi, Masahiro

    2018-04-17

    Selective carbon dioxide photoreduction to produce formic acid was achieved under visible light irradiation using water molecules as electron donors, similar to natural plants, based on the construction of a Z-scheme light harvesting system modified with a Cu-Zn alloy nanoparticle co-catalyst. The faradaic efficiency of our Z-scheme system for HCOOH generation was over 50% under visible light irradiation.

  4. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  5. The SS-SCR Scheme for Dynamic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Vinay Thumar

    2012-01-01

    Full Text Available We integrate the two models of Cognitive Radio (CR, namely, the conventional Sense-and-Scavenge (SS Model and Symbiotic Cooperative Relaying (SCR. The resultant scheme, called SS-SCR, improves the efficiency of spectrum usage and reliability of the transmission links. SS-SCR is enabled by a suitable cross-layer optimization problem in a multihop multichannel CR network. Its performance is compared for different PU activity patterns with those schemes which consider SS and SCR separately and perform disjoint resource allocation. Simulation results depict the effectiveness of the proposed SS-SCR scheme. We also indicate the usefulness of cloud computing for a practical deployment of the scheme.

  6. Oxygen- and nitrogen-chemisorbed carbon nanostructures for Z-scheme photocatalysis applications

    International Nuclear Information System (INIS)

    Qian Zhao; Pathak, Biswarup; Nisar, Jawad; Ahuja, Rajeev

    2012-01-01

    Here focusing on the very new experimental finding on carbon nanomaterials for solid-state electron mediator applications in Z-scheme photocatalysis, we have investigated different graphene-based nanostructures chemisorbed by various types and amounts of species such as oxygen (O), nitrogen (N) and hydroxyl (OH) and their electronic structures using density functional theory. The work functions of different nanostructures have also been investigated by us to evaluate their potential applications in Z-scheme photocatalysis for water splitting. The N-, O–N-, and N–N-chemisorbed graphene-based nanostructures (32 carbon atoms supercell, corresponding to lattice parameter of about 1 nm) are found promising to be utilized as electron mediators between reduction level and oxidation level of water splitting. The O- or OH-chemisorbed nanostructures have potential to be used as electron conductors between H 2 -evolving photocatalysts and the reduction level (H + /H 2 ). This systematic study is proposed to understand the properties of graphene-based carbon nanostructures in Z-scheme photocatalysis and guide experimentalists to develop better carbon-based nanomaterials for more efficient Z-scheme photocatalysis applications in the future.

  7. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  8. The Global Spine Care Initiative: a consensus process to develop and validate a stratification scheme for surgical care of spinal disorders as a guide for improved resource utilization in low- and middle-income communities.

    Science.gov (United States)

    Acaroğlu, Emre; Mmopelwa, Tiro; Yüksel, Selcen; Ayhan, Selim; Nordin, Margareta; Randhawa, Kristi; Haldeman, Scott

    2017-10-16

    The purpose of this study was to develop a stratification scheme for surgical spinal care to serve as a framework for referrals and distribution of patients with spinal disorders. We used a modified Delphi process. A literature search identified experts for the consensus panel and the panel was expanded by inviting spine surgeons known to be global opinion leaders. After creating a seed document of five hierarchical levels of surgical care, a four-step modified Delphi process (question validation, collection of factors, evaluation of factors, re-evaluation of factors) was performed. Of 78 invited experts, 19 participated in round 1, and of the 19, 14 participated in 2, and 12 in 3 and 4. Consensus was fairly heterogeneous for levels of care 2-4 (moderate resources). Only simple assessment methods based on the clinical skills of the medical personnel were considered feasible and safe in low-resource settings. Diagnosis, staging, and treatment were deemed feasible and safe in a specialized spine center. Accurate diagnostic workup was deemed feasible and safe for lower levels of care complexity (from level 3 upwards) compared to non-invasive procedures (level 4) and the full range of invasive procedures (level 5). This study introduces a five-level stratification scheme for the surgical care of spinal disorders. This stratification may provide input into the Global Spine Care Initiative care pathway that will be applied in medically underserved areas and low- and middle-income countries. These slides can be retrieved under Electronic Supplementary Material.

  9. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  10. GUIDELINES FOR EVALUATION OF PSYCHOLOGICAL AND PEDAGOGICAL QUALITY CHARACTERISTICS OF ELECTRONIC EDUCATIONAL RESOURCES

    Directory of Open Access Journals (Sweden)

    Galina P. Lavrentieva

    2014-05-01

    Full Text Available The article highlights the causes of insufficient effective use of electronic learning resources and sets out the guidelines on ways to solve the aforementioned problems. The set of didactic, methodical, psychological, pedagogical, design and ergonomic quality requirements is considered for evaluation, selection and application of information and communication technologies in the educational process. The most appropriate mechanisms for the ICT introduction into the learning process are disclosed as it should meet the specific learning needs of the student and the objectives of the educational process. The guidance for psycho-educational assessment of quality of electronic educational resources is provided. It is argued that the effectiveness of the ICT use is to be improved by means of quality evaluation mechanisms involved into the educational process.

  11. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  12. Availability, Use and Constraints to Use of Electronic Information Resources by Postgraduates Students at the University of Ibadan

    Directory of Open Access Journals (Sweden)

    Dare Samuel Adeleke

    2017-12-01

    Full Text Available Availability, awareness and use of electronic resources provide access to authoritative, reliable, accurate and timely access to information. The use of electronic information resources (EIRs can enable innovation in teaching and increase timeliness in research of postgraduate students which will eventual result into encouragement of the expected research-led enquiry in this digital age. The study adopted a descriptive survey design. Samples of 300 of postgraduate students within seven out 13 Faculties were randomly selected. Data were collected using questionnaire designed to elicit response from respondents and data were analyzed using descriptive statistics methods percentages, mean, and standard deviation. Results indicated that internet was ranked most available and used in the university. Low level of usage of electronic resources, in particular, full texts data bases is linked to a number of constraints: Interrupted power supply was ranked highest among other factors as speed and capacity of computers, retrieval of records with high recall and low precision, retrieving records relevant to information need, lack of knowledge of search techniques to retrieve information effectively, non possession of requisite IT skills and problems accessing the internet. The study recommended that usage of electronic resources be made compulsory, intensifying awareness campaigns concerning the availability, training on use of electronic resources and the problem of power outage be addressed.

  13. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  14. A Study on Developing Evaluation Criteria for Electronic Resources in Evaluation Indicators of Libraries

    Science.gov (United States)

    Noh, Younghee

    2010-01-01

    This study aimed to improve the current state of electronic resource evaluation in libraries. While the use of Web DB, e-book, e-journal, and other e-resources such as CD-ROM, DVD, and micro materials is increasing in libraries, their use is not comprehensively factored into the general evaluation of libraries and may diminish the reliability of…

  15. Meeting stroke survivors' perceived needs: a qualitative study of a community-based exercise and education scheme.

    Science.gov (United States)

    Reed, Mary; Harrington, Rachel; Duggan, Aine; Wood, Victorine A

    2010-01-01

    A qualitative study using a phenomenological approach, to explore stroke survivors' needs and their perceptions of whether a community stroke scheme met these needs. Semi-structured in-depth interviews of 12 stroke survivors, purposively selected from participants attending a new community stroke scheme. Interpretative phenomenological analysis of interviews by two researchers independently. Participants attending the community stroke scheme sought to reconstruct their lives in the aftermath of their stroke. To enable this they needed internal resources of confidence and sense of purpose to 'create their social self', and external resources of 'responsive services' and an 'informal support network', to provide direction and encouragement. Participants felt the community stroke scheme met some of these needs through exercise, goal setting and peer group interaction, which included social support and knowledge acquisition. Stroke survivors need a variety of internal and external resources so that they can rebuild their lives positively post stroke. A stroke-specific community scheme, based on exercise, life-centred goal setting, peer support and knowledge acquisition, is an external resource that can help with meeting some of the stroke survivor's needs.

  16. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  17. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    Science.gov (United States)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  18. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    OpenAIRE

    Anton M. Avramchuk

    2017-01-01

    The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing ...

  19. Current use of impact models for agri-environment schemes and potential for improvements of policy design and asseessment

    DEFF Research Database (Denmark)

    Primdahl, Jørgen; Vesterager, Jens Peter; Finn, John A.

    2010-01-01

    Agri-Environment Schemes (AES) to maintain or promote environmentally-friendly farming practices were implemented on about 25% of all agricultural land in the EU by 2002. This article analyses and discusses the actual and potential use of impact models in supporting the design, implementation...... depended on whether scheme objectives were related to natural resources, biodiversity or landscape. A higher proportion of schemes dealing with natural resources (primarily water) were based on quantitative impact models, compared to whole-farm schemes and broad, horizontal schemes. We conclude...

  20. Determining the level of awareness of the physicians in using the variety of electronic information resources and the effecting factors.

    Science.gov (United States)

    Papi, Ahmad; Ghazavi, Roghayeh; Moradi, Salimeh

    2015-01-01

    Understanding of the medical society's from the types of information resources for quick and easy access to information is an imperative task in medical researches and management of the treatment. The present study was aimed to determine the level of awareness of the physicians in using various electronic information resources and the factors affecting it. This study was a descriptive survey. The data collection tool was a researcher-made questionnaire. The study population included all the physicians and specialty physicians of the teaching hospitals affiliated to Isfahan University of Medical Sciences and numbered 350. The sample size based on Morgan's formula was set at 180. The content validity of the tool was confirmed by the library and information professionals and the reliability was 95%. Descriptive statistics were used including the SPSS software version 19. On reviewing the need of the physicians to obtain the information on several occasions, the need for information in conducting the researches was reported by the maximum number of physicians (91.9%) and the usage of information resources, especially the electronic resources, formed 65.4% as the highest rate with regard to meeting the information needs of the physicians. Among the electronic information databases, the maximum awareness was related to Medline with 86.5%. Among the various electronic information resources, the highest awareness (43.3%) was related to the E-journals. The highest usage (36%) was also from the same source. The studied physicians considered the most effective deterrent in the use of electronic information resources as being too busy and lack of time. Despite the importance of electronic information resources for the physician's community, there was no comprehensive knowledge of these resources. This can lead to less usage of these resources. Therefore, careful planning is necessary in the hospital libraries in order to introduce the facilities and full capabilities of the

  1. Electronic repository and standardization of processes and electronic documents in transport

    Directory of Open Access Journals (Sweden)

    Tomasz DĘBICKI

    2007-01-01

    Full Text Available The article refers to the idea of the use of electronic repository to store standardised scheme of processes between a Logistics Service Provider and its business partners. Application of repository for automatic or semi-automatic configuration of interoperability in electronic data interchange between information systems of differentcompanies based on transport (road, rail, sea and combined related processes. Standardisation includes processes, scheme of cooperation and related to them, electronic messages.

  2. Pixel detector readout electronics with two-level discriminator scheme

    International Nuclear Information System (INIS)

    Pengg, F.

    1998-01-01

    In preparation for a silicon pixel detector with more than 3,000 readout channels per chip for operation at the future large hadron collider (LHC) at CERN the analog front end of the readout electronics has been designed and measured on several test-arrays with 16 by 4 cells. They are implemented in the HP 0.8 microm process but compatible with the design rules of the radiation hard Honeywell 0.8 microm bulk process. Each cell contains bump bonding pad, preamplifier, discriminator and control logic for masking and testing within a layout area of only 50 microm by 140 microm. A new two-level discriminator scheme has been implemented to cope with the problems of time-walk and interpixel cross-coupling. The measured gain of the preamplifier is 900 mV for a minimum ionizing particle (MIP, about 24,000 e - for a 300 microm thick Si-detector) with a return to baseline within 750 ns for a 1 MIP input signal. The full readout chain (without detector) shows an equivalent noise charge to 60e - r.m.s. The time-walk, a function of the separation between the two threshold levels, is measured to be 22 ns at a separation of 1,500 e - , which is adequate for the 40 MHz beam-crossing frequency at the LHC. The interpixel cross-coupling, measured with a 40fF coupling capacitance, is less than 3%. A single cell consumes 35 microW at 3.5 V supply voltage

  3. Managing Selection for Electronic Resources: Kent State University Develops a New System to Automate Selection

    Science.gov (United States)

    Downey, Kay

    2012-01-01

    Kent State University has developed a centralized system that manages the communication and work related to the review and selection of commercially available electronic resources. It is an automated system that tracks the review process, provides selectors with price and trial information, and compiles reviewers' feedback about the resource. It…

  4. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  5. Reducing medical claims cost to Ghana?s National Health Insurance scheme: a cross-sectional comparative assessment of the paper- and electronic-based claims reviews

    OpenAIRE

    Nsiah-Boateng, Eric; Asenso-Boadi, Francis; Dsane-Selby, Lydia; Andoh-Adjei, Francis-Xavier; Otoo, Nathaniel; Akweongo, Patricia; Aikins, Moses

    2017-01-01

    Background A robust medical claims review system is crucial for addressing fraud and abuse and ensuring financial viability of health insurance organisations. This paper assesses claims adjustment rate of the paper- and electronic-based claims reviews of the National Health Insurance Scheme (NHIS) in Ghana. Methods The study was a cross-sectional comparative assessment of paper- and electronic-based claims reviews of the NHIS. Medical claims of subscribers for the year, 2014 were requested fr...

  6. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  7. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  8. Dynamics of a Rydberg hydrogen atom near a metal surface in the electron-extraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Iñarrea, Manuel [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Lanchares, Víctor [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Palacián, Jesús [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain); Pascual, Ana I. [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Salas, J. Pablo, E-mail: josepablo.salas@unirioja.es [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Yanguas, Patricia [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain)

    2015-01-23

    We study the classical dynamics of a Rydberg hydrogen atom near a metal surface in the presence of a constant electric field in the electron-extraction situation [1], e.g., when the field attracts the electron to the vacuum. From a dynamical point of view, this field configuration provides a dynamics richer than in the usual ion-extraction scheme, because, depending on the values of field and the atom–surface distance, the atom can be ionized only towards the metal surface, only to the vacuum or to the both sides. The evolution of the phase space structure as a function of the atom–surface distance is explored in the bound regime of the atom. In the high energy regime, the ionization mechanism is also investigated. We find that the classical results of this work are in good agreement with the results obtained in the wave-packet propagation study carried out by So et al. [1]. - Highlights: • We study a classical hydrogen atom near a metal surface plus a electric field. • We explore the phase space structure as a function of the field strength. • We find most of the electronic orbits are oriented along the field direction. • We study the ionization of the atom for several atom–surface distances. • This classical study is in good agreement with the quantum results.

  9. End-of-life resource recovery from emerging electronic products

    DEFF Research Database (Denmark)

    Parajuly, Keshav; Habib, Komal; Cimpan, Ciprian

    2016-01-01

    Integrating product design with appropriate end-of-life (EoL) processing is widely recognized to have huge potentials in improving resource recovery from electronic products. In this study, we investigate both the product characteristics and EoL processing of robotic vacuum cleaner (RVC), as a case...... of emerging electronic product, in order to understand the recovery fate of different materials and its linkage to product design. Ten different brands of RVC were dismantled and their material composition and design profiles were studied. Another 125 RVCs (349 kg) were used for an experimental trial...... at a conventional ‘shred-and-separate’ type preprocessing plant in Denmark. A detailed material flow analysis was performed throughout the recycling chain. The results show a mismatch between product design and EoL processing, and the lack of practical implementation of ‘Design for EoL’ thinking. In the best...

  10. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  11. Comprehensive Evaluation of Car-Body Light-Weighting Scheme Based on LCC Theory

    Directory of Open Access Journals (Sweden)

    Han Qing-lan

    2016-01-01

    Full Text Available In this paper, a comprehensive evaluation model of light-weighting scheme is established, which is based on three dimensions, including the life cycle costs of the resource consumed by the designed objects (LCC, willingness to pay for the environmental effect of resource consumption (WTP and performance (P. Firstly, cost of each stage is determined. Then, based on the resource classification, which is based on cost elements, determine the material list needed, and apply WTP weight coefficient to monetize life cycle environmental impact and obtain the life cycle comprehensive cost of designed scheme (TCC. In the next step Performance (P index is calculated to measure the value of the life cycle costs by applying AHP and SAW method, integrated (TCC and (P to achieve comprehensive evaluation of light-weighting scheme. Finally, the effectiveness of the evaluation model is verified by the example of car engine hood.

  12. Use of electronic sales data to tailor nutrition education resources for an ethnically diverse population.

    Science.gov (United States)

    Eyles, H; Rodgers, A; Ni Mhurchu, C

    2010-02-01

    Nutrition education may be most effective when personally tailored. Individualised electronic supermarket sales data offer opportunities to tailor nutrition education using shopper's usual food purchases. The present study aimed to use individualised electronic supermarket sales data to tailor nutrition resources for an ethnically diverse population in a large supermarket intervention trial in New Zealand. Culturally appropriate nutrition education resources (i.e. messages and shopping lists) were developed with the target population (through two sets of focus groups) and ethnic researchers. A nutrient database of supermarket products was developed using retrospective sales data and linked to participant sales to allow tailoring by usual food purchases. Modified Heart Foundation Tick criteria were used to identify 'healthier' products in the database suitable for promotion in the resources. Rules were developed to create a monthly report listing the tailored and culturally targeted messages to be sent to each participant, and to produce automated, tailored shopping lists. Culturally targeted nutrition messages (n = 864) and shopping lists (n = 3 formats) were developed. The food and nutrient database (n = 3000 top-selling products) was created using 12 months of retrospective sales data, and comprised 60%'healthier' products. Three months of baseline sales data were used to determine usual food purchases. Tailored resources were successfully mailed to 123 Māori, 52 Pacific and 346 non-Māori non-Pacific participants over the 6-month trial intervention period. Electronic supermarket sales data can be used to tailor nutrition education resources for a large number of ethnically diverse supermarket shoppers.

  13. NFC Secure Payment and Verification Scheme with CS E-Ticket

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

  14. A new scheme for solving inhomogeneous Boltzmann equation for electrons in weakly ionised gases

    International Nuclear Information System (INIS)

    Mahmoud, M.O.M.; Yousfi, M.

    1995-01-01

    In the case of weakly ionized gases, the numerical treatment of non-hydrodynamic regime involving spatial variation of distribution function due to boundaries (walls, electrodes, electron source, etc hor-ellipsis) by using direct Boltzmann equation always constitute a challenge if the main collisional processes occurring in non thermal plasmas are to be considered (elastic, inelastic and super-elastic collisions, Penning ionisation, Coulomb interactions, etc hor-ellipsis). In the non-thermal discharge modelling, the inhomogeneous electron Boltzmann equation is needed in order to be coupled for example to a fluid model to take into account the electron non-hydrodynamic effects. This is for example the case of filamentary discharge, in which the space charge electric field due to streamer propagation has a very sharp spatial profile thus leading to important space non-hydrodynamic effects. It is also the case of the cathodic zone of glow discharge where electric field has a rapid spatial decrease until the negative glow. In the present work, a new numerical scheme is proposed to solve the inhomogeneous Boltzmann equation for electrons in the framework of two-term approximation (TTA) taking into account elastic and inelastic processes. Such a method has the usual drawbacks associated with the TTA i.e. not an accurate enough at high E/N values or in presence of high inelastic processes. But the accuracy of this method is considered sufficient because in a next step it is destinated to be coupled to fluid model for charged particles and a chemical kinetic model where the accuracy is of the same order of magnitude or worse. However there are numerous advantages of this method concerning time computing, treatment of non-linear collision processes (Coulomb, Penning, etc hor-ellipsis)

  15. Availability, Level of Use and Constraints to Use of Electronic Resources by Law Lecturers in Public Universities in Nigeria

    Science.gov (United States)

    Amusa, Oyintola Isiaka; Atinmo, Morayo

    2016-01-01

    (Purpose) This study surveyed the level of availability, use and constraints to use of electronic resources among law lecturers in Nigeria. (Methodology) Five hundred and fifty-two law lecturers were surveyed and four hundred and forty-two responded. (Results) Data analysis revealed that the level of availability of electronic resources for the…

  16. Design of Servo Scheme and Drive Electronics for the Integrated Electrohydraulic Actuation System of RLV-TD

    Science.gov (United States)

    Kurian, Priya C.; Gopinath, Anish; Shinoy, K. S.; Santhi, P.; Sundaramoorthy, K.; Sebastian, Baby; Jaya, B.; Namboodiripad, M. N.; Mookiah, T.

    2017-12-01

    Reusable Launch Vehicle-Technology Demonstrator (RLV-TD) is a system which has the ability to carry a payload from the earth's surface to the outer space more than once. The control actuation forms the major component of the control system and it actuates the control surfaces of the RLV-TD based on the control commands. Eight electro hydraulic actuators were used in RLV-TD for vectoring the control surfaces about their axes. A centralised Hydraulic Power Generating Unit (HPU) was used for powering the eight actuators located in two stages. The actuation system had to work for the longest ever duration of about 850 s for an Indian launch vehicle. High bandwidth requirement from autopilot was met by the servo design using the nonlinear mathematical model. Single Control Electronics which drive four electrohydraulic actuators was developed for each stage. High power electronics with soft start scheme was realized for driving the BLDC motor which is the prime mover for hydraulic pump. Many challenges arose due to single HPU for two stages, uncertainty of aero load, higher bandwidth requirements etc. and provisions were incorporated in the design to successfully overcome them. This paper describes the servo design and control electronics architecture of control actuation system.

  17. Design and experimental realization of an optimal scheme for teleportation of an n-qubit quantum state

    Science.gov (United States)

    Sisodia, Mitali; Shukla, Abhishek; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    An explicit scheme (quantum circuit) is designed for the teleportation of an n-qubit quantum state. It is established that the proposed scheme requires an optimal amount of quantum resources, whereas larger amount of quantum resources have been used in a large number of recently reported teleportation schemes for the quantum states which can be viewed as special cases of the general n-qubit state considered here. A trade-off between our knowledge about the quantum state to be teleported and the amount of quantum resources required for the same is observed. A proof-of-principle experimental realization of the proposed scheme (for a 2-qubit state) is also performed using 5-qubit superconductivity-based IBM quantum computer. The experimental results show that the state has been teleported with high fidelity. Relevance of the proposed teleportation scheme has also been discussed in the context of controlled, bidirectional, and bidirectional controlled state teleportation.

  18. A systematic review of portable electronic technology for health education in resource-limited settings.

    Science.gov (United States)

    McHenry, Megan S; Fischer, Lydia J; Chun, Yeona; Vreeman, Rachel C

    2017-08-01

    The objective of this study is to conduct a systematic review of the literature of how portable electronic technologies with offline functionality are perceived and used to provide health education in resource-limited settings. Three reviewers evaluated articles and performed a bibliography search to identify studies describing health education delivered by portable electronic device with offline functionality in low- or middle-income countries. Data extracted included: study population; study design and type of analysis; type of technology used; method of use; setting of technology use; impact on caregivers, patients, or overall health outcomes; and reported limitations. Searches yielded 5514 unique titles. Out of 75 critically reviewed full-text articles, 10 met inclusion criteria. Study locations included Botswana, Peru, Kenya, Thailand, Nigeria, India, Ghana, and Tanzania. Topics addressed included: development of healthcare worker training modules, clinical decision support tools, patient education tools, perceptions and usability of portable electronic technology, and comparisons of technologies and/or mobile applications. Studies primarily looked at the assessment of developed educational modules on trainee health knowledge, perceptions and usability of technology, and comparisons of technologies. Overall, studies reported positive results for portable electronic device-based health education, frequently reporting increased provider/patient knowledge, improved patient outcomes in both quality of care and management, increased provider comfort level with technology, and an environment characterized by increased levels of technology-based, informal learning situations. Negative assessments included high investment costs, lack of technical support, and fear of device theft. While the research is limited, portable electronic educational resources present promising avenues to increase access to effective health education in resource-limited settings, contingent

  19. Survivable resource orchestration for optically interconnected data center networks.

    Science.gov (United States)

    Zhang, Qiong; She, Qingya; Zhu, Yi; Wang, Xi; Palacharla, Paparao; Sekiya, Motoyoshi

    2014-01-13

    We propose resource orchestration schemes in overlay networks enabled by optical network virtualization. Based on the information from underlying optical networks, our proposed schemes provision the fewest data centers to guarantee K-connect survivability, thus maintaining resource availability for cloud applications under any failure.

  20. Microelectrode voltammetry of multi-electron transfers complicated by coupled chemical equilibria: a general theory for the extended square scheme.

    Science.gov (United States)

    Laborda, Eduardo; Gómez-Gil, José María; Molina, Angela

    2017-06-28

    A very general and simple theoretical solution is presented for the current-potential-time response of reversible multi-electron transfer processes complicated by homogeneous chemical equilibria (the so-called extended square scheme). The expressions presented here are applicable regardless of the number of electrons transferred and coupled chemical processes, and they are particularized for a wide variety of microelectrode geometries. The voltammetric response of very different systems presenting multi-electron transfers is considered for the most widely-used techniques (namely, cyclic voltammetry, square wave voltammetry, differential pulse voltammetry and steady state voltammetry), studying the influence of the microelectrode geometry and the number and thermodynamics of the (electro)chemical steps. Most appropriate techniques and procedures for the determination of the 'interaction' between successive transfers are discussed. Special attention is paid to those situations where homogeneous chemical processes, such as protonation, complexation or ion association, affect the electrochemical behaviour of the system by different stabilization of the oxidation states.

  1. Resource management in utility and cloud computing

    CERN Document Server

    Zhao, Han

    2013-01-01

    This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2? market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques. This model is useful to explore the interaction between the cloud infrastructure provider and the cloud resource c

  2. SAGES: a suite of freely-available software tools for electronic disease surveillance in resource-limited settings.

    Directory of Open Access Journals (Sweden)

    Sheri L Lewis

    Full Text Available Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  3. Use and Cost of Electronic Resources in Central Library of Ferdowsi University Based on E-metrics

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Davarpanah

    2012-07-01

    Full Text Available The purpose of this study was to investigate the usage of electronic journals in Ferdowsi University, Iran based on e-metrics. The paper also aimed to emphasize the analysis of cost-benefit and the correlation between the journal impact factors and the usage data. In this study experiences of Ferdowsi University library on licensing and usage of electronic resources was evaluated by providing a cost-benefit analysis based on the cost and usage statistics of electronic resources. Vendor-provided data were also compared with local usage data. The usage data were collected by tracking web-based access locally, and by collecting vender-provided usage data. The data sources were one-year of vendor-supplied e-resource usage data such as Ebsco, Elsevier, Proquest, Emerald, Oxford and Springer and local usage data collected from the Ferdowsi university web server. The study found that actual usage values differ for vendor-provided data and local usage data. Elsevier has got the highest usage degree in searches, sessions and downloads. Statistics also showed that a small number of journals satisfy significant amount of use while the majority of journals were used less frequent and some were never used at all. The users preferred the PDF rather than HTML format. The data in subject profile suggested that the provided e-resources were best suited to certain subjects. There was no correlation between IF and electronic journal use. Monitoring the usage of e-resources gained increasing importance for acquisition policy and budget decisions. The article provided information about local metrics for the six surveyed vendors/publishers, e.g. usage trends, requests per package, cost per use as related to the scientific specialty of the university.

  4. A Hierarchical Z-Scheme α-Fe2 O3 /g-C3 N4 Hybrid for Enhanced Photocatalytic CO2 Reduction.

    Science.gov (United States)

    Jiang, Zhifeng; Wan, Weiming; Li, Huaming; Yuan, Shouqi; Zhao, Huijun; Wong, Po Keung

    2018-03-01

    The challenge in the artificial photosynthesis of fossil resources from CO 2 by utilizing solar energy is to achieve stable photocatalysts with effective CO 2 adsorption capacity and high charge-separation efficiency. A hierarchical direct Z-scheme system consisting of urchin-like hematite and carbon nitride provides an enhanced photocatalytic activity of reduction of CO 2 to CO, yielding a CO evolution rate of 27.2 µmol g -1 h -1 without cocatalyst and sacrifice reagent, which is >2.2 times higher than that produced by g-C 3 N 4 alone (10.3 µmol g -1 h -1 ). The enhanced photocatalytic activity of the Z-scheme hybrid material can be ascribed to its unique characteristics to accelerate the reduction process, including: (i) 3D hierarchical structure of urchin-like hematite and preferable basic sites which promotes the CO 2 adsorption, and (ii) the unique Z-scheme feature efficiently promotes the separation of the electron-hole pairs and enhances the reducibility of electrons in the conduction band of the g-C 3 N 4 . The origin of such an obvious advantage of the hierarchical Z-scheme is not only explained based on the experimental data but also investigated by modeling CO 2 adsorption and CO adsorption on the three different atomic-scale surfaces via density functional theory calculation. The study creates new opportunities for hierarchical hematite and other metal-oxide-based Z-scheme system for solar fuel generation. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  6. Building and Managing Electronic Resources in Digital Era in India with Special Reference to IUCAA and NIV, Pune: A Comparative Case Study

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2015-04-01

    This paper discusses and presents a comparative case study of two libraries in Pune, India, Inter-University Centre for Astronomy and Astrophysics and Information Centre and Library of National Institute of Virology (Indian Council of Medical Research). It compares how both libraries have managed their e-resource collections, including acquisitions, subscriptions, and consortia arrangements, while also developing a collection of their own resources, including pre-prints and publications, video lectures, and other materials in an institutional repository. This study illustrates how difficult it is to manage electronic resources in a developing country like India, even though electronic resources are used more than print resources. Electronic resource management can be daunting, but with a systematic approach, various problems can be solved, and use of the materials will be enhanced.

  7. Lattice design for the CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Zhang, Yuan; Bian, Tianjian; Wang, Dou; Yu, Chenghui; Gao, Jie

    2018-01-01

    A future Circular Electron Positron Collider (CEPC) has been proposed by China with the main goal of studying the Higgs boson. Its baseline design, chosen on the basis of its performance, is a double ring scheme; an alternative design is a partial double ring scheme which reduces the budget while maintaining an adequate performance. This paper will present the collider ring lattice design for the double ring scheme. The CEPC will also work as a W and a Z factory. For the W and Z modes, except in the RF region, compatible lattices were obtained by scaling down the magnet strength with energy.

  8. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home

    Directory of Open Access Journals (Sweden)

    Chun-Feng Liao

    2017-09-01

    Full Text Available A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA. We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of “end user programmable smart environments”.

  9. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home.

    Science.gov (United States)

    Liao, Chun-Feng; Chen, Peng-Yu

    2017-09-21

    A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of "end user programmable smart environments".

  10. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  11. Luminosity optimization schemes in Compton experiments based on Fabry-Perot optical resonators

    Directory of Open Access Journals (Sweden)

    Alessandro Variola

    2011-03-01

    Full Text Available The luminosity of Compton x-ray and γ sources depends on the average current in electron bunches, the energy of the laser pulses, and the geometry of the particle bunch to laser pulse collisions. To obtain high power photon pulses, these can be stacked in a passive optical resonator (Fabry-Perot cavity especially when a high average flux is required. But, in this case, owing to the presence of the optical cavity mirrors, the electron bunches have to collide at an angle with the laser pulses with a consequent luminosity decrease. In this article a crab-crossing scheme is proposed for Compton sources, based on a laser amplified in a Fabry-Perot resonator, to eliminate the luminosity losses given by the crossing angle, taking into account that in laser-electron collisions only the electron bunches can be tilted at the collision point. We report the analytical study on the crab-crossing scheme for Compton gamma sources. The analytical expression for the total yield of photons generated in Compton sources with the crab-crossing scheme of collision is derived. The optimal collision angle of the bunch was found to be equal to half of the collision angle. At this crabbing angle, the maximal yield of scattered off laser photons is attained thanks to the maximization, in the collision process, of the time spent by the laser pulse in the electron bunch. Estimations for some Compton source projects are presented. Furthermore, some schemes of the optical cavities configuration are analyzed and the luminosity calculated. As illustrated, the four-mirror two- or three-dimensional scheme is the most appropriate for Compton sources.

  12. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  13. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  14. Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2014-01-01

    Full Text Available A password authentication scheme using smart card is called two-factor authentication scheme. Two-factor authentication scheme is the most accepted and commonly used mechanism that provides the authorized users a secure and efficient method for accessing resources over insecure communication channel. Up to now, various two-factor user authentication schemes have been proposed. However, most of them are vulnerable to smart card loss attack, offline password guessing attack, impersonation attack, and so on. In this paper, we design a password remote user authentication with key agreement scheme using elliptic curve cryptosystem. Security analysis shows that the proposed scheme has high level of security. Moreover, the proposed scheme is more practical and secure in contrast to some related schemes.

  15. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  16. Application of the symplectic finite-difference time-domain scheme to electromagnetic simulation

    International Nuclear Information System (INIS)

    Sha, Wei; Huang, Zhixiang; Wu, Xianliang; Chen, Mingsheng

    2007-01-01

    An explicit fourth-order finite-difference time-domain (FDTD) scheme using the symplectic integrator is applied to electromagnetic simulation. A feasible numerical implementation of the symplectic FDTD (SFDTD) scheme is specified. In particular, new strategies for the air-dielectric interface treatment and the near-to-far-field (NFF) transformation are presented. By using the SFDTD scheme, both the radiation and the scattering of three-dimensional objects are computed. Furthermore, the energy-conserving characteristic hold for the SFDTD scheme is verified under long-term simulation. Numerical results suggest that the SFDTD scheme is more efficient than the traditional FDTD method and other high-order methods, and can save computational resources

  17. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  18. [Use of internet and electronic resources among Spanish intensivist physicians. First national survey].

    Science.gov (United States)

    Gómez-Tello, V; Latour-Pérez, J; Añón Elizalde, J M; Palencia-Herrejón, E; Díaz-Alersi, R; De Lucas-García, N

    2006-01-01

    Estimate knowledge and use habits of different electronic resources in a sample of Spanish intensivists: Internet, E-mail, distribution lists, and use of portable electronic devices. Self-applied questionnaire. A 50-question questionnaire was distributed among Spanish intensivists through the hospital marketing delegates of a pharmaceutical company and of electronic forums. A total of 682 questionnaires were analyzed (participation: 74%). Ninety six percent of those surveyed used Internet individually: 67% admitted training gap. Internet was the second source of clinical consultations most used (61%), slightly behind consultation to colleagues (65%). The pages consulted most were bibliographic databases (65%) and electronic professional journals (63%), with limited use of Evidence Based Medicine pages (19%). Ninety percent of those surveyed used e-mail regularly in the practice of their profession, although 25% admitted that were not aware of its possibilities. The use of E-mail decreased significantly with increase in age. A total of 62% of the intensivists used distribution lists. Of the rest, 42% were not aware of its existence and 32% admitted they had insufficient training to handle them. Twenty percent of those surveyed had portable electronic devices and 64% considered it useful, basically due to its rapid consultation at bedside. Female gender was a negative predictive factor of its use (OR 0.35; 95% CI 0.2-0.63; p=0.0002). A large majority of the Spanish intensivists use Internet and E-mail. E-mail lists and use of portable devices are still underused resources. There are important gaps in training and infrequent use of essential pages. There are specific groups that require directed educational policies.

  19. PIC simulation of the electron-ion collision effects on suprathermal electrons

    International Nuclear Information System (INIS)

    Wu Yanqing; Han Shensheng

    2000-01-01

    The generation and transportation of suprathermal electrons are important to both traditional ICF scheme and 'Fast Ignition' scheme. The author discusses the effects of electron-ion collision on the generation and transportation of the suprathermal electrons by parametric instability. It indicates that the weak electron-ion term in the PIC simulation results in the enhancement of the collisional absorption and increase of the hot electron temperature and reduction in the maximum electrostatic field amplitude while wave breaking. Therefore the energy and distribution of the suprathermal electrons are changed. They are distributed more close to the phase velocity of the electrostatic wave than the case without electron-ion collision term. The electron-ion collision enhances the self-consistent field and impedes the suprathermal electron transportation. These factors also reduce the suprathermal electron energy. In addition, the authors discuss the effect of initial condition on PIC simulation to ensure that the results are correct

  20. Model of e-learning with electronic educational resources of new generation

    OpenAIRE

    A. V. Loban; D. A. Lovtsov

    2017-01-01

    Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with elec...

  1. Enhanced cognitive Radio Resource Management for LTE systems

    KAUST Repository

    Alqerm, Ismail

    2013-10-01

    The explosive growth in mobile Internet and related services has increased the need for more bandwidth in cellular networks. The Long-Term Evolution (LTE) technology is an attractive solution for operators and subscribers to meet such need since it provides high data rates and scalable bandwidth. Radio Resource Management (RRM) is essential for LTE to provide better communication quality and meet the application QoS requirements. Cognitive resource management is a promising solution for LTE RRM as it improves network efficiency by exploiting radio environment information, intelligent optimization algorithms to configure transmission parameters, and mitigate interference. In this paper, we propose a cognitive resource management scheme to adapt LTE network parameters to the environment conditions. The scheme optimizes resource blocks assignment, modulation selection and bandwidth selection to maximize throughput and minimize interference. The scheme uses constrained optimization for throughput maximization and interference control. It is also enhanced by learning mechanism to reduce the optimization complexity and improve the decision-making quality. Our evaluation results show that our scheme achieved significant improvements in throughput and LTE system capacity. Results also show the improvement in the user satisfaction over other techniques in LTE RRM.

  2. Macro-level integrated renewable energy production schemes for sustainable development

    International Nuclear Information System (INIS)

    Subhadra, Bobban G.

    2011-01-01

    The production of renewable clean energy is a prime necessity for the sustainable future existence of our planet. However, because of the resource-intensive nature, and other challenges associated with these new generation renewable energy sources, novel industrial frameworks need to be co-developed. Integrated renewable energy production schemes with foundations on resource sharing, carbon neutrality, energy-efficient design, source reduction, green processing plan, anthropogenic use of waste resources for the production green energy along with the production of raw material for allied food and chemical industries is imperative for the sustainable development of this sector especially in an emission-constrained future industrial scenario. To attain these objectives, the scope of hybrid renewable production systems and integrated renewable energy industrial ecology is briefly described. Further, the principles of Integrated Renewable Energy Park (IREP) approach, an example for macro-level energy production, and its benefits and global applications are also explored. - Research highlights: → Discusses the need for macro-level renewable energy production schemes. → Scope of hybrid and integrated industrial ecology for renewable energy production. → Integrated Renewable Energy Parks (IREPs): A macro-level energy production scheme. → Discusses the principle foundations and global applications of IREPs. → Describes the significance of IREPs in the carbon-neutral future business arena.

  3. Impact of Knowledge Resources Linked to an Electronic Health Record on Frequency of Unnecessary Tests and Treatments

    Science.gov (United States)

    Goodman, Kenneth; Grad, Roland; Pluye, Pierre; Nowacki, Amy; Hickner, John

    2012-01-01

    Introduction: Electronic knowledge resources have the potential to rapidly provide answers to clinicians' questions. We sought to determine clinicians' reasons for searching these resources, the rate of finding relevant information, and the perceived clinical impact of the information they retrieved. Methods: We asked general internists, family…

  4. Non Standard Finite Difference Scheme for Mutualistic Interaction Description

    OpenAIRE

    Gabbriellini, Gianluca

    2012-01-01

    One of the more interesting themes of the mathematical ecology is the description of the mutualistic interaction between two interacting species. Based on continuous-time model developed by Holland and DeAngelis 2009 for consumer-resource mutualism description, this work deals with the application of the Mickens Non Standard Finite Difference method to transform the continuous-time scheme into a discrete-time one. It has been proved that the Mickens scheme is dynamically consistent with the o...

  5. Electronic Document Management: A Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Thomas Groenewald

    2004-11-01

    Full Text Available This case study serve as exemplar regarding what can go wrong with the implementation of an electronic document management system. Knowledge agility and knowledge as capital, is outlined against the backdrop of the information society and knowledge economy. The importance of electronic document management and control is sketched thereafter. The literature review is concluded with the impact of human resource management on knowledge agility, which includes references to the learning organisation and complexity theory. The intervention methodology, comprising three phases, follows next. The results of the three phases are presented thereafter. Partial success has been achieved with improving the human efficacy of electronic document management, however the client opted to discontinue the system in use. Opsomming Die gevalle studie dien as voorbeeld van wat kan verkeerd loop met die implementering van ’n elektroniese dokumentbestuur sisteem. Teen die agtergrond van die inligtingsgemeenskap en kennishuishouding word kennissoepelheid en kennis as kapitaal bespreek. Die literatuurstudie word afgesluit met die inpak van menslikehulpbronbestuur op kennissoepelheid, wat ook die verwysings na die leerorganisasie en kompleksietydsteorie insluit. Die metodologie van die intervensie, wat uit drie fases bestaan, volg daarna. Die resultate van die drie fases word vervolgens aangebied. Slegs gedeelte welslae is behaal met die verbetering van die menslike doeltreffendheid ten opsigte van elektroniese dokumentbestuur. Die klient besluit egter om nie voort te gaan om die huidige sisteem te gebruik nie.

  6. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  7. Harmonic generation with multiple wiggler schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  8. Externally Controlled Injection of Electrons by a Laser Pulse in a Laser Wakefield Electron Accelerator

    CERN Document Server

    Chen Szu Yuan; Chen Wei Ting; Chien, Ting-Yei; Lee, Chau-Hwang; Lin, Jiunn-Yuan; Wang, Jyhpyng

    2005-01-01

    Spatially and temporally localized injection of electrons is a key element for development of plasma-wave electron accelerator. Here we report the demonstration of two different schemes for electron injection in a self-modulated laser wakefield accelerator (SM-LWFA) by using a laser pulse. In the first scheme, by implementing a copropagating laser prepulse with proper timing, we are able to control the growth of Raman forward scattering and the production of accelerated electrons. We found that the stimulated Raman backward scattering of the prepulse plays the essential role of injecting hot electrons into the fast plasma wave driven by the pump pulse. In the second scheme, by using a transient density ramp we achieve self-injection of electrons in a SM-LWFA with spatial localization. The transient density ramp is produced by a prepulse propagating transversely to drill a density depression channel via ionization and expansion. The same mechanism of injection with comparable efficiency is also demonstrated wi...

  9. Challenges in the implementation of an electronic surveillance system in a resource-limited setting: Alerta, in Peru

    Directory of Open Access Journals (Sweden)

    Soto Giselle

    2008-11-01

    Full Text Available Abstract Background Infectious disease surveillance is a primary public health function in resource-limited settings. In 2003, an electronic disease surveillance system (Alerta was established in the Peruvian Navy with support from the U.S. Naval Medical Research Center Detachment (NMRCD. Many challenges arose during the implementation process, and a variety of solutions were applied. The purpose of this paper is to identify and discuss these issues. Methods This is a retrospective description of the Alerta implementation. After a thoughtful evaluation according to the Centers for Disease Control and Prevention (CDC guidelines, the main challenges to implementation were identified and solutions were devised in the context of a resource-limited setting, Peru. Results After four years of operation, we have identified a number of challenges in implementing and operating this electronic disease surveillance system. These can be divided into the following categories: (1 issues with personnel and stakeholders; (2 issues with resources in a developing setting; (3 issues with processes involved in the collection of data and operation of the system; and (4 issues with organization at the central hub. Some of the challenges are unique to resource-limited settings, but many are applicable for any surveillance system. For each of these challenges, we developed feasible solutions that are discussed. Conclusion There are many challenges to overcome when implementing an electronic disease surveillance system, not only related to technology issues. A comprehensive approach is required for success, including: technical support, personnel management, effective training, and cultural sensitivity in order to assure the effective deployment of an electronic disease surveillance system.

  10. Integrated resource management for Hybrid Optical Wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    Efficient utilization of available bandwidth over hybrid optical wireless networks is a critical issue, especially for multimedia applications with high data rates and stringent Quality of Service (QoS) requirements. In this paper, we propose an integrated resource management including an enhanced...... resource sharing scheme and an integrated admission control scheme for the hybrid optical wireless networks. It provides QoS guarantees for connections through both optical and wireless domain. Simulation results show that our proposed scheme improves QoS performances in terms of high throughput and low...

  11. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  12. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  13. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  14. Considering Point-of-Care Electronic Medical Resources in Lieu of Traditional Textbooks for Medical Education.

    Science.gov (United States)

    Hale, LaDonna S; Wallace, Michelle M; Adams, Courtney R; Kaufman, Michelle L; Snyder, Courtney L

    2015-09-01

    Selecting resources to support didactic courses is a critical decision, and the advantages and disadvantages must be carefully considered. During clinical rotations, students not only need to possess strong background knowledge but also are expected to be proficient with the same evidence-based POC resources used by clinicians. Students place high value on “real world” learning and therefore may place more value on POC resources that they know practicing clinicians use as compared with medical textbooks. The condensed nature of PA education requires students to develop background knowledge and information literacy skills over a short period. One way to build that knowledge and those skills simultaneously is to use POC resources in lieu of traditional medical textbooks during didactic training. Electronic POC resources offer several advantages over traditional textbooks and should be considered as viable options in PA education.

  15. A framework for resources allocation in virtualised C-RAN

    DEFF Research Database (Denmark)

    Al-Samman, Imad; Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    the performance gains of different resource allocation schemes in legacy LTE air interface virtualization. Moreover Cloud — based mobile networks are anticipated to play a significant role for next generation mobile networks. This paper investigates the potential deployment benefits of a novel resource...... virtualization algorithm (Traffic Aware Joint Scheduling) in Cloud-RANs (C-RAN). Air interface resources are coordinated and allocated dynamically by a hypervisor among different virtual operators (VOs). Three distinctive schemes are proposed and evaluated against standard Round Robin (RR) C-RAN scheduling...

  16. Resource conservation approached with an appropriate collection and upgrade-remanufacturing for used electronic products.

    Science.gov (United States)

    Zlamparet, Gabriel I; Tan, Quanyin; Stevels, A B; Li, Jinhui

    2018-03-01

    This comparative research represents an example for a better conservation of resources by reducing the amount of waste (kg) and providing it more value under the umbrella of remanufacturing. The three discussed cases will expose three issues already addressed separately in the literature. The generation of waste electrical and electronic equipment (WEEE) interacts with the environmental depletion. In this article, we gave the examples of addressed issues under the concept of remanufacturing. Online collection opportunity eliminating classical collection, a business to business (B2B) implementation for remanufactured servers and medical devices. The material reuse (recycling), component sustainability, reuse (part harvesting), product reuse (after repair/remanufacturing) indicates the recovery potential using remanufacturing tool for a better conservation of resources adding more value to the products. Our findings can provide an overview of new system organization for the general collection, market potential and the technological advantages using remanufacturing instead of recycling of WEEE or used electrical and electronic equipment. Copyright © 2017. Published by Elsevier Ltd.

  17. Effects of the Use of Electronic Human Resource Management (EHRM Within Human Resource Management (HRM Functions at Universities

    Directory of Open Access Journals (Sweden)

    Chux Gervase Iwu

    2016-09-01

    Full Text Available This study set out to examine the effect of e-hrm systems in assisting human resource practitioners to execute their duties and responsibilities. In comparison to developed economies of the world, information technology adoption in sub-Saharan Africa has not been without certain glitches. Some of the factors that are responsible for these include poor need identification, sustainable funding, and insufficient skills. Besides these factors, there is also the issue of change management and users sticking to what they already know. Although, the above factors seem negative, there is strong evidence that information systems such as electronic human resource management present benefits to an organization. To achieve this, a dual research approach was utilized. Literature assisted immensely in both the development of the conceptual framework upon which the study hinged as well as in the development of the questionnaire items. The study also made use of an interview checklist to guide the participants. The findings reveal a mix of responses that indicate that while there are gains in adopting e-hrm systems, it is wiser to consider supporting resources as well as articulate the needs of the university better before any investment is made.

  18. Nanolayer surface passivation schemes for silicon solar cells

    NARCIS (Netherlands)

    Dingemans, G.

    2011-01-01

    This thesis is concerned with nanolayer surface passivation schemes and corresponding deposition processes, for envisaged applications in crystalline silicon solar cells. Surface passivation, i.e. the reduction of electronic recombination processes at semiconductor surfaces, is essential for

  19. Electronic human resource management: Enhancing or entrancing?

    Directory of Open Access Journals (Sweden)

    Paul Poisat

    2017-07-01

    Full Text Available Orientation: This article provides an investigation into the current level of development of the body of knowledge related to electronic human resource management (e-HRM by means of a qualitative content analysis. Several aspects of e-HRM, namely definitions of e-HRM, the theoretical perspectives around e-HRM, the role of e-HRM, the various types of e-HRM and the requirements for successful e-HRM, are examined. Research purpose: The purpose of the article was to determine the status of e-HRM and examine the studies that report on the link between e-HRM and organisational productivity. Motivation for the study: e-HRM has the capacity to improve organisational efficiency and leverage the role of human resources (HR as a strategic business partner. Main findings: The notion that the implementation of e-HRM will lead to improved organisational productivity is commonly assumed; however, empirical evidence in this regard was found to be limited. Practical/managerial implications: From the results of this investigation it is evident that more research is required to gain a greater understanding of the influence of e-HRM on organisational productivity, as well as to develop measures for assessing this influence. Contribution: This article proposes additional areas to research and measure when investigating the effectiveness of e-HRM. It provides a different lens from which to view e-HRM assessment whilst keeping it within recognised HR measurement parameters (the HR value chain. In addition, it not only provides areas for measuring e-HRM’s influence but also provides important clues as to how the measurements may be approached.

  20. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  1. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  2. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    Science.gov (United States)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  3. Identifying and evaluating electronic learning resources for use in adult-gerontology nurse practitioner education.

    Science.gov (United States)

    Thompson, Hilaire J; Belza, Basia; Baker, Margaret; Christianson, Phyllis; Doorenbos, Ardith; Nguyen, Huong

    2014-01-01

    Enhancing existing curricula to meet newly published adult-gerontology advanced practice registered nurse (APRN) competencies in an efficient manner presents a challenge to nurse educators. Incorporating shared, published electronic learning resources (ELRs) in existing or new courses may be appropriate in order to assist students in achieving competencies. The purposes of this project were to (a) identify relevant available ELR for use in enhancing geriatric APRN education and (b) to evaluate the educational utility of identified ELRs based on established criteria. A multilevel search strategy was used. Two independent team members reviewed identified ELR against established criteria to ensure utility. Only resources meeting all criteria were retained. Resources were found for each of the competency areas and included formats such as podcasts, Web casts, case studies, and teaching videos. In many cases, resources were identified using supplemental strategies and not through traditional search or search of existing geriatric repositories. Resources identified have been useful to advanced practice educators in improving lecture and seminar content in a particular topic area and providing students and preceptors with additional self-learning resources. Addressing sustainability within geriatric APRN education is critical for sharing of best practices among educators and for sustainability of teaching and related resources. © 2014.

  4. Systematic review of electronic surveillance of infectious diseases with emphasis on antimicrobial resistance surveillance in resource-limited settings.

    Science.gov (United States)

    Rattanaumpawan, Pinyo; Boonyasiri, Adhiratha; Vong, Sirenda; Thamlikitkul, Visanu

    2018-02-01

    Electronic surveillance of infectious diseases involves rapidly collecting, collating, and analyzing vast amounts of data from interrelated multiple databases. Although many developed countries have invested in electronic surveillance for infectious diseases, the system still presents a challenge for resource-limited health care settings. We conducted a systematic review by performing a comprehensive literature search on MEDLINE (January 2000-December 2015) to identify studies relevant to electronic surveillance of infectious diseases. Study characteristics and results were extracted and systematically reviewed by 3 infectious disease physicians. A total of 110 studies were included. Most surveillance systems were developed and implemented in high-income countries; less than one-quarter were conducted in low-or middle-income countries. Information technologies can be used to facilitate the process of obtaining laboratory, clinical, and pharmacologic data for the surveillance of infectious diseases, including antimicrobial resistance (AMR) infections. These novel systems require greater resources; however, we found that using electronic surveillance systems could result in shorter times to detect targeted infectious diseases and improvement of data collection. This study highlights a lack of resources in areas where an effective, rapid surveillance system is most needed. The availability of information technology for the electronic surveillance of infectious diseases, including AMR infections, will facilitate the prevention and containment of such emerging infectious diseases. Copyright © 2018 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  5. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  6. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  7. Schemes of radioactive decay, its interpretations in the scope of the radiological protection

    International Nuclear Information System (INIS)

    Mohamad, N.; Caro, R.A.; Bergoc, R.M.

    1998-01-01

    Full text: In our teaching experience we have verified that the interpretation of the symbols of radioactive decay schemes is one of the most difficult subject in the study of radioisotope methodologies for almost all professionals, and specially for those who have no solid background in mathematics or physics. The correct interpretation of decay schemes has fundamental importance for the proper election of measurement conditions and for performing the dosimetric and shielding calculations. Nuclides employed in Nuclear Medicine and Biomedicine are beta, gamma or beta/gamma emitters. Interpretation of decay schemes of beta emitters, by β + , β - or electronic capture are not difficult. In gamma emitting nuclides it is frequent that a particular level of energy is de-excited through more than one gamma transition of a given percentage and energy. On the other hand, it is also frequent that conversion electrons are emitted together with gamma photons, the proportion of which is usually given as the conversion factor, e/γ. The fraction of emitted photons is calculated as: 1 / [1+ (e/γ)], whereas the fraction of emitted conversion electrons is equal to: (e/γ) / [1+ (e/γ)]. Special attention should be given to the post-accommodation mechanism after disintegration in which orbital vacancies are produced: electron conversion or electron capture, in which the emission of X-rays and Auger electrons occur. All this information should be taken into account for the correct choice of measurement conditions, as well as internal and external dose calculations. In the present work we describe the analysis and interpretation of disintegration schemes in general and that of the most employed nuclides in Nuclear Medicine and Biomedicine. (author) [es

  8. Resource management for heterogeneous networks in LTE systems

    CERN Document Server

    Hu, Rose Qingyang

    2014-01-01

    This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Hetero...

  9. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  10. Optimisation of Investment Resources at Small Enterprises

    Directory of Open Access Journals (Sweden)

    Shvets Iryna B.

    2014-03-01

    Full Text Available The goal of the article lies in the study of the process of optimisation of the structure of investment resources, development of criteria and stages of optimisation of volumes of investment resources for small enterprises by types of economic activity. The article characterises the process of transformation of investment resources into assets and liabilities of the balances of small enterprises and conducts calculation of the structure of sources of formation of investment resources in Ukraine at small enterprises by types of economic activity in 2011. On the basis of the conducted analysis of the structure of investment resources of small enterprises the article forms main groups of criteria of optimisation in the context of individual small enterprises by types of economic activity. The article offers an algorithm and step-by-step scheme of optimisation of investment resources at small enterprises in the form of a multi-stage process of management of investment resources in the context of increase of their mobility and rate of transformation of existing resources into investments. The prospect of further studies in this direction is development of a structural and logic scheme of optimisation of volumes of investment resources at small enterprises.

  11. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables

  12. Importance biasing scheme implemented in the PRIZMA code

    International Nuclear Information System (INIS)

    Kandiev, I.Z.; Malyshkin, G.N.

    1997-01-01

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities

  13. Assessing pollinators’ use of floral resource subsidies in agri-environment schemes: An illustration using Phacelia tanacetifolia and honeybees

    Directory of Open Access Journals (Sweden)

    Rowan Sprague

    2016-11-01

    Full Text Available Background Honeybees (Apis mellifera L. are frequently used in agriculture for pollination services because of their abundance, generalist floral preferences, ease of management and hive transport. However, their populations are declining in many countries. Agri-Environment Schemes (AES are being implemented in agricultural systems to combat the decline in populations of pollinators and other insects. Despite AES being increasingly embedded in policy and budgets, scientific assessments of many of these schemes still are lacking, and only a few studies have examined the extent to which insect pollinators use the floral enhancements that are part of AES and on which floral components they feed (i.e., pollen and/or nectar. Methods In the present work, we used a combination of observations on honeybee foraging for nectar/pollen from the Californian annual plant Phacelia tanacetifolia in the field, collection of pollen pellets from hives, and pollen identification, to assess the value of adding phacelia to an agro-ecosystem to benefit honeybees. Results It was found that phacelia pollen was almost never taken by honeybees. The work here demonstrates that honeybees may not use the floral enhancements added to a landscape as expected and points to the need for more careful assessments of what resources are used by honeybees in AES and understanding the role, if any, which AES play in enhancing pollinator fitness. Discussion We recommend using the methodology in this paper to explore the efficacy of AES before particular flowering species are adopted more widely to give a more complete illustration of the actual efficacy of AES.

  14. Management initiatives in a community-based health insurance scheme.

    Science.gov (United States)

    Sinha, Tara; Ranson, M Kent; Chatterjee, Mirai; Mills, Anne

    2007-01-01

    Community-based health insurance (CBHI) schemes have developed in response to inadequacies of alternate systems for protecting the poor against health care expenditures. Some of these schemes have arisen within community-based organizations (CBOs), which have strong links with poor communities, and are therefore well situated to offer CBHI. However, the managerial capacities of many such CBOs are limited. This paper describes management initiatives undertaken in a CBHI scheme in India, in the course of an action-research project. The existing structures and systems at the CBHI had several strengths, but fell short on some counts, which became apparent in the course of planning for two interventions under the research project. Management initiatives were introduced that addressed four features of the CBHI, viz. human resources, organizational structure, implementation systems, and data management. Trained personnel were hired and given clear roles and responsibilities. Lines of reporting and accountability were spelt out, and supportive supervision was provided to team members. The data resources of the organization were strengthened for greater utilization of this information. While the changes that were introduced took some time to be accepted by team members, the commitment of the CBHI's leadership to these initiatives was critical to their success. Copyright (c) 2007 John Wiley & Sons, Ltd.

  15. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  16. Open-Source Electronic Health Record Systems for Low-Resource Settings: Systematic Review.

    Science.gov (United States)

    Syzdykova, Assel; Malta, André; Zolfo, Maria; Diro, Ermias; Oliveira, José Luis

    2017-11-13

    Despite the great impact of information and communication technologies on clinical practice and on the quality of health services, this trend has been almost exclusive to developed countries, whereas countries with poor resources suffer from many economic and social issues that have hindered the real benefits of electronic health (eHealth) tools. As a component of eHealth systems, electronic health records (EHRs) play a fundamental role in patient management and effective medical care services. Thus, the adoption of EHRs in regions with a lack of infrastructure, untrained staff, and ill-equipped health care providers is an important task. However, the main barrier to adopting EHR software in low- and middle-income countries is the cost of its purchase and maintenance, which highlights the open-source approach as a good solution for these underserved areas. The aim of this study was to conduct a systematic review of open-source EHR systems based on the requirements and limitations of low-resource settings. First, we reviewed existing literature on the comparison of available open-source solutions. In close collaboration with the University of Gondar Hospital, Ethiopia, we identified common limitations in poor resource environments and also the main requirements that EHRs should support. Then, we extensively evaluated the current open-source EHR solutions, discussing their strengths and weaknesses, and their appropriateness to fulfill a predefined set of features relevant for low-resource settings. The evaluation methodology allowed assessment of several key aspects of available solutions that are as follows: (1) integrated applications, (2) configurable reports, (3) custom reports, (4) custom forms, (5) interoperability, (6) coding systems, (7) authentication methods, (8) patient portal, (9) access control model, (10) cryptographic features, (11) flexible data model, (12) offline support, (13) native client, (14) Web client,(15) other clients, (16) code

  17. A virtual network computer's optical storage virtualization scheme

    Science.gov (United States)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  18. Efficient Resource Allocation and Sectorization for Fractional Frequency Reuse (FFR in LTE Femtocell Systems

    Directory of Open Access Journals (Sweden)

    M. T. Kawser

    2015-12-01

    Full Text Available The Fractional Frequency Reuse (FFR is a resource allocation technique that can effectively mitigate inter-cell interference (ICI in LTE based HetNets and it is a promising solution. Various FFR schemes have been suggested to address the challenge of interference in femtocell systems. In this paper, we study the scopes of interference mitigation and capacity improvement. We propose a resource allocation scheme that gradually varies frequency resource share with distance from the eNodeB for both macrocells and femtocells in order to attain better utilization of the resources. This is performed effectively using three layers in the cell. The proposal also employs high number sectors in a cell, low interference and good frequency reuse. Monte-Carlo simulations are performed, which show that the proposed scheme achieves significantly better throughput compared to the existing FFR schemes.

  19. A SCHEDULING SCHEME WITH DYNAMIC FREQUENCY CLOCKING AND MULTIPLE VOLTAGES FOR LOW POWER DESIGNS

    Institute of Scientific and Technical Information of China (English)

    Wen Dongxin; Wang Ling; Yang Xiaozong

    2007-01-01

    In this letter, a scheduling scheme based on Dynamic Frequency Clocking (DFC) and multiple voltages is proposed for low power designs under the timing and the resource constraints.Unlike the conventional methods at high level synthesis where only voltages of nodes were considered,the scheme based on a gain function considers both voltage and frequency simultaneously to reduce energy consumption. Experiments with a number of DSP benchmarks show that the proposed scheme achieves an effective energy reduction.

  20. Experimental studies of VpxB electron linear accelerator

    International Nuclear Information System (INIS)

    Taura, T.; Onihashi, H.; Otsuka, K.; Nishida, Y.; Yugami, N.

    1989-01-01

    In order to demonstrate a new electron linear accelerator an electron beam is accelerated either in the conventional linear accelerator scheme or in the V p xB scheme in a same machine and higher energy gain of about 18 % is observed in the V p xB scheme as is expected from the designed values. The experimental results are compared with the numerical simulation to show reasonable agreement. (author)

  1. A novel block encryption scheme based on chaos and an S-box for wireless sensor networks

    International Nuclear Information System (INIS)

    Tong Xiao-Jun; Zuo Ke; Wang Zhu

    2012-01-01

    The wireless sensor network (WSN) has been widely used in various fields, but it still remains in the preliminary discovery and research phase with a lack of various related mature technologies. Traditional encryption schemes are not suitable for wireless sensor networks due to intrinsic features of the nodes such as low energy, limited computation capability, and lack of storage resources. In this paper, we present a novel block encryption scheme based on the integer discretization of a chaotic map, the Feistel network structure, and an S-box. The novel scheme is fast, secure, has low resource consumption and is suitable for wireless sensor network node encryption schemes. The experimental tests are carried out with detailed analysis, showing that the novel block algorithm has a large key space, very good diffusion and disruptive performances, a strict avalanche effect, excellent statistical balance, and fast encryption speed. These features enable the encryption scheme to pass the SP800-22 test. Meanwhile, the analysis and the testing of speed, time, and storage space on the simulator platform show that this new encryption scheme is well able to hide data information in wireless sensor networks. (general)

  2. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  3. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  4. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  5. ElectroAcoustic Resource Site (EARS)

    OpenAIRE

    Atkinson, Simon; Landy, Leigh

    2002-01-01

    Central to the MTIRC’s electroacoustic music studies focus, EARS is supported by the AHRC’s resource enhancement scheme (ca. £170k) and Unesco (£3k). Beyond its initial goal to create the glossary (~500 entries) and related index (providing a coherent hyperlink structure for the bibliography – ~3000 entries) there are further methodological research imperatives – to offer a web-based resource that: a) Realises an accessible research resource (glossary, keyword index and bibliography) to co...

  6. Part-time work scheme as a pre-retirement measure

    CERN Multimedia

    2004-01-01

    Upon the proposal of the Standing Concertation Committee at its meeting on 3 December 2003, the Director-General has approved the extension for one year of the Part-time work scheme as a pre-retirement measure, until 1 January 2005 inclusive. Human Resources Department Tel. 72808/74128

  7. Evaluation of three electronic report processing systems for preparing hydrologic reports of the U.S Geological Survey, Water Resources Division

    Science.gov (United States)

    Stiltner, G.J.

    1990-01-01

    In 1987, the Water Resources Division of the U.S. Geological Survey undertook three pilot projects to evaluate electronic report processing systems as a means to improve the quality and timeliness of reports pertaining to water resources investigations. The three projects selected for study included the use of the following configuration of software and hardware: Ventura Publisher software on an IBM model AT personal computer, PageMaker software on a Macintosh computer, and FrameMaker software on a Sun Microsystems workstation. The following assessment criteria were to be addressed in the pilot studies: The combined use of text, tables, and graphics; analysis of time; ease of learning; compatibility with the existing minicomputer system; and technical limitations. It was considered essential that the camera-ready copy produced be in a format suitable for publication. Visual improvement alone was not a consideration. This report consolidates and summarizes the findings of the electronic report processing pilot projects. Text and table files originating on the existing minicomputer system were successfully transformed to the electronic report processing systems in American Standard Code for Information Interchange (ASCII) format. Graphics prepared using a proprietary graphics software package were transferred to all the electronic report processing software through the use of Computer Graphic Metafiles. Graphics from other sources were entered into the systems by scanning paper images. Comparative analysis of time needed to process text and tables by the electronic report processing systems and by conventional methods indicated that, although more time is invested in creating the original page composition for an electronically processed report , substantial time is saved in producing subsequent reports because the format can be stored and re-used by electronic means as a template. Because of the more compact page layouts, costs of printing the reports were 15% to 25

  8. Studies of the plasma droplet accelerator scheme

    International Nuclear Information System (INIS)

    Mori, W.B.; Joshi, C.; Dawson, J.M.; Lee, K.; Forslund, D.W.; Kindel, J.M.

    1985-01-01

    In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this the authors have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular they find that at least for laser intensities exceeding v 0 /c=0.03 (/sup ∼/10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme

  9. Studies of the plasma droplet accelerator scheme

    International Nuclear Information System (INIS)

    Mori, W.B.; Dawson, J.M.; Forslund, D.W.; Joshi, C.; Kindel, J.M.; Lee, K.

    1985-01-01

    In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this we have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular we find that at least for laser intensities exceeding v /SUB o/ /c=0.03 ( about10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme

  10. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  11. Cascade self-seeding scheme with wake monochromator for narrow-bandwidth X-ray FELs

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg (Germany); Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2010-06-15

    Three different approaches have been proposed so far for production of highly monochromatic X-rays from a baseline XFEL undulator: (i) single-bunch selfseeding scheme with a four crystal monochromator in Bragg reflection geometry; (ii) double-bunch self-seeding scheme with a four-crystal monochromator in Bragg reflection geometry; (iii) single-bunch self-seeding scheme with a wake monochromator. A unique element of the X-ray optical design of the last scheme is the monochromatization of X-rays using a single crystal in Bragg-transmission geometry. A great advantage of this method is that the monochromator introduces no path delay of X-rays. This fact eliminates the need for a long electron beam bypass, or for the creation of two precisely separated, identical electron bunches, as required in the other two self-seeding schemes. In its simplest configuration, the self-seeded XFEL consists of an input undulator and an output undulator separated by a monochromator. In some experimental situations this simplest two-undulator configuration is not optimal. The obvious and technically possible extension is to use a setup with three or more undulators separated by monochromators. This amplification-monochromatization cascade scheme is distinguished, in performance, by a small heat-loading of crystals and a high spectral purity of the output radiation. This paper describes such cascade self-seeding scheme with wake monochromators.We present feasibility study and exemplifications for the SASE2 line of the European XFEL. (orig.)

  12. Flaw preparations for HSST program vessel fracture mechanics testing: mechanical-cyclic pumping and electron-beam weld-hydrogen-charge cracking schemes

    International Nuclear Information System (INIS)

    Holz, P.P.

    1980-06-01

    The purpose of the document is to present schemes for flaw preparations in heavy section steel. The ability of investigators to grow representative sharp cracks of known size, location, and orientation is basic to representative field testing to determine data for potential flaw propagation, fracture behavior, and margin against fracture for high-pressure-, high-temperature-service steel vessels subjected to increasing pressurization and/or thermal shock. Gaging for analytical stress and strain procedures and ultrasonic and acoustic emission instrumentation can then be applied to monitor the vessel during testing and to study crack growth. This report presents flaw preparations for HSST fracture mechanics testing. Cracks were grown by two techniques: (1) a mechanical method wherein a premachined notch was sharpened by pressurization and (2) a method combining electron-beam welds and hydrogen charging to crack the chill zone of a rapidly placed autogenous weld. The mechanical method produces a naturally occurring growth shape controlled primarily by the shape of the machined notch; the welding-electrochemical method produces flaws of uniform depth from the surface of a wall or machined notch. Theories, details, discussions, and procedures are covered for both of the flaw-growing schemes

  13. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  14. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  15. Basic Principles of Financial Planning in Ex-ante Deposit Insurance Schemes

    Directory of Open Access Journals (Sweden)

    Đurđica Ognjenović

    2006-12-01

    Full Text Available The paper explores main principles of financial planning in ex-ante deposit insurance schemes from a theoretical perspective and in terms of the EU Directive on deposit- guarantee schemes. Further on, the paper assesses how these principles and standards are used in financial planning in deposit insurance schemes around the world for annual budgeting, strategic planning and optimalization of available financial resources. After reviewing available references and different practices, the conclusion is that there are no clear internationally accepted principles for deposit insurers’ financial planning, except some broad and general guidelines. Practices in the industry differ significantly. Given the fact that deposit insurance is in fact a monopolistic business, lack of clear principles and lack of proper financial planning may lead to inadequacy of ex-ante funds and negligence on the side of the management of deposit insurance schemes.

  16. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  17. Coherent electron cooling

    Energy Technology Data Exchange (ETDEWEB)

    Litvinenko,V.

    2009-05-04

    Cooling intense high-energy hadron beams remains a major challenge in modern accelerator physics. Synchrotron radiation is still too feeble, while the efficiency of two other cooling methods, stochastic and electron, falls rapidly either at high bunch intensities (i.e. stochastic of protons) or at high energies (e-cooling). In this talk a specific scheme of a unique cooling technique, Coherent Electron Cooling, will be discussed. The idea of coherent electron cooling using electron beam instabilities was suggested by Derbenev in the early 1980s, but the scheme presented in this talk, with cooling times under an hour for 7 TeV protons in the LHC, would be possible only with present-day accelerator technology. This talk will discuss the principles and the main limitations of the Coherent Electron Cooling process. The talk will describe the main system components, based on a high-gain free electron laser driven by an energy recovery linac, and will present some numerical examples for ions and protons in RHIC and the LHC and for electron-hadron options for these colliders. BNL plans a demonstration of the idea in the near future.

  18. A preliminary categorization of end-of-life electrical and electronic equipment as secondary metal resources

    International Nuclear Information System (INIS)

    Oguchi, Masahiro; Murakami, Shinsuke; Sakanakura, Hirofumi; Kida, Akiko; Kameya, Takashi

    2011-01-01

    Highlights: → End-of-life electrical and electronic equipment (EEE) as secondary metal resources. → The content and the total amount of metals in specific equipment are both important. → We categorized 21 EEE types from contents and total amounts of various metals. → Important equipment types as secondary resources were listed for each metal kind. → Collectability and possible collection systems of various EEE types were discussed. - Abstract: End-of-life electrical and electronic equipment (EEE) has recently received attention as a secondary source of metals. This study examined characteristics of end-of-life EEE as secondary metal resources to consider efficient collection and metal recovery systems according to the specific metals and types of EEE. We constructed an analogy between natural resource development and metal recovery from end-of-life EEE and found that metal content and total annual amount of metal contained in each type of end-of-life EEE should be considered in secondary resource development, as well as the collectability of the end-of-life products. We then categorized 21 EEE types into five groups and discussed their potential as secondary metal resources. Refrigerators, washing machines, air conditioners, and CRT TVs were evaluated as the most important sources of common metals, and personal computers, mobile phones, and video games were evaluated as the most important sources of precious metals. Several types of small digital equipment were also identified as important sources of precious metals; however, mid-size information and communication technology (ICT) equipment (e.g., printers and fax machines) and audio/video equipment were shown to be more important as a source of a variety of less common metals. The physical collectability of each type of EEE was roughly characterized by unit size and number of end-of-life products generated annually. Current collection systems in Japan were examined and potentially appropriate collection

  19. Adaptive Decision-Making Scheme for Cognitive Radio Networks

    KAUST Repository

    Alqerm, Ismail

    2014-05-01

    Radio resource management becomes an important aspect of the current wireless networks because of spectrum scarcity and applications heterogeneity. Cognitive radio is a potential candidate for resource management because of its capability to satisfy the growing wireless demand and improve network efficiency. Decision-making is the main function of the radio resources management process as it determines the radio parameters that control the use of these resources. In this paper, we propose an adaptive decision-making scheme (ADMS) for radio resources management of different types of network applications including: power consuming, emergency, multimedia, and spectrum sharing. ADMS exploits genetic algorithm (GA) as an optimization tool for decision-making. It consists of the several objective functions for the decision-making process such as minimizing power consumption, packet error rate (PER), delay, and interference. On the other hand, maximizing throughput and spectral efficiency. Simulation results and test bed evaluation demonstrate ADMS functionality and efficiency.

  20. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    Science.gov (United States)

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  1. A Credit-Based Congestion-Aware Incentive Scheme for DTNs

    Directory of Open Access Journals (Sweden)

    Qingfeng Jiang

    2016-12-01

    Full Text Available In Delay-Tolerant Networks (DTNs, nodes may be selfish and reluctant to expend their precious resources on forwarding messages for others. Therefore, an incentive scheme is necessary to motivate selfish nodes to cooperatively forward messages. However, the current incentive schemes mainly focus on encouraging nodes to participate in message forwarding, without considering the node congestion problem. When many messages are forwarded to the nodes with high connection degree, these nodes will become congested and deliberately discard messages, which will seriously degrade the routing performance and reduce the benefits of other nodes. To address this problem, we propose a credit-based congestion-aware incentive scheme (CBCAIS for DTNs. In CBCAIS, a check and punishment mechanism is proposed to prevent forwarding nodes from deliberately discarding message. In addition, a message acceptance selection mechanism is proposed to allow the nodes to decide whether to accept other messages, according to self congestion degree. The experimental results show that CBCAIS can effectively stimulate selfish nodes to cooperatively forward messages, and achieve a higher message delivery ratio with lower overhead ratio, compared with other schemes.

  2. Principles of formation of the content of an educational electronic resource on the basis of general and didactic patterns of learning

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Заславская

    2018-12-01

    Full Text Available The article considers the influence of the development of technical means of teaching on the effectiveness of educational and methodical resources. Modern opportunities of information and communication technologies allow creating electronic educational resources that represent educational information that automates the learning process, provide information assistance, if necessary, collect and process statistical information on the degree of development of the content of the school material by schoolchildren, set an individual trajectory of learning, and so on. The main principle of data organization is the division of the training course into separate sections on the thematic elements and components of the learning process. General regularities include laws that encompass the entire didactic system, and in specific (particular cases, those whose actions extend to a separate component (aspect of the system. From the standpoint of the existence of three types of electronic training modules in the aggregate content of the electronic learning resource - information, control and module of practical classes - the principles of the formation of the electronic learning resource, in our opinion, should regulate all these components. Each of the certain principles is considered in the groups: scientific orientation, methodological orientation, systemic nature, accounting of interdisciplinary connections, fundamentalization, systematic and dosage sequence, rational use of study time, accessibility, minimization, operationalization of goals, unified identification diagnosis.

  3. MODEL OF PHYTOPLANKTON COMPETITION FOR LIMITING AND NONLIMITING NUTRIENTS: IMPLICATIONS FOR DEVELOPMENT OF ESTUARINE AND NEARSHORE MANAGEMENT SCHEMES

    Science.gov (United States)

    The global increase of noxious bloom occurrences has increased the need for phytoplankton management schemes. Such schemes require the ability to predict phytoplankton succession. Equilibrium Resources Competition theory, which is popular for predicting succession in lake systems...

  4. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-05-17

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables and challenges as well as lessons learnt by the Project Team.

  5. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  6. EVALUATION OF THERMAL EFFICIENCY OF THE TECHNOLOGICAL SCHEME OF APPLE CHIPS AND DRIED FRUITS PRODUCTION

    Directory of Open Access Journals (Sweden)

    G. V. Kalashnikov

    2014-01-01

    Full Text Available The estimation of thermodynamic perfection of separate technological processes is executed at heat-moisture of handling of fruit and a line of manufacture of fruit apple chips and dried fruits. The technological scheme of a line of processing of fruits and manufactures of fruit chips on the basis of convection and the microwave-dryings suggested resource-saving. The technique is made and results of calculation of thermal expenses for various schemes of manufacture of apple chips are resulted. For the offered scheme material, thermal and power streams on the basis of balance parities of technological processes are certain. The comparative thermal production efficiency of apple chips for a base foreign variant and the offered technological scheme with the closed cycle of use of the heat-carrier and the combined convection-microwave-drying is shown. In this paper we define the thermal and energy flows for the processes of convective drying, pre-microwave drying, hydrothermal treatment and final microwave drying plant material, which are one of the main stages of the production of all kinds of fruit and vegetable concentrates, including fruit apple chips. Resource-saving ways moisture-heat of handling (hydration, blanching, drying, etc. produce raw materials in the production of food concentrates suggested a reduced water flow with a high degree of use of its potential power and microwave sources. To assess the thermal efficiency of the various processes and production schemes used as indicators of thermal efficiency and proposed value of specific heat (kJ / kg given mass productivity per unit of feedstock and translational moisture. The values of the mass fraction of the heat of material flows for the base and the proposed resource-saving production scheme fruit chips, for example, apple, based on a combination of convection-microwave drying each control surface.

  7. Joint Schemes for Physical Layer Security and Error Correction

    Science.gov (United States)

    Adamo, Oluwayomi

    2011-01-01

    The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…

  8. Optimal Consumer Electronics Product Take-Back Time with Consideration of Consumer Value

    Directory of Open Access Journals (Sweden)

    Yi-Tse Fang

    2017-03-01

    Full Text Available Rapid economic growth in recent years has transformed our lifestyle to massively produce, consume, and dispose of products, especially for consumer electronics. This change has put great threat to our environment and caused natural resource depletion. Moreover, short product life cycles and quick replacements of consumer electronics create enormous electronic wastes (e-wastes. Without proper waste management, immense environmental damage is expected. In this empirical study, we notice that lots of valuable materials that can still be recycled from these used consumer electronics are left unused at home instead of being recycled at the appropriate time, which causes a low collection rate and a decrease in residual value for the used products. Therefore, it is important for the government and the recyclers to handle them efficiently by increasing the used product take-back rate. Our study develops an assessment model for customer value based on the idea of value engineering and the perspective of product life cycle. We also explore the relationship between product value and the total cost of ownership with an evaluation of their time variation, considering different usage modes for various consumer groups and different recycling award schemes (fixed and variable recycling awards. Proper take-back management is likely to create a win-win situation both for consumers and environmental protection. This study regards the notebook computer as an example to determine the optimal time for recycling laptops based on usage patterns and provides consumers a reference for when to replace their used product. The results from our modeling firstly clearly indicate that consumers with higher frequency of usage have shorter take back times and higher maximum consumer value. Secondly, a variable recycling award scheme with higher maximum consumer value is more practical than a fixed recycling award scheme.

  9. The Synthesis of the Hierarchical Structure of Information Resources for Management of Electronic Commerce Entities

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2017-06-01

    Full Text Available The aim of the article is to develop the theoretical bases for the classification and coding of economic information and the scientific justification of the content of information resources of an electronic commerce enterprise. The essence of information resources for management of electronic business entities is investigated. It is proved that the organization of accounting in e-commerce systems is advisable to be built on the basis of two circuits: accounting for financial flows and accounting associated with transformation of business factors in products and services as a result of production activities. There presented a sequence of accounting organization that allows to combine the both circuits in a single information system, which provides a possibility for the integrated replenishment and distributed simultaneous use of the e-commerce system by all groups of users. It is proved that the guarantee of efficient activity of the information management system of electronic commerce entities is a proper systematization of the aggregate of information resources on economic facts and operations of an enterprise in accordance with the management tasks by building the hierarchy of accounting nomenclatures. It is suggested to understand nomenclature as an objective, primary information aggregate concerning a certain fact of the economic activity of an enterprise, which is characterized by minimum requisites, is entered into the database of the information system and is to be reflected in the accounting system. It is proposed to build a database of e-commerce systems as a part of directories (constants, personnel, goods / products, suppliers, buyers and the hierarchy of accounting nomenclatures. The package of documents regulating the organization of accounting at an enterprise should include: the provision on the accounting services, the order on the accounting policy, the job descriptions, the schedules of information exchange, the report card and

  10. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  11. Multipartite electronic entanglement purification with charge detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheng Yubo [Department of Physics, Tsinghua University, Beijing 100084 (China); Deng, Fu-Guo [Department of Physics, Beijing Normal University, Beijing 100875 (China); Long Guilu, E-mail: gllong@tsinghua.edu.c [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Tsinghua National Laboratory for Information Science and Technology, Beijing 100084 (China)

    2011-01-17

    We present a multipartite entanglement purification scheme in a Greenberger-Horne-Zeilinger state for electrons based on their spins and their charges. This scheme works for purification with two steps, i.e., bit-flip error correction and phase-flip error correction. By repeating these two steps, the parties in quantum communication can get some high-fidelity multipartite entangled electronic systems.

  12. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  13. Novel Schemes for Measurement-Based Quantum Computation

    International Nuclear Information System (INIS)

    Gross, D.; Eisert, J.

    2007-01-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics--based on finitely correlated or projected entangled pair states--to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems

  14. Novel schemes for measurement-based quantum computation.

    Science.gov (United States)

    Gross, D; Eisert, J

    2007-06-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics-based on finitely correlated or projected entangled pair states-to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems.

  15. Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission

    Directory of Open Access Journals (Sweden)

    Fan Jiang

    2017-11-01

    Full Text Available In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective resource allocation and power control schemes, while considering the quality of service (QoS requirements of both cellular users (CUs and D2D clusters. We first build the optimization model and a heuristic resource and power allocation algorithm is then proposed to solve the energy-efficiency problem with less computational complexity. Numerical results indicate that the proposed algorithm outperforms existing schemes in terms of throughput per energy consumption.

  16. A predictive control scheme for real-time demand response applications

    NARCIS (Netherlands)

    Lampropoulos, I.; Baghina, N.G.; Kling, W.L.; Ribeiro, P.F.

    2013-01-01

    In this work, the focus is placed on the proof of concept of a novel control scheme for demand response. The control architecture considers a uniform representation of non-homogeneous distributed energy resources and allows the participation of virtually all system users in electricity markets. The

  17. Theory of neutron scattering by atomic electrons: jj-coupling scheme

    International Nuclear Information System (INIS)

    Balcar, E.; Lovesey, S.W.; Uppsala Univ.

    1991-02-01

    Expressions are reported for the matrix element of the neutron-electron interaction for atomic electrons in a j n configuration, appropriate for palladium and platinum group compounds and rare earth and actinide materials. For the latter, f-electron systems, an isolated ion is a realistic approximation. Compact expressions are provided, together with tables of reduced matrix elements, for elastic and inelastic structure factors, and compared with the corresponding Russell-Saunders expressions. Inelastic scattering by two f-electrons, including non-equivalent states, is presented in detail. (author)

  18. Study of the scheme of two-beam accelerator driver with accompanying electromagnetic wave

    International Nuclear Information System (INIS)

    Elzhov, A.V.; Kaminskij, A.K.; Kazacha, V.I.; Perel'shtejn, E.A.; Sedykh, S.N.; Sergeev, A.P.

    2000-01-01

    A novel scheme of two-beam accelerator (TBA) driver based on a linear induction accelerator is considered. In this scheme the bunched beam propagates in the accompanying enhanced microwave that provides the steady longitudinal beam bunching along the whole driver. A travelling wave tube (TWT) is used as the wave-slowing periodic structure. Major merits of the driver scheme in hand are the possibilities of providing the microwave phase and amplitude stability and the preliminary beam bunching at a rather low initial energy (∼ 1 MeV). The numerical simulation has shown that a steady state could be found when electron bunches accompanied by an amplified microwave are simultaneously accelerated in the external electric field. The total power, which is inserted into the beam by the accelerating field, transforms into the microwave power in the steady state. The first set of experiments was fulfilled with the buncher on the base of the JINR LIU-3000 linac (electron beam energy ∼ 600 keV, electron current ∼ 150 A). The considerable level of the amplified microwave power (∼ 5 MW) and high enough bunching parameter (∼ 0.4) were obtained. The electron beam bunching at the frequency of 36.4 GHz was registered by means of the Cherenkov radiation of the electron bunches that occurred at their passing through the special target. The beam keeps a high bunching level at the distance ∼ 10 cm from the TWT exit being accompanied by the amplified microwave

  19. Communication Schemes with Constrained Reordering of Resources

    DEFF Research Database (Denmark)

    Popovski, Petar; Utkovski, Zoran; Trillingsgaard, Kasper Fløe

    2013-01-01

    This paper introduces a communication model inspired by two practical scenarios. The first scenario is related to the concept of protocol coding, where information is encoded in the actions taken by an existing communication protocol. We investigate strategies for protocol coding via combinatorial...... reordering of the labelled user resources (packets, channels) in an existing, primary system. However, the degrees of freedom of the reordering are constrained by the operation of the primary system. The second scenario is related to communication systems with energy harvesting, where the transmitted signals...... are constrained by the energy that is available through the harvesting process. We have introduced a communication model that covers both scenarios and elicits their key feature, namely the constraints of the primary system or the harvesting process. We have shown how to compute the capacity of the channels...

  20. New mitigation schemes of the ablative Rayleigh-Taylor instability

    International Nuclear Information System (INIS)

    Azechi, H.; Shiraga, H.; Nakai, M.; Shigemori, K.; Fujioka, S.; Sakaiya, T.; Tamari, Y.; Ohtani, K.; Watari, T.; Murakami, M.; Sunahara, A.; Nagatomo, H.; Nishihara, K.; Miyanaga, N.; Izawa, Y.; Ohnishi, N.

    2005-01-01

    The Rayleigh-Taylor (RT) instability with material ablation through the unstable interface is the key physics that determines success or failure of inertial fusion energy (IFE) generation, as the RT instability potentially quenches ignition and burn by disintegrating the IFE target. We present two suppression schemes of the RT growth without significant degradation of the target density. The first scheme is to generate double ablation structure in high-Z doped plastic targets. In addition to the electron ablation surface, a new ablation surface is created by x-ray radiation from the high-Z ions. Contrary to the previous thought, the electron ablation surface is almost completely stabilized by extremely high flow velocity. On the other hand, the RT instability on the radiative ablation surface is significantly moderated. The second is to enhance the nonlocal nature of the electron heat transport by illuminating the target with long wavelength laser light, whereas the high ablation pressure is generated by irradiating short wavelength laser light. The significant suppression of the RT instability may increase the possibility of impact ignition which uses a high velocity fuel colliding with a preformed main fuel. (author)

  1. An Optimization Scheme for Water Pump Control in Smart Fish Farm with Efficient Energy Consumption

    Directory of Open Access Journals (Sweden)

    Israr Ullah

    2018-06-01

    Full Text Available Healthy fish production requires intensive care and ensuring stable and healthy production environment inside the farm tank is a challenging task. An Internet of Things (IoT based automated system is highly desirable that can continuously monitor the fish tanks with optimal resources utilization. Significant cost reduction can be achieved if farm equipment and water pumps are operated only when required using optimization schemes. In this paper, we present a general system design for smart fish farms. We have developed an optimization scheme for water pump control to maintain desired water level in fish tank with efficient energy consumption through appropriate selection of pumping flow rate and tank filling level. Proposed optimization scheme attempts to achieve a trade-off between pumping duration and flow rate through selection of optimized water level. Kalman filter algorithm is applied to remove error in sensor readings. We observed through simulation results that optimization scheme achieve significant reduction in energy consumption as compared to the two alternate schemes, i.e., pumping with maximum and minimum flow rates. Proposed system can help in collecting the data about the farm for long-term analysis and better decision making in future for efficient resource utilization and overall profit maximization.

  2. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  3. One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures for enhanced hydrogen generation

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Hongqing [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Zhang, Peng, E-mail: Zhangp@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Hu, Junhua, E-mail: Hujh@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Pan, Jimin [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); Fan, Jiajie [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Shao, Guosheng [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Institute for Renewable Energy and Environmental Technologies, University of Bolton, Bolton BL35AB (United Kingdom)

    2017-01-01

    Graphical abstract: We reported one-dimensional solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation. - Highlights: • The composite nanofibers were fabricated by facile electrospinning technique. • The composite nanofibers exhibited enhanced activity for H{sub 2} evolution. • Enhanced activity is due to the formation of Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterojunction. - Abstract: One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures were fabricated by integrating a facile electrospinning technique and subsequent annealing in air. X-ray diffraction, scanning electron microscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and UV–vis diffuse reflectance spectroscopy, were used to characterize the as-fabricated samples. The results showed that the H{sub 2}-generation of the as-fabricated one-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures (S2) was greatly enhanced compared with pure TiO{sub 2} nanofibers (S0) and TiO{sub 2}/WO{sub 3} nanofibers (S1). The enhanced photocatalyst activities were mainly attributed to the solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation on these semiconductors, which were evidenced by electrochemical impedance spectroscopy (EIS) and photocurrent analysis.

  4. The Effects of Knowledge Accumulation on Intergenerational Allocation of an Exhaustible Resource with Amenity Value

    OpenAIRE

    CAI, Dapeng

    2002-01-01

    This paper analyzes equilibrium intergenerational allocation of an exhaustible resource with amenity value in an overlapping generations (OLG) economy. The paper first reviews two allocation schemes and concludes the ‘trust fund’ scheme, which is deemed to be ‘intergenerationally democratic’, is preferred to the ‘grandfathering’ scheme, which represents the business-as usual practice of resource use. It then introduces knowledge accumulation into the model by imposing a public R&D sector th...

  5. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  6. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  7. Resource-Aware Load Balancing Scheme using Multi-objective Optimization in Cloud Computing

    OpenAIRE

    Kavita Rana; Vikas Zandu

    2016-01-01

    Cloud computing is a service based, on-demand, pay per use model consisting of an interconnected and virtualizes resources delivered over internet. In cloud computing, usually there are number of jobs that need to be executed with the available resources to achieve optimal performance, least possible total time for completion, shortest response time, and efficient utilization of resources etc. Hence, job scheduling is the most important concern that aims to ensure that use’s requirement are ...

  8. Current use of impact models for agri-environment schemes and potential for improvements of policy design and assessment.

    Science.gov (United States)

    Primdahl, Jørgen; Vesterager, Jens Peter; Finn, John A; Vlahos, George; Kristensen, Lone; Vejre, Henrik

    2010-06-01

    Agri-Environment Schemes (AES) to maintain or promote environmentally-friendly farming practices were implemented on about 25% of all agricultural land in the EU by 2002. This article analyses and discusses the actual and potential use of impact models in supporting the design, implementation and evaluation of AES. Impact models identify and establish the causal relationships between policy objectives and policy outcomes. We review and discuss the role of impact models at different stages in the AES policy process, and present results from a survey of impact models underlying 60 agri-environmental schemes in seven EU member states. We distinguished among three categories of impact models (quantitative, qualitative or common sense), depending on the degree of evidence in the formal scheme description, additional documents, or key person interviews. The categories of impact models used mainly depended on whether scheme objectives were related to natural resources, biodiversity or landscape. A higher proportion of schemes dealing with natural resources (primarily water) were based on quantitative impact models, compared to those concerned with biodiversity or landscape. Schemes explicitly targeted either on particular parts of individual farms or specific areas tended to be based more on quantitative impact models compared to whole-farm schemes and broad, horizontal schemes. We conclude that increased and better use of impact models has significant potential to improve efficiency and effectiveness of AES. (c) 2009 Elsevier Ltd. All rights reserved.

  9. High gain harmonic generation free electron lasers enhanced by pseudoenergy bands

    Directory of Open Access Journals (Sweden)

    Takashi Tanaka

    2017-08-01

    Full Text Available We propose a new scheme for high gain harmonic generation free electron lasers (HGHG FELs, which is seeded by a pair of intersecting laser beams to interact with an electron beam in a modulator undulator located in a dispersive section. The interference of the laser beams gives rise to a two-dimensional modulation in the energy-time phase space because of a strong correlation between the electron energy and the position in the direction of dispersion. This eventually forms pseudoenergy bands in the electron beam, which result in efficient harmonic generation in HGHG FELs in a similar manner to the well-known scheme using the echo effects. The advantage of the proposed scheme is that the beam quality is less deteriorated than in other existing schemes.

  10. Electronic theses and dissertations: a review of this valuable resource for nurse scholars worldwide.

    Science.gov (United States)

    Goodfellow, L M

    2009-06-01

    A worldwide repository of electronic theses and dissertations (ETDs) could provide worldwide access to the most up-to-date research generated by masters and doctoral students. Until that international repository is established, it is possible to access some of these valuable knowledge resources. ETDs provide a technologically advanced medium with endless multimedia capabilities that far exceed the print and bound copies of theses and dissertations housed traditionally in individual university libraries. CURRENT USE: A growing trend exists for universities worldwide to require graduate students to submit theses or dissertations as electronic documents. However, nurse scholars underutilize ETDs, as evidenced by perusing bibliographic citation lists in many of the research journals. ETDs can be searched for and retrieved through several digital resources such as the Networked Digital Library of Theses and Dissertations (http://www.ndltd.org), ProQuest Dissertations and Theses (http://www.umi.com), the Australasian Digital Theses Program (http://adt.caul.edu.au/) and through individual university web sites and online catalogues. An international repository of ETDs benefits the community of nurse scholars in many ways. The ability to access recent graduate students' research electronically from anywhere in the world is advantageous. For scholars residing in developing countries, access to these ETDs may prove to be even more valuable. In some cases, ETDs are not available for worldwide access and can only be accessed through the university library from which the student graduated. Public access to university library ETD collections is not always permitted. Nurse scholars from both developing and developed countries could benefit from ETDs.

  11. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  13. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  14. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  15. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  16. Social Protection Schemes in Pakistan: assessment of existing programs

    Directory of Open Access Journals (Sweden)

    Yu ShuHong

    2017-07-01

    Full Text Available Social protection is regarded as a basic human right guaranteed in several International Covenants and Treaties. The Constitution of Pakistan exclusively stipulates the provision of social security for all citizens of the country. The aim of the study is to explore and evaluate the social protection schemes with regards to its coverage, scope and outreach. The country has number of social security schemes that are being carried out by provincial and federal governments for the welfare of workers like old age benefits, disablement, health and medical facilities. However, these schemes have failed to extend their benefits to home based, part-time, temporary or contract and agricultural workers. This paper attempts to highlight the shortcomings of existing social protection programs that are obstructing their benefit distribution and limiting their outreach. It underlines the challenges faced by the implementing agencies. This paper also suggests some improvements in the structural design of social security mechanism with special focus on the scope, coverage, outreach and effective delivery mechanism. Since, the proper allocation of resources and effective implementation of these schemes can ensure the assistance and welfare of the targeted population.

  17. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  18. Automation of the control scheme for IUAC Linac

    International Nuclear Information System (INIS)

    Sahu, B.K.; Dutt, R.N.; Antony, J.; Mathuria, D.S.; Pandey, A.; Singh, K.; Ahuja, R.; Chowdhury, G.K.; Rai, A.; Patra, P.; Ghosh, S.; Ajithkumar, B.P.; Kanjilal, D.; Roy, A.

    2011-01-01

    Improvement of the Linac control scheme is undertaken for automation with minimum human intervention during beam acceleration. Python language interface with the present control scheme is used in writing automation routines to monitor the status of the phase/amplitude lock during operation and shut-down the locking mechanism to reduce the RF power, if required. Simultaneous pulse conditioning of the resonators is made possible by using dedicated hardware interfaced and Python based client interface. Movement of the drive coupler is enabled from operation console with position read back. The manual control of the slow-tuner electronics module to bring the frequency close to reference during phase locking is interfaced with the present control scheme for remote operation. Monitoring of amplitude and absolute phase of each cavity is made possible from operation console. An alternate tuning mechanism using piezoelectric actuator and stepper motor combination has been successfully tested in the test cryostat. (author)

  19. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  20. Prediction-based association control scheme in dense femtocell networks

    Science.gov (United States)

    Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond

    2017-01-01

    The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system’s effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective. PMID:28328992

  1. Multi-Layer Soft Frequency Reuse Scheme for 5G Heterogeneous Cellular Networks

    DEFF Research Database (Denmark)

    Shakir, Md. Hossain; Tariq, Faisal; Safdar, Ghazanfar

    2017-01-01

    Heterogeneous network (HetNet) is a promising cell deployment technique where low power access points are deployed overlaid on a macrocell system. It attains high throughput by intelligently reusing spectrum, and brings a trade-off between energy- and spectral-efficiency. An efficient resource...... allocation strategy is required to significantly improve its throughput in a bid to meet the fifth-generation (5G) high data rate requirements. In this correspondence, a new resource allocation scheme for HetNet, called multi-level soft frequency reuse for HetNet (ML-SFR HetNet), is proposed which increases...... the throughput several fold. We derived spectrum and power allocation expression for a generalized HetNet scenario. In addition, analytical expressions for the throughput and area spectral efficiency (ASE) are also developed. The simulations results demonstrates the efficiency of the proposed scheme which...

  2. ELECTRONIC EDUCATIONAL RESOURCES FOR ONLINE SUPPORT OF MODERN CHEMISTRY CLASSES IN SPECIALIZED SCHOOL

    Directory of Open Access Journals (Sweden)

    Maria D. Tukalo

    2013-09-01

    Full Text Available This article contains material of some modern electronic educational resources that can be used via the Internet to support the modern chemistry classes in specialized school. It was drawn attention to the educational chemical experiments as means of knowledge; simulated key motivational characteristics to enhance students interest for learning subjects, their cognitive and practical activity in the formation of self-reliance and self-creative; commented forecasts for creating of conditions to enhance the creative potential of students in a modern learning environment.

  3. Selection and Evaluation of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Doğan Atılgan

    2013-11-01

    Full Text Available Publication boom and issues related to controlling and accession of printed sources have created some problems after World War II. Consequently, publishing industry has encountered the problem of finding possible solution for emerged situation. Industry of electronic publishing has started to improve with the rapid increase of the price of printed sources as well as the problem of publication boom. The first effects of electronic publishing were appeared on the academic and scholarly publications then electronic publishing became a crucial part of all types of publications. As a result of these developments, collection developments and service policies of information centers were also significantly changed. In this article, after a general introduction about selection and evaluation processes of electronic publications, the subscribed databases by a state and a privately owned university in Turkey and their usage were examined.

  4. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  5. Hospital financing: calculating inpatient capital costs in Germany with a comparative view on operating costs and the English costing scheme.

    Science.gov (United States)

    Vogl, Matthias

    2014-04-01

    The paper analyzes the German inpatient capital costing scheme by assessing its cost module calculation. The costing scheme represents the first separated national calculation of performance-oriented capital cost lump sums per DRG. The three steps in the costing scheme are reviewed and assessed: (1) accrual of capital costs; (2) cost-center and cost category accounting; (3) data processing for capital cost modules. The assessment of each step is based on its level of transparency and efficiency. A comparative view on operating costing and the English costing scheme is given. Advantages of the scheme are low participation hurdles, low calculation effort for G-DRG calculation participants, highly differentiated cost-center/cost category separation, and advanced patient-based resource allocation. The exclusion of relevant capital costs, nontransparent resource allocation, and unclear capital cost modules, limit the managerial relevance and transparency of the capital costing scheme. The scheme generates the technical premises for a change from dual financing by insurances (operating costs) and state (capital costs) to a single financing source. The new capital costing scheme will intensify the discussion on how to solve the current investment backlog in Germany and can assist regulators in other countries with the introduction of accurate capital costing. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  7. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-05-03

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  8. An entropy-variables-based formulation of residual distribution schemes for non-equilibrium flows

    Science.gov (United States)

    Garicano-Mena, Jesús; Lani, Andrea; Degrez, Gérard

    2018-06-01

    In this paper we present an extension of Residual Distribution techniques for the simulation of compressible flows in non-equilibrium conditions. The latter are modeled by means of a state-of-the-art multi-species and two-temperature model. An entropy-based variable transformation that symmetrizes the projected advective Jacobian for such a thermophysical model is introduced. Moreover, the transformed advection Jacobian matrix presents a block diagonal structure, with mass-species and electronic-vibrational energy being completely decoupled from the momentum and total energy sub-system. The advantageous structure of the transformed advective Jacobian can be exploited by contour-integration-based Residual Distribution techniques: established schemes that operate on dense matrices can be substituted by the same scheme operating on the momentum-energy subsystem matrix and repeated application of scalar scheme to the mass-species and electronic-vibrational energy terms. Finally, the performance gain of the symmetrizing-variables formulation is quantified on a selection of representative testcases, ranging from subsonic to hypersonic, in inviscid or viscous conditions.

  9. The level of the usage of the human resource information system and electronic recruitment in Croatian companies

    Directory of Open Access Journals (Sweden)

    Snježana Pivac

    2014-12-01

    Full Text Available Performing business according to contemporary requirements influences companies for continuous usage of modern managerial tools, such as a human resource information system (HRIS and electronic recruitment (ER. Human resources have been recognised as curtail resources and the main source of a competitive advantage in creation of successful business performance. In order to attract and select the top employees, companies use quality information software for attracting internal ones, and electronic recruitment for attracting the best possible external candidates. The main aim of this paper is to research the level of the usage of HRIS and ER within medium-size and large Croatian companies. Moreover, the additional aim of this paper is to evaluate the relationship among the usage of these modern managerial tools and the overall success of human resource management within these companies. For the purpose of this paper, primary and secondary research has been conducted in order to reveal the level of the usage of HRIS and ER as well as the overall success of human resource management in Croatian companies. The companies’ classification (HRIS and ER is done by using the non-hierarchical k-means cluster method as well as the nonparametric Kruskal Wallis test. Further, the companies are ranked by the multicriteria PROMETHEE method. Relevant nonparametric tests are used for testing the overall companies’ HRM. Finally, binary logistic regression is estimated, relating binary variable HRM and HRIS development. After detailed research, it can be concluded that large Croatian companies apply HRIS in majority (with a positive relation to HRM performance, but still require certain degrees of its development.

  10. The electronic encapsulation of knowledge in hydraulics, hydrology and water resources

    Science.gov (United States)

    Abbott, Michael B.

    The rapidly developing practice of encapsulating knowledge in electronic media is shown to lead necessarily to the restructuring of the knowledge itself. The consequences of this for hydraulics, hydrology and more general water-resources management are investigated in particular relation to current process-simulation, real-time control and advice-serving systems. The generic properties of the electronic knowledge encapsulator are described, and attention is drawn to the manner in which knowledge 'goes into hiding' through encapsulation. This property is traced in the simple situations of pure mathesis and in the more complex situations of taxinomia using one example each from hydraulics and hydrology. The consequences for systems architectures are explained, pointing to the need for multi-agent architectures for ecological modelling and for more general hydroinformatics systems also. The relevance of these developments is indicated by reference to ongoing projects in which they are currently being realised. In conclusion, some more general epistemological aspects are considered within the same context. As this contribution is so much concerned with the processes of signification and communication, it has been partly shaped by the theory of semiotics, as popularised by Eco ( A Theory of Semiotics, Indiana University, Bloomington, 1977).

  11. Emulation-based comparative study of centralized and distributed control schemes for optical networks

    Science.gov (United States)

    Xin, Chunsheng; Ye, Yinghua; Dixit, Sudhir; Qiao, Chunming

    2001-07-01

    Recently there are considerable amount of research about the automatic control and provisioning in all optical networks. One of the critical issues is how to provide effective lightpath provisioning to improve network performance, such as blocking probability and decision time. Depending on the network topology, configuration, and administration policy, a distributed or centralized control scheme can be employed to manage the routing and signaling. In a distributed control scheme, each node exchanges information with other nodes, but performs routing and signaling independently from other nodes. On the other hand, in a centralized scheme, each node communicates with a central controller and the controller performs routing and signaling on behalf of all other nodes. Intuitively, the centralized scheme can obtain a lower blocking probability since the controller has the complete resource availability information. We have studied the two schemes through emulations, determined the signaling and processing overheads and quantified the conditions that favor one approach over the other.

  12. Application of kinetic flux vector splitting scheme for solving multi-dimensional hydrodynamical models of semiconductor devices

    Science.gov (United States)

    Nisar, Ubaid Ahmed; Ashraf, Waqas; Qamar, Shamsul

    In this article, one and two-dimensional hydrodynamical models of semiconductor devices are numerically investigated. The models treat the propagation of electrons in a semiconductor device as the flow of a charged compressible fluid. It plays an important role in predicting the behavior of electron flow in semiconductor devices. Mathematically, the governing equations form a convection-diffusion type system with a right hand side describing the relaxation effects and interaction with a self consistent electric field. The proposed numerical scheme is a splitting scheme based on the kinetic flux-vector splitting (KFVS) method for the hyperbolic step, and a semi-implicit Runge-Kutta method for the relaxation step. The KFVS method is based on the direct splitting of macroscopic flux functions of the system on the cell interfaces. The second order accuracy of the scheme is achieved by using MUSCL-type initial reconstruction and Runge-Kutta time stepping method. Several case studies are considered. For validation, the results of current scheme are compared with those obtained from the splitting scheme based on the NT central scheme. The effects of various parameters such as low field mobility, device length, lattice temperature and voltage are analyzed. The accuracy, efficiency and simplicity of the proposed KFVS scheme validates its generic applicability to the given model equations. A two dimensional simulation is also performed by KFVS method for a MESFET device, producing results in good agreement with those obtained by NT-central scheme.

  13. Comparing Profitability and Efficiency of Resource Use in Vegetable ...

    African Journals Online (AJOL)

    This study compared resource allocation, yield, net farm income and resource use efficiency under private and government controlled vegetable irrigation schemes. Production data covering three vegetable enterprises were collected from 280 respondents. This consisted of 141 from private and 139 from government ...

  14. On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes

    NARCIS (Netherlands)

    Tang, Qiang; Jeckmans, Arjan

    A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. Researchers have identified a number of potential applications, such as constructing timed cryptography,

  15. RESEARCH OF INFLUENCE OF QUALITY OF ELECTRONIC EDUCATIONAL RESOURCES ON QUALITY OF TRAINING WITH USE OF DISTANCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    H. M. Kravtsov

    2013-03-01

    Full Text Available Communication improving of educational processes requires today new approaches to the management arrangements and forming of educational policy in the field of distance learning, which is based on the use of modern information and communication technologies. An important step in this process is the continuous monitoring of the development and implementation of information technology and, in particular, the distance learning systems in higher educational establishments. The main objective of the monitoring is the impact assessment on the development of distance learning following the state educational standards, curricula, methodical and technical equipment and other factors; factors revelation that influence the implementation and outcomes of distance learning; results comparison of educational institution functioning and distance education systems in order to determine the most efficient ways of its development. The paper presents the analysis results of the dependence of the quality of educational services on the electronic educational resources. Trends in educational services development was studied by comparing the quality influence of electronic educational resources on the quality of educational services of higher pedagogical educational institutions of Ukraine as of 2009-2010 and 2012-2013. Generally, the analysis of the survey results allows evaluating quality of the modern education services as satisfactory and it can be said that almost 70% of the success of their future development depends on the quality of the used electronic educational resources and distance learning systems in particular.

  16. Application of a general self-consistency scheme in the linear combination of atomic orbitals formalism to the electronic and structural properties of Si and W

    International Nuclear Information System (INIS)

    Chan, C.T.; Vanderbilt, D.; Louie, S.G.; Materials and Molecular Research Division, Lawrence Berkeley Laboratory, University of California, Berkeley, California 94720)

    1986-01-01

    We present a general self-consistency procedure formulated in momentum space for electronic structure and total-energy calculations of crystalline solids. It is shown that both the charge density and the change in the Hamiltonian matrix elements in each iteration can be calculated in a straight-forward fashion once a set of overlap matrices is computed. The present formulation has the merit of bringing the self-consistency problem for different basis sets to the same footing. The scheme is used to extend a first-principles pseudopotential linear combination of Gaussian orbitals method to full point-by-point self-consistency, without refitting of potentials. It is shown that the set of overlap matrices can be calculated very efficiently if we exploit the translational and space-group symmetries of the system under consideration. This scheme has been applied to study the structural and electronic properties of Si and W, prototypical systems of very different bonding properties. The results agree well with experiment and other calculations. The fully self-consistent results are compared with those obtained by a variational procedure [J. R. Chelikowsky and S. G. Louie, Phys. Rev. B 29, 3470 (1984)]. We find that the structural properties for bulk Si and W (both systems have no interatomic charge transfer) can be treated accurately by the variational procedure. However, full self-consistency is needed for an accurate description of the band energies

  17. A cross-layer resource allocation scheme for spatial multiplexing-based MIMO-OFDMA systems

    Directory of Open Access Journals (Sweden)

    Al-Shatri Hussein

    2011-01-01

    Full Text Available Abstract We investigate the resource allocation problem for the downlink of a multiple-input multiple-output orthogonal frequency division multiple access (MIMO-OFDMA system. The sum rate maximization itself cannot cope with fairness among users. Hence, we address this problem in the context of the utility-based resource allocation presented in earlier papers. This resource allocation method allows to enhance the efficiency and guarantee fairness among users by exploiting multiuser diversity, frequency diversity, as well as time diversity. In this paper, we treat the overall utility as the quality of service indicator and design utility functions with respect to the average transmission rate in order to simultaneously provide two services, real-time and best-effort. Since the optimal solutions are extremely computationally complex to obtain, we propose a suboptimal joint subchannel and power control algorithm that converges very fast and simplifies the MIMO resource allocation problem into a single-input single-output resource allocation problem. Simulation results indicate that using the proposed method achieves near-optimum solutions, and the available resources are distributed more fairly among users.

  18. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  19. Tracking the Flow of Resources in Electronic Waste - The Case of End-of-Life Computer Hard Disk Drives.

    Science.gov (United States)

    Habib, Komal; Parajuly, Keshav; Wenzel, Henrik

    2015-10-20

    Recovery of resources, in particular, metals, from waste flows is widely seen as a prioritized option to reduce their potential supply constraints in the future. The current waste electrical and electronic equipment (WEEE) treatment system is more focused on bulk metals, where the recycling rate of specialty metals, such as rare earths, is negligible compared to their increasing use in modern products, such as electronics. This study investigates the challenges in recovering these resources in the existing WEEE treatment system. It is illustrated by following the material flows of resources in a conventional WEEE treatment plant in Denmark. Computer hard disk drives (HDDs) containing neodymium-iron-boron (NdFeB) magnets were selected as the case product for this experiment. The resulting output fractions were tracked until their final treatment in order to estimate the recovery potential of rare earth elements (REEs) and other resources contained in HDDs. The results further show that out of the 244 kg of HDDs treated, 212 kg comprising mainly of aluminum and steel can be finally recovered from the metallurgic process. The results further demonstrate the complete loss of REEs in the existing shredding-based WEEE treatment processes. Dismantling and separate processing of NdFeB magnets from their end-use products can be a more preferred option over shredding. However, it remains a technological and logistic challenge for the existing system.

  20. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  1. Energy Saving in Three-Phase Diode Rectifiers Using EI Technique with Adjustable Switching Frequency Scheme

    DEFF Research Database (Denmark)

    Davari, Pooya; Zare, Firuz; Yang, Yongheng

    2016-01-01

    A front-end rectifier can significantly impact a power electronics system performance and efficiency for applications such as motor drive where the system commonly operates under partial loading conditions. This paper proposes an adjustable switching frequency scheme using an electronic inductor...

  2. Robot-Beacon Distributed Range-Only SLAM for Resource-Constrained Operation.

    Science.gov (United States)

    Torres-González, Arturo; Martínez-de Dios, Jose Ramiro; Ollero, Anibal

    2017-04-20

    This work deals with robot-sensor network cooperation where sensor nodes (beacons) are used as landmarks for Range-Only (RO) Simultaneous Localization and Mapping (SLAM). Most existing RO-SLAM techniques consider beacons as passive devices disregarding the sensing, computational and communication capabilities with which they are actually endowed. SLAM is a resource-demanding task. Besides the technological constraints of the robot and beacons, many applications impose further resource consumption limitations. This paper presents a scalable distributed RO-SLAM scheme for resource-constrained operation. It is capable of exploiting robot-beacon cooperation in order to improve SLAM accuracy while meeting a given resource consumption bound expressed as the maximum number of measurements that are integrated in SLAM per iteration. The proposed scheme combines a Sparse Extended Information Filter (SEIF) SLAM method, in which each beacon gathers and integrates robot-beacon and inter-beacon measurements, and a distributed information-driven measurement allocation tool that dynamically selects the measurements that are integrated in SLAM, balancing uncertainty improvement and resource consumption. The scheme adopts a robot-beacon distributed approach in which each beacon participates in the selection, gathering and integration in SLAM of robot-beacon and inter-beacon measurements, resulting in significant estimation accuracies, resource-consumption efficiency and scalability. It has been integrated in an octorotor Unmanned Aerial System (UAS) and evaluated in 3D SLAM outdoor experiments. The experimental results obtained show its performance and robustness and evidence its advantages over existing methods.

  3. A hybrid-drive nonisobaric-ignition scheme for inertial confinement fusion

    Energy Technology Data Exchange (ETDEWEB)

    He, X. T., E-mail: xthe@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Institute of Fusion Theory and Simulation, Zhejiang University, Hangzhou 310027 (China); Li, J. W.; Wang, L. F.; Liu, J.; Lan, K.; Ye, W. H. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Fan, Z. F.; Wu, J. F. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China)

    2016-08-15

    A new hybrid-drive (HD) nonisobaric ignition scheme of inertial confinement fusion (ICF) is proposed, in which a HD pressure to drive implosion dynamics increases via increasing density rather than temperature in the conventional indirect drive (ID) and direct drive (DD) approaches. In this HD (combination of ID and DD) scheme, an assembled target of a spherical hohlraum and a layered deuterium-tritium capsule inside is used. The ID lasers first drive the shock to perform a spherical symmetry implosion and produce a large-scale corona plasma. Then, the DD lasers, whose critical surface in ID corona plasma is far from the radiation ablation front, drive a supersonic electron thermal wave, which slows down to a high-pressure electron compression wave, like a snowplow, piling up the corona plasma into high density and forming a HD pressurized plateau with a large width. The HD pressure is several times the conventional ID and DD ablation pressure and launches an enhanced precursor shock and a continuous compression wave, which give rise to the HD capsule implosion dynamics in a large implosion velocity. The hydrodynamic instabilities at imploding capsule interfaces are suppressed, and the continuous HD compression wave provides main pdV work large enough to hotspot, resulting in the HD nonisobaric ignition. The ignition condition and target design based on this scheme are given theoretically and by numerical simulations. It shows that the novel scheme can significantly suppress implosion asymmetry and hydrodynamic instabilities of current isobaric hotspot ignition design, and a high-gain ICF is promising.

  4. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  5. European insurance scheme to cover geological risk related to geothermal operations

    Energy Technology Data Exchange (ETDEWEB)

    Tiberi, U [European Community, General Directorate XVII, ALTERNER Program, Bruxelles (Belgium); Demange, J [BRGM, Orleans (France)

    1997-12-01

    The development of geothermal energy can contribute significantly to the growth of NRE (new and renewable energies that are non-nuclear and non-combustible) within the European Community and within Europe as a whole. However, the `mining risk` related to this type of operation still constitutes a major obstacle to its development. Operators find it difficult to raise the necessary financing without a guarantee against the risk of failure during the drilling stage. Standard insurance companies will not cover this type of risk, due to its very nature. We must thus therefore find a specific solution. As a result of the oil crises during the 1970s, the French Government decided promote the use of renewable energies in France. The support provided to these energies, or at least to geothermal energy, was to set up a scheme whereby the resource is guaranteed. Thus the operator, by subscribing to the scheme, benefits from a guarantee of the resource. The insurance works at two level: - in the first place, it covers the mining risk during the drilling stage, i.e. should the resource prove to be insufficient, whether in discharge or temperature, for an economically viable operation, then the totality of the costs are reimbursed, apart form the premium and any government subsidy that might have been received. - A second level of guarantee covers the risk of change in the resource`s parameters over a period of 15 years (a study is in progress to consider the possibility of extending this period to 25 years). (orig.)

  6. Phonon limited electronic transport in Pb

    Science.gov (United States)

    Rittweger, F.; Hinsche, N. F.; Mertig, I.

    2017-09-01

    We present a fully ab initio based scheme to compute electronic transport properties, i.e. the electrical conductivity σ and thermopower S, in the presence of electron-phonon interaction. We explicitly investigate the \

  7. Novel powering schemes for pixel and tracking detectors

    CERN Document Server

    Feld, Lutz Werner

    2013-01-01

    Future pixel and tracking systems like the ones foreseen in the upgrade programs of the LHC experiments are very demanding on the power supply systems. An increased amount of power has to be supplied to the front-end electronics at a reduced voltage, through existing cable plants. Novel powering schemes are needed to avoid excessive cable losses. The two schemes under consideration, serial powering and DC-DC conversion, are reviewed. Particular emphasis is put on system integration aspects. As an example, the new CMS pixel system, which will be powered via DC-DC conversion, is presented in more detail. This allows to discuss challenges and solutions for a concrete application while the conclusions should be relevant for other applications as well.

  8. Bunch decompression for laser-plasma driven free-electron laser demonstration schemes

    Directory of Open Access Journals (Sweden)

    T. Seggebrock

    2013-07-01

    Full Text Available X-ray free-electron lasers (FELs require a very high electron beam quality in terms of emittance and energy spread. Since 2004 high quality electrons produced by laser-wakefield accelerators have been demonstrated, but the electron quality up to now did not allow the operation of a compact x-ray FEL using these electrons. Maier et al. [Phys. Rev. X 2, 031019 (2012PRXHAE2160-330810.1103/PhysRevX.2.031019] suggested a concept for a proof-of-principle experiment allowing FEL operation in the vacuum ultraviolet range based on an optimized undulator and bunch decompression using electron bunches from a laser-plasma accelerator as currently available. In this paper we discuss in more detail how a chicane can be used as a bunch stretcher instead of a bunch compressor to allow the operation of a laser-wakefield accelerator driven FEL using currently available electrons. A scaling characterizing the impact of bunch decompression on the gain length is derived and the feasibility of the concept is tested numerically in a demanding scenario.

  9. A Suboptimal Power-Saving Transmission Scheme in Multiple Component Carrier Networks

    Science.gov (United States)

    Chung, Yao-Liang; Tsai, Zsehong

    Power consumption due to transmissions in base stations (BSs) has been a major contributor to communication-related CO2 emissions. A power optimization model is developed in this study with respect to radio resource allocation and activation in a multiple Component Carrier (CC) environment. We formulate and solve the power-minimization problem of the BS transceivers for multiple-CC networks with carrier aggregation, while maintaining the overall system and respective users' utilities above minimum levels. The optimized power consumption based on this model can be viewed as a lower bound of that of other algorithms employed in practice. A suboptimal scheme with low computation complexity is proposed. Numerical results show that the power consumption of our scheme is much better than that of the conventional one in which all CCs are always active, if both schemes maintain the same required utilities.

  10. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  11. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  12. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  13. An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    Directory of Open Access Journals (Sweden)

    Mansik Kim

    2017-08-01

    Full Text Available As the Internet of Things (IoT has developed, the emerging sensor network (ESN that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future.

  14. Poverty and Christian Welfare Scheme: Evidence from the Church of Nigeria (Anglican Communion Osun State, Nigeria

    Directory of Open Access Journals (Sweden)

    S. Awoniyi

    2015-05-01

    Full Text Available Existing studies on welfare schemes in Nigerian Churches have focussed on the political and economic perspectives, neglecting the ethical dimension which has a stronger basis in the Bible. This study, therefore, examined the welfare scheme of the Church of Nigeria (Anglican Communion, Osun State, Nigeria as evidence with a view to assessing their method of generating welfare resources, as well as their implementation and monitoring strategy against the provision of the Bible on welfare ethics. Data were obtained through interviews, observation and questionnaire. In-depth interviews were conducted with 90 randomly selected key informants including 12 clergy, 24 poor members of the church, 18 welfare scheme officers and 36 beneficiaries. Four welfare schemes were observed between 1991 -2012 in a total of 30 Anglican Churches in major towns in Osun State. A total of 600 copies of the questionnaire were purposively administered to beneficiaries, church members and welfare scheme officers. Out of these, 550 were retrieved and analysed using percentages. The Church of Nigeria (Anglican Communion generated resources for welfare schemes through compulsory  levies, donations, annual harvest proceeds, offering collection ,tithes/offering and foreign assistance .Four categories of welfare schemes were adopted: Health care delivery, vocational rehabilitation, micro-credit loans, and women’s empowerment. One implementation strategy was adopted, namely, social advocacy. The church utilized sensitisation mechanism, widow retreat workshops, free health campaign, radio/television programmes and supportive counselling. Welfare scheme for the Church of Nigeria offered socio-economic benefits to members of the Church, but they were weakened by limited human coverage, insufficient funds and poor monitoring. These call for moral reorientation on the part of stakeholders in order to inculcate the ethics of justice and fairness as enshrined in the Bible.

  15. Numerical study of a hybrid jet impingement/micro-channel cooling scheme

    International Nuclear Information System (INIS)

    Barrau, Jérôme; Omri, Mohammed; Chemisana, Daniel; Rosell, Joan; Ibañez, Manel; Tadrist, Lounes

    2012-01-01

    A new hybrid jet impingement/micro-channel cooling scheme is studied numerically for use in high-heat-flux thermal management of electronic and power devices. The device is developed with the objective of improving the temperature uniformity of the cooled object. A numerical model based on the k–ω SST turbulent model is developed and validated experimentally. This model is used to carry out a parametrical characterization of the heat sink. The study shows that variations in key parameters of jet impingement and micro-channel technologies allow for the cooling scheme to obtain a wide range of temperature profiles for the cooled object. - Highlights: ► A new hybrid cooling scheme is numerically studied. ► The cooling scheme combines the benefits of jet impingement and micro-channel flows. ► The numerical model is validated by comparison with experimental results. ► The temperature distribution can be adapted to the needs of the cooled system.

  16. Resource management for energy and spectrum harvesting sensor networks

    CERN Document Server

    Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...

  17. Energy harvesting schemes for building interior environment monitoring

    Science.gov (United States)

    Zylka, Pawel; Pociecha, Dominik

    2016-11-01

    A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).

  18. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  19. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  20. Health worker preferences for performance-based payment schemes in a rural health district in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Maurice Yé

    2016-01-01

    Full Text Available Background: One promising way to improve the motivation of healthcare providers and the quality of healthcare services is performance-based incentives (PBIs also referred as performance-based financing. Our study aims to explore healthcare providers’ preferences for an incentive scheme based on local resources, which aimed at improving the quality of maternal and child health care in the Nouna Health District. Design: A qualitative and quantitative survey was carried out in 2010 involving 94 healthcare providers within 34 health facilities. In addition, in-depth interviews involving a total of 33 key informants were conducted at health facility levels. Results: Overall, 85% of health workers were in favour of an incentive scheme based on the health district's own financial resources (95% CI: [71.91; 88.08]. Most health workers (95 and 96% expressed a preference for financial incentives (95% CI: [66.64; 85.36] and team-based incentives (95% CI: [67.78; 86.22], respectively. The suggested performance indicators were those linked to antenatal care services, prevention of mother-to-child human immunodeficiency virus transmission, neonatal care, and immunization. Conclusions: The early involvement of health workers and other stakeholders in designing an incentive scheme proved to be valuable. It ensured their effective participation in the process and overall acceptance of the scheme at the end. This study is an important contribution towards the designing of effective PBI schemes.

  1. Laser vacuum acceleration of a relativistic electron bunch

    Energy Technology Data Exchange (ETDEWEB)

    Glazyrin, I V; Karpeev, A V; Kotova, O G; Nazarov, K S [E.I. Zababakhin All-Russian Scientific-Research Institute of Technical Physics, Russian Federal Nuclear Centre, Snezhinsk, Chelyabinsk region (Russian Federation); Bychenkov, V Yu [P N Lebedev Physics Institute, Russian Academy of Sciences, Moscow (Russian Federation)

    2015-06-30

    With regard to the problem of laser acceleration of a relativistic electron bunch we present a scheme of its vacuum acceleration directly by a relativistic intensity laser pulse. The energy of the electron bunch injected into the laser pulse leading edge increases during its coaxial movement to a thin, pulse-reflecting target. The laser-accelerated electrons continue to move free forward, passing through the target. The study of this acceleration scheme in the three-dimensional geometry is verified in a numerical simulation by the particle-in-cell method, which showed that the energy of a part of the electrons can increase significantly compared to the initial one. Restrictions are discussed, which impose limiting values of energy and total charge of accelerated electrons. (superstrong light fields)

  2. Atlantis Water Supply Scheme (AWSS) artificial recharge scientific and operational support

    CSIR Research Space (South Africa)

    Jovanovic, Nebojsa

    2012-10-01

    Full Text Available Scheme (AWSS) artifi cial recharge scientifi c and operational support N JOVANOVIC1, RDH BUGAN1, S ISRAEL1, C PETERSEN1, B GENTHE1, M STEYN1, G TREDOUX1, D ALLPASS2, R BISHOP2, V MARINUS2, P FLOWER2, 1CSIR, Natural Resources and Environment...

  3. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  4. Particle-in-cell Simulations with Kinetic Electrons

    International Nuclear Information System (INIS)

    Lewandowski, J.L.V.

    2004-01-01

    A new scheme, based on an exact separation between adiabatic and nonadiabatic electron responses, for particle-in-cell (PIC) simulations of drift-type modes is presented. The (linear and nonlinear) elliptic equations for the scalar fields are solved using a multi-grid solver. The new scheme yields linear growth rates in excellent agreement with theory and it is shown to conserve energy well into the nonlinear regime. It is also demonstrated that simulations with few electrons are reliable and accurate, suggesting that large-scale, PIC simulations with electron dynamics in toroidal geometry (e.g., tokamaks and stellarators plasmas) are within reach of present-day massively parallel supercomputers

  5. Hybrid TE-TM scheme for time domain numerical calculations of wakefields in structures with walls of finite conductivity

    Directory of Open Access Journals (Sweden)

    Andranik Tsakanian

    2012-05-01

    Full Text Available In particle accelerators a preferred direction, the direction of motion, is well defined. If in a numerical calculation the (numerical dispersion in this direction is suppressed, a quite coarse mesh and moderate computational resources can be used to reach accurate results even for extremely short electron bunches. Several approaches have been proposed in the past decades to reduce the accumulated dispersion error in wakefield calculations for perfectly conducting structures. In this paper we extend the TE/TM splitting algorithm to a new hybrid scheme that allows for wakefield calculations in structures with walls of finite conductivity. The conductive boundary is modeled by one-dimensional wires connected to each boundary cell. A good agreement of the numerical simulations with analytical results and other numerical approaches is obtained.

  6. The generalized scheme-independent Crewther relation in QCD

    Science.gov (United States)

    Shen, Jian-Ming; Wu, Xing-Gang; Ma, Yang; Brodsky, Stanley J.

    2017-07-01

    The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton-nucleon scattering times the Adler function, defined from the cross section for electron-positron annihilation into hadrons, has no pQCD radiative corrections. The ;Generalized Crewther Relation; relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp) at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp-1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd (Q) =∑i≥1 αˆg1 i (Qi), at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is negligible. Similar

  7. Renewable resource policy when distributional impacts matter

    International Nuclear Information System (INIS)

    Horan, R.D.; Shortle, J.S.; Bulte, E.H.

    1999-01-01

    The standard assumption in bioeconomic resource models is that optimal policies maximize the present value of economic surplus to society. This assumption implies that regulatory agencies should not be concerned with the distributional consequences of management strategies. Both contemporary welfare-theoretic and rent-seeking approaches suggests distributional issues are important in designing resource management policies. This paper explores resource management when the managing agency has preferences defined over the economic welfare of various groups with a direct economic interest in the use of resources. Policy schemes consistent with this approach are derived and compared with standard results. 42 refs

  8. Effect of heating scheme on SOL width in DIII-D and EAST

    Directory of Open Access Journals (Sweden)

    L. Wang

    2017-08-01

    Full Text Available Joint DIII-D/EAST experiments in the radio-frequency (RF heated H-mode scheme with comparison to that of neutral beam (NB heated H-mode scheme were carried out on DIII-D and EAST under similar conditions to examine the effect of heating scheme on scrape-off layer (SOL width in H-mode plasmas for application to ITER. A dimensionally similar plasma equilibrium was used to match the EAST shape parameters. The divertor heat flux and SOL widths were measured with infra-red camera in DIII-D, while with divertor Langmuir probe array in EAST. It has been demonstrated on both DIII-D and EAST that RF-heated plasma has a broader SOL than NB-heated plasma when the edge electrons are effectively heated in low plasma current and low density regime with low edge collisionality. Detailed edge and pedestal profile analysis on DIII-D suggests that the low edge collisionality and ion orbit loss effect may account for the observed broadening. The joint experiment in DIII-D has also demonstrated the strong inverse dependence of SOL width on the plasma current in electron cyclotron heated (ECH H-mode plasmas.

  9. A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Liu Xiao; Shang Tao

    2013-01-01

    A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)

  10. PROCEEDING OF THE SEEDED X-RAY FREE ELECTRON LASER WORKSHOP.

    Energy Technology Data Exchange (ETDEWEB)

    WANG,X.J.; MURPHY,J.B.; YU,L.H.; FAATZ,B.; HUANG,Z.; REICHE,S.; ZOLOTOREV,M.

    2002-12-13

    The underlying theory of a high gain free electron laser (FEL) has existed for two decades [1-2], but it is only in the last few years that these novel radiation sources have been realized experimentally. Several high gain FELs have successfully reached saturation in the infrared, visible and the VUV portion of the spectrum: the High Gain Harmonic Generation (HGHG) free electron lasers [3] at BNL and the Self Amplified Spontaneous Emission (SASE) FELs at LEUTL, VISA and TTF [4-6]. The outstanding challenges for future FELs are to extend high gain FELs to the X-ray regime, improve the longitudinal coherence of the radiation using seeded FEL schemes and generate ultrashort pulses (<100 fs). The National Synchrotron Light Source (NSLS) of the Brookhaven National Laboratory (BNL) sponsored a Seeded X-ray Free Electron Laser Workshop on December 13-14, 2002 to explore these challenging issues. Representatives from BNL, DESY, LBNL, SLAC and UCLA made presentations on the novel schemes under consideration at their laboratories. Workshop participants had a lively discussion on the feasibility, performance and R&D issues associated with the seeded XFEL schemes. An improvement of the electron beam quality will certainly be necessary to drive the XFEL. Self-seeding SASE, cascaded HGHG, and SASE pulse compression FELs show the most promise for producing short pulse X-rays. Of these, only the self-seeded and HGHG schemes generate longitudinally coherent radiation. While the pulse length in the self-seeded scheme is determined by the electron bunch length ({approx}100 fs), the pulse length in the HGHG scheme is determined by the short pulse seed laser, and so can be much shorter ({approx} 20 fs).

  11. Prospects of technology adoption in small pump schemes in the River Nile State, Sudan

    International Nuclear Information System (INIS)

    Ahmed, A. T.; Hashim, A. A.

    2010-01-01

    Linear programming was used to simulate the farming systems of small pump schemes in Shendi Area, River Nile State, Sudan, to assess the prospect for technology use in cool-season food legumes and wheat. Different production activities, with respect to target crops, were identified to reflect different technology levels. The model constraints were the pump capacity, the scheme size and family labour. Alternative versions of the model were developed to examine possible production options that exist and to examine the effects of alternative resource levels and policy options, which are likely to affects adoption. The model results revealed that while farmers traditional practices were not economically feasible options, tendency is for adoption of medium rather than the recommended high technology levels. This reflects actual farmers behaviour, particularly for irrigation water, and indicates that water is the main resource constraint. The results also showed that the technology is not well supported by the traditional institutions of production relation, which create conflicting perception between resource owner to wards technology use.(Author)

  12. [Nature of the electron excited state in pigment redox reactions. II. Analysis of the scheme of primary processes in the photooxidation reaction of chlorophylls a and b and pheophytin a ].

    Science.gov (United States)

    Andreeva, N E; Barashkov, B I; Zakharova, G V; Shubin, V V; Chibisov, A K

    1978-01-01

    A scheme of primary reactions in photooxidation of pigments was considered assuming that electron transfer processes can occur via singlet excited as well as triplet states. The results of analysis are compared with the experimental data on relative yield values of chlorophylls a, b, and pheophytin a cation-radicals, as well as with the data on fluorescence quenching. A conclusion has been drawn that photooxidation of pigments proceeds exclusively via the triplet state. The dependence of rate constant quenching values of chlorophyll a triplet state by certain electron acceptors on values of half cell potentials was given.

  13. Quality of service management efficient scheme for the universal mobile telecommunications system

    Directory of Open Access Journals (Sweden)

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  14. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  15. Using mobile electronic devices to deliver educational resources in developing countries.

    Science.gov (United States)

    Mazal, Jonathan Robert; Ludwig, Rebecca

    2015-01-01

    Developing countries have far fewer trained radiography professionals than developed countries, which exacerbates the limited access to imaging services. The lack of trained radiographers reflects, in part, limited availability of radiographer-specific educational resources. Historically, organizations that provided such resources in the developing world faced challenges related to the limited stock of current materials as well as expenses associated with shipping and delivery. Four mobile electronic devices (MEDs) were loaded with educational content (e-books, PDFs, and digital applications) spanning major radiography topics. The MEDs were distributed to 4 imaging departments in Ghana, India, Nepal, and Nigeria based on evidence of need for radiography-specific resources, as revealed by survey responses. A cost comparison of postal delivery vs digital delivery of educational content was performed. The effectiveness of delivering additional content via Wi-Fi transmission also was evaluated. Feedback was solicited on users' experience with the MEDs as a delivery tool for educational content. An initial average per e-book expense of $30.05, which included the cost of the device, was calculated for the MED delivery method compared with $15.56 for postal delivery of printed materials. The cost of the MED delivery method was reduced to an average of $10.05 for subsequent e-book deliveries. Additional content was successfully delivered via Wi-Fi transmission to all recipients during the 3-month follow-up period. Overall user feedback on the experience was positive, and ideas for enhancing the MED-based method were identified. Using MEDs to deliver radiography-specific educational content appears to be more cost effective than postal delivery of printed materials on a long-term basis. MEDs are more efficient for providing updates to educational materials. Customization of content to department needs, and using projector devices could enhance the usefulness of MEDs for

  16. Success criteria for electronic medical record implementations in low-resource settings: a systematic review.

    Science.gov (United States)

    Fritz, Fleur; Tilahun, Binyam; Dugas, Martin

    2015-03-01

    Electronic medical record (EMR) systems have the potential of supporting clinical work by providing the right information at the right time to the right people and thus make efficient use of resources. This is especially important in low-resource settings where reliable data are also needed to support public health and local supporting organizations. In this systematic literature review, our objectives are to identify and collect literature about success criteria of EMR implementations in low-resource settings and to summarize them into recommendations. Our search strategy relied on PubMed queries and manual bibliography reviews. Studies were included if EMR implementations in low-resource settings were described. The extracted success criteria and measurements were summarized into 7 categories: ethical, financial, functionality, organizational, political, technical, and training. We collected 381 success criteria with 229 measurements from 47 articles out of 223 articles. Most papers were evaluations or lessons learned from African countries, published from 1999 to 2013. Almost half of the EMR systems served a specific disease area like human immunodeficiency virus (HIV). The majority of criteria that were reported dealt with the functionality, followed by organizational issues, and technical infrastructures. Sufficient training and skilled personnel were mentioned in roughly 10%. Political, ethical, and financial considerations did not play a predominant role. More evaluations based on reliable frameworks are needed. Highly reliable data handling methods, human resources and effective project management, as well as technical architecture and infrastructure are all key factors for successful EMR implementation. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  18. Self-consistent electron transport in collisional plasmas

    International Nuclear Information System (INIS)

    Mason, R.J.

    1982-01-01

    A self-consistent scheme has been developed to model electron transport in evolving plasmas of arbitrary classical collisionality. The electrons and ions are treated as either multiple donor-cell fluids, or collisional particles-in-cell. Particle suprathermal electrons scatter off ions, and drag against fluid background thermal electrons. The background electrons undergo ion friction, thermal coupling, and bremsstrahlung. The components move in self-consistent advanced E-fields, obtained by the Implicit Moment Method, which permits Δt >> ω/sub p/ -1 and Δx >> lambda/sub D/ - offering a 10 2 - 10 3 -fold speed-up over older explicit techniques. The fluid description for the background plasma components permits the modeling of transport in systems spanning more than a 10 7 -fold change in density, and encompassing contiguous collisional and collisionless regions. Results are presented from application of the scheme to the modeling of CO 2 laser-generated suprathermal electron transport in expanding thin foils, and in multi-foil target configurations

  19. Modified Monte Carlo method for study of electron transport in degenerate electron gas in the presence of electron-electron interactions, application to graphene

    Science.gov (United States)

    Borowik, Piotr; Thobel, Jean-Luc; Adamowicz, Leszek

    2017-07-01

    Standard computational methods used to take account of the Pauli Exclusion Principle into Monte Carlo (MC) simulations of electron transport in semiconductors may give unphysical results in low field regime, where obtained electron distribution function takes values exceeding unity. Modified algorithms were already proposed and allow to correctly account for electron scattering on phonons or impurities. Present paper extends this approach and proposes improved simulation scheme allowing including Pauli exclusion principle for electron-electron (e-e) scattering into MC simulations. Simulations with significantly reduced computational cost recreate correct values of the electron distribution function. Proposed algorithm is applied to study transport properties of degenerate electrons in graphene with e-e interactions. This required adapting the treatment of e-e scattering in the case of linear band dispersion relation. Hence, this part of the simulation algorithm is described in details.

  20. Energy efficient power electronic controller for a capacitor-run single-phase induction motor

    International Nuclear Information System (INIS)

    Saravana Ilango, G.; Samidurai, K.; Roykumar, M.; Thanushkodi, K.

    2009-01-01

    At present the speed control of a capacitor-run single-phase induction motor is being achieved by using triac based voltage regulators. This paper proposes a new scheme; an electronic transformer acts as a voltage regulator. Performance comparison is made between these two schemes in this paper. It is found that the proposed scheme has superior operating and performance characteristics. Experimental results show that apart from improvement in performance with respect to power factor and total harmonic distortion an appreciable amount of energy saving is also obtained in the electronic transformer based scheme.

  1. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  2. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  3. Low-complexity co-tier interference reduction scheme in open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2011-12-01

    This paper addresses the effect of co-tier interference on the performance of multiuser overlaid cellular networks that share the same available resources. It assumed that each macrocell contains a number of self-configurable and randomly located femtocells that employ the open-access control strategy to reduce the effect of cross-tier interference. It is also assumed that the desired user equipment (UE) can access only one of the available channels, maintains simple decoding circuitry with single receive antenna, and has limited knowledge of the instantaneous channel state information (CSI) due to resource limitation. To mitigate the effect of co-tier interference in the absence of the CSI of the desired UE, a low-complexity switched-based scheme for single channel selection based on the predicted interference levels associated with available channels is proposed for the case of over-loaded channels. Through the analysis, new general formulation for the statistics of the resulting instantaneous interference power and some performance measures are presented. The effect of the switching threshold on the efficiency and performance of the proposed scheme is studied. Numerical and simulation results to clarify the usefulness of the proposed scheme in reducing the impact of co-tier interference are also provided. © 2011 IEEE.

  4. MANAGING THE INTERACTION OF RESOURCE DISTRIBUTION IN PROJECT MANAGEMENT OF IMPLEMENTATION AND FUNCTIONING OF EMERGENCY CALL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Дмитро Сергійович КОБИЛКІН

    2016-02-01

    Full Text Available There have been proposed to use a mobile module "Resources manager" and its component model – scheme for managing the distribution of resources during the project management of implementation and functioning of System 112 in Ukraine. Are described the formalized tasks of performance the processes of managing the model – scheme at all stages of the projects life cycle. Also is developed the model – scheme interaction the blocks of the mobile module of resource management at the System 112 project. It describes the step by step interaction of blocks project management with the project data for successful project implementation and obtaining a product of the project, pointing out the environmental impact of the project on each of the project blocks. The conclusions about the expediency and efficiency of implementation of model – scheme in conditions of managing the emergency call systems at a single number were made.

  5. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  6. Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission

    Science.gov (United States)

    Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue

    This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.

  7. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  8. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  9. Efficient network resource management for multimedia-on-demand services

    Science.gov (United States)

    Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin

    1998-08-01

    A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.

  10. Time-dependent density functional theory for open systems with a positivity-preserving decomposition scheme for environment spectral functions

    International Nuclear Information System (INIS)

    Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung

    2015-01-01

    Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene

  11. Time-dependent density functional theory for open systems with a positivity-preserving decomposition scheme for environment spectral functions.

    Science.gov (United States)

    Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung

    2015-04-14

    Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene.

  12. A Communication and Resources Management Scheme to Support the Smart Grid Integration of Multiplayers Access to Resources Information

    DEFF Research Database (Denmark)

    Vale, Zita; Morais, Hugo; Faria, Pedro

    2014-01-01

    The increasing and i ntensive integration of distributed energy resources into distribution systems requires adequate methodologies to ensure a secure operation according to the smart grid paradigm. In this context, SCADA (Supervisory Control and Data Acquisition) systems are an essential...... considering all the involved costs, power flows, and electricity prices leading to the network reconfiguration . The methodology also addresses the definition of the information access permissio ns of each player to each resource. The paper includes a 33 - bus network used in a case study that considers...

  13. Enhanced cognitive Radio Resource Management for LTE systems

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem; Shin, Kang G.

    2013-01-01

    as it improves network efficiency by exploiting radio environment information, intelligent optimization algorithms to configure transmission parameters, and mitigate interference. In this paper, we propose a cognitive resource management scheme to adapt LTE

  14. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    NARCIS (Netherlands)

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  15. Local Information as a Resource in Distributed Quantum Systems

    Science.gov (United States)

    Horodecki, Michał; Horodecki, Karol; Horodecki, Paweł; Horodecki, Ryszard; Oppenheim, Jonathan; Sende, Aditi; Sen, Ujjwal

    2003-03-01

    A new paradigm for distributed quantum systems where information is a valuable resource is developed. After finding a unique measure for information, we construct a scheme for its manipulation in analogy with entanglement theory. In this scheme, instead of maximally entangled states, two parties distill local states. We show that, surprisingly, the main tools of entanglement theory are general enough to work in this opposite scheme. Up to plausible assumptions, we show that the amount of information that must be lost during the protocol of concentration of local information can be expressed as the relative entropy distance from some special set of states.

  16. DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2017-01-01

    Full Text Available Infrastructure as a service with desktops (DIaaS based on the extensible mark-up language (XML is herein proposed to utilize surplus resources. DIaaS is a traditional surplus-resource integrated management technology. It is designed to provide fast work distribution and computing services based on user service requests as well as storage services through desktop-based distributed computing and storage resource integration. DIaaS includes a nondisruptive resource service and an auto-scalable scheme to enhance the availability and scalability of intra-cloud computing resources. A performance evaluation of the proposed scheme measured the clustering performance time for surplus resource utilization. The results showed improvement in computing and storage services in a connection of at least two computers compared to the traditional method for high-availability measurement of nondisruptive services. Furthermore, an artificial server error environment was used to create a clustering delay for computing and storage services and for nondisruptive services. It was compared to the Hadoop distributed file system (HDFS.

  17. Phonon limited electronic transport in Pb

    DEFF Research Database (Denmark)

    Rittweger, Florian; Hinsche, Nicki Frank; Mertig, Ingrid

    2017-01-01

    We present a fully ab initio based scheme to compute electronic transport properties, i.e. the electrical conductivity σ and thermopower S, in the presence of electron-phonon interaction. We explicitly investigate the k-dependent structure of the Éliashberg spectral function, the coupling strength...

  18. Payment Procedures for Electronic Government Services

    OpenAIRE

    Pousttchi, Key; Wiedemann, Dietmar Georg

    2005-01-01

    In this paper, we analyse payment procedures for their suitability for electronic government. We provide an overview of the payment procedures currently available on the market, compare the situation in electronic government with the situation in electronic commerce and analyze what we can transfer. Based on functional requirements we propose a scheme that allows public agencies to examine the appropriateness of any given payment procedure for electronic government.

  19. All-optical conversion scheme: Binary to quaternary and quaternary to binary number

    Science.gov (United States)

    Chattopadhyay, Tanay; Roy, Jitendra Nath

    2009-04-01

    To achieve the inherent parallelism in optics a suitable number system and efficient encoding/decoding scheme for handling the data are very much essential. Binary number is accepted as the best representing number system in almost all types of existing electronic computers. But, binary number (0 and 1) is insufficient in respect to the demand of the coming generation. Multi-valued logic (with radix >2) can be viewed as an alternative approach to solve many problems in transmission, storage and processing of large amount of information in digital signal processing. Here, in this paper all-optical scheme for the conversion of binary to quaternary number and vice versa have been proposed and described. Simulation has also been done. In this all-optical scheme the numbers are represented by different discrete polarized state of light.

  20. Bit Error Rate Performance Analysis of a Threshold-Based Generalized Selection Combining Scheme in Nakagami Fading Channels

    Directory of Open Access Journals (Sweden)

    Kousa Maan

    2005-01-01

    Full Text Available The severity of fading on mobile communication channels calls for the combining of multiple diversity sources to achieve acceptable error rate performance. Traditional approaches perform the combining of the different diversity sources using either the conventional selective diversity combining (CSC, equal-gain combining (EGC, or maximal-ratio combining (MRC schemes. CSC and MRC are the two extremes of compromise between performance quality and complexity. Some researches have proposed a generalized selection combining scheme (GSC that combines the best branches out of the available diversity resources ( . In this paper, we analyze a generalized selection combining scheme based on a threshold criterion rather than a fixed-size subset of the best channels. In this scheme, only those diversity branches whose energy levels are above a specified threshold are combined. Closed-form analytical solutions for the BER performances of this scheme over Nakagami fading channels are derived. We also discuss the merits of this scheme over GSC.

  1. A new hybrid scheme for simulations of highly collisional RF-driven plasmas

    International Nuclear Information System (INIS)

    Eremin, Denis; Hemke, Torben; Mussenbrock, Thomas

    2016-01-01

    This work describes a new 1D hybrid approach for modeling atmospheric pressure discharges featuring complex chemistry. In this approach electrons are described fully kinetically using particle-in-cell/Monte-Carlo (PIC/MCC) scheme, whereas the heavy species are modeled within a fluid description. Validity of the popular drift-diffusion approximation is verified against a ‘full’ fluid model accounting for the ion inertia and a fully kinetic PIC/MCC code for ions as well as electrons. The fluid models require knowledge of the momentum exchange frequency and dependence of the ion mobilities on the electric field when the ions are in equilibrium with the latter. To this end an auxiliary Monte-Carlo scheme is constructed. It is demonstrated that the drift-diffusion approximation can overestimate ion transport in simulations of RF-driven discharges with heavy ion species operated in the γ mode at the atmospheric pressure or in all discharge simulations for lower pressures. This can lead to exaggerated plasma densities and incorrect profiles provided by the drift-diffusion models. Therefore, the hybrid code version featuring the full ion fluid model should be favored against the more popular drift-diffusion model, noting that the suggested numerical scheme for the former model implies only a small additional computational cost. (paper)

  2. Stability of the discretization of the electron avalanche phenomenon

    Energy Technology Data Exchange (ETDEWEB)

    Villa, Andrea, E-mail: andrea.villa@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Barbieri, Luca, E-mail: luca.barbieri@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Gondola, Marco, E-mail: marco.gondola@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Leon-Garzon, Andres R., E-mail: andresricardo.leon@polimi.it [CMIC Department “Giulio Natta”, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133, Milano (Italy); Malgesini, Roberto, E-mail: roberto.malgesini@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy)

    2015-09-01

    The numerical simulation of the discharge inception is an active field of applied physics with many industrial applications. In this work we focus on the drift-reaction equation that describes the electron avalanche. This phenomenon is one of the basic building blocks of the streamer model. The main difficulty of the electron avalanche equation lies in the fact that the reaction term is positive when a high electric field is applied. It leads to exponentially growing solutions and this has a major impact on the behavior of numerical schemes. We analyze the stability of a reference finite volume scheme applied to this latter problem. The stability of the method may impose a strict mesh spacing, therefore a proper stabilized scheme, which is stable whatever spacing is used, has been developed. The convergence of the scheme is treated as well as some numerical experiments.

  3. Error rates and resource overheads of encoded three-qubit gates

    Science.gov (United States)

    Takagi, Ryuji; Yoder, Theodore J.; Chuang, Isaac L.

    2017-10-01

    A non-Clifford gate is required for universal quantum computation, and, typically, this is the most error-prone and resource-intensive logical operation on an error-correcting code. Small, single-qubit rotations are popular choices for this non-Clifford gate, but certain three-qubit gates, such as Toffoli or controlled-controlled-Z (ccz), are equivalent options that are also more suited for implementing some quantum algorithms, for instance, those with coherent classical subroutines. Here, we calculate error rates and resource overheads for implementing logical ccz with pieceable fault tolerance, a nontransversal method for implementing logical gates. We provide a comparison with a nonlocal magic-state scheme on a concatenated code and a local magic-state scheme on the surface code. We find the pieceable fault-tolerance scheme particularly advantaged over magic states on concatenated codes and in certain regimes over magic states on the surface code. Our results suggest that pieceable fault tolerance is a promising candidate for fault tolerance in a near-future quantum computer.

  4. Numerical Schemes for Rough Parabolic Equations

    Energy Technology Data Exchange (ETDEWEB)

    Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  5. Electronic Human Resources Management (e-HRM Adoption Studies: Past and Future Research

    Directory of Open Access Journals (Sweden)

    Winarto Winarto

    2018-05-01

    Full Text Available Electronic human resource management (e-HRM systems become more widely used by profit and non-profit organization. However, the field currently lacks sound theoretical frameworks that can be useful in addressing a key issue concerning the implementation of e-HRM systems, in particular to obtain a better understanding of the factors influencing the adoption of e-HRM systems. The objective of this paper is to provide a foundation towards the development of a theoretical framework for the implementation of e-HRM systems and develop a conceptual model that would reflect the nature of e-HRM systems’ adoption through systematic literature review. Adopting Crossan and Apaydin’s procedure of systematic review, this paper investigated 21 empirical papers of electronics human resources management, then categorized them into 4 characteristics which influence the adoption; System and technology characteristics; Organizational characteristics; User/individual characteristics, and Environmental and contextual characteristics. Finally, the e-HRM adoption research framework is drawn and based on the framework; avenues for future research are discussed.   Bahasa Indonesia Abstrak: Manajemen sumber daya manusia elektronik (selanjutnya disebut dengan e-HRM semakin banyak digunakan oleh organisasi profit dan nonprofit. Namun, bidang dan topik ini belum memiliki kerangka teori yang mapan, yang dapat digunakan untuk menganalisis isu-isu terkait penerapan e-HRM, terutama mengenai faktor-faktor yang mempengaruhi adopsi sistem e-HRM. Tujuan penelitian ini adalah untuk memberikan landasan bagi pengembangan kerangka teoritis untuk implementasi sistem e-HRM dan mengembangkan model konseptual yang akan menggambarkan adopsi sistem e-HRM melalui tinjauan literatur sistematis. Mengadopsi prosedur dan metode Crossan dan Apaydin untuk melakukan telaah literatur secara sistematis, paper ini menyelidiki 21 publikasi empiris manajemen sumber daya manusia elektronik dari 2

  6. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  7. Systematic Luby Transform codes as incremental redundancy scheme

    CSIR Research Space (South Africa)

    Grobler, TL

    2011-09-01

    Full Text Available Transform Codes as Incremental Redundancy Scheme T. L. Grobler y, E. R. Ackermann y, J. C. Olivier y and A. J. van Zylz Department of Electrical, Electronic and Computer Engineering University of Pretoria, Pretoria 0002, South Africa Email: trienkog...@gmail.com, etienne.ackermann@ieee.org yDefence, Peace, Safety and Security (DPSS) Council for Scientific and Industrial Research (CSIR), Pretoria 0001, South Africa zDepartment of Mathematics and Applied Mathematics University of Pretoria, Pretoria 0002, South...

  8. Coded-subcarrier-aided chromatic dispersion monitoring scheme for flexible optical OFDM networks.

    Science.gov (United States)

    Tse, Kam-Hon; Chan, Chun-Kit

    2014-08-11

    A simple coded-subcarrier aided scheme is proposed to perform chromatic dispersion monitoring in flexible optical OFDM networks. A pair of coded label subcarriers is added to both edges of the optical OFDM signal spectrum at the edge transmitter node. Upon reception at any intermediate or the receiver node, chromatic dispersion estimation is performed, via simple direct detection, followed by electronic correlation procedures with the designated code sequences. The feasibility and the performance of the proposed scheme have been experimentally characterized. It provides a cost-effective monitoring solution for the optical OFDM signals across intermediate nodes in flexible OFDM networks.

  9. A Comparative Study on Metadata Scheme of Chinese and American Open Data Platforms

    Directory of Open Access Journals (Sweden)

    Yang Sinan

    2018-01-01

    Full Text Available [Purpose/significance] Open government data is conducive to the rational development and utilization of data resources. It can encourage social innovation and promote economic development. Besides, in order to ensure effective utilization and social increment of open government data, high-quality metadata schemes is necessary. [Method/process] Firstly, this paper analyzed the related research of open government data at home and abroad. Then, it investigated the open metadata schemes of some Chinese main local governments’ data platforms, and made a comparison with the metadata standard of American open government data. [Result/conclusion] This paper reveals that there are some disadvantages about Chinese local government open data affect the use effect of open data, which including that different governments use different data metadata schemes, the description of data set is too simple for further utilization and usually presented in HTML Web page format with lower machine-readable. Therefore, our government should come up with a standardized metadata schemes by drawing on the international mature and effective metadata standard, to ensure the social needs of high quality and high value data.

  10. Analog implementation of an integral resonant control scheme

    International Nuclear Information System (INIS)

    Pereira, E; Moheimani, S O R; Aphale, S S

    2008-01-01

    Integral resonant control (IRC) has been introduced as a high performance controller design methodology for flexible structures with collocated actuator–sensor pairs. IRC has a simple structure and is capable of achieving significant damping, over several modes, while guaranteeing closed-loop stability of the system in the presence of unmodeled out-of-bandwidth dynamics. IRC can be an ideal controller for various industrial damping applications, if packaged in a simple easy-to-implement electronic module. This work proposes an analog implementation of the IRC scheme using a single Op-Amp circuit. The objective is to show that with simple analog realization of the modified IRC scheme, it is possible to damp a large number of vibration modes. A brief discussion about the modeling, circuit considerations, implementation and experimental results is presented in order to validate the usefulness and practicality of the proposed analog IRC implementation. (technical note)

  11. Power Saving Scheduling Scheme for Internet of Things over LTE/LTE-Advanced Networks

    Directory of Open Access Journals (Sweden)

    Yen-Wei Kuo

    2015-01-01

    Full Text Available The devices of Internet of Things (IoT will grow rapidly in the near future, and the power consumption and radio spectrum management will become the most critical issues in the IoT networks. Long Term Evolution (LTE technology will become a promising technology used in IoT networks due to its flat architecture, all-IP network, and greater spectrum efficiency. The 3rd Generation Partnership Project (3GPP specified the Discontinuous Reception (DRX to reduce device’s power consumption. However, the DRX may pose unexpected communication delay due to missing Physical Downlink Control Channel (PDCCH information in sleep mode. Recent studies mainly focus on optimizing DRX parameters to manage the tradeoff between the energy consumption and communication latency. In this paper, we proposed a fuzzy-based power saving scheduling scheme for IoT over the LTE/LTE-Advanced networks to deal with the issues of the radio resource management and power consumption from the scheduling and resource allocation perspective. The proposed scheme considers not only individual IoT device’s real-time requirement but also the overall network performance. The simulation results show that our proposed scheme can meet the requirements of the DRX cycle and scheduling latency and can save about half of energy consumption for IoT devices compared to conventional approaches.

  12. Improving Electronic Resources through Holistic Budgeting

    Science.gov (United States)

    Kusik, James P.; Vargas, Mark A.

    2009-01-01

    To establish a more direct link between its collections and the educational goals of Saint Xavier University, the Byrne Memorial Library has adopted a "holistic" approach to collection development. This article examines how traditional budget practices influenced the library's selection of resources and describes how holistic collection…

  13. Averaging scheme for atomic resolution off-axis electron holograms.

    Science.gov (United States)

    Niermann, T; Lehmann, M

    2014-08-01

    All micrographs are limited by shot-noise, which is intrinsic to the detection process of electrons. For beam insensitive specimen this limitation can in principle easily be circumvented by prolonged exposure times. However, in the high-resolution regime several instrumental instabilities limit the applicable exposure time. Particularly in the case of off-axis holography the holograms are highly sensitive to the position and voltage of the electron-optical biprism. We present a novel reconstruction algorithm to average series of off-axis holograms while compensating for specimen drift, biprism drift, drift of biprism voltage, and drift of defocus, which all might cause problematic changes from exposure to exposure. We show an application of the algorithm utilizing also the possibilities of double biprism holography, which results in a high quality exit-wave reconstruction with 75 pm resolution at a very high signal-to-noise ratio. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  15. A Dual Key-Based Activation Scheme for Secure LoRaWAN

    Directory of Open Access Journals (Sweden)

    Jaehyu Kim

    2017-01-01

    Full Text Available With the advent of the Internet of Things (IoT era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.

  16. Smart LED allocation scheme for efficient multiuser visible light communication networks.

    Science.gov (United States)

    Sewaiwar, Atul; Tiwari, Samrat Vikramaditya; Chung, Yeon Ho

    2015-05-18

    In a multiuser bidirectional visible light communication (VLC), a large number of LEDs or an LED array needs to be allocated in an efficient manner to ensure sustainable data rate and link quality. Moreover, in order to support an increasing or decreasing number of users in the network, the LED allocation is required to be performed dynamically. In this paper, a novel smart LED allocation scheme for efficient multiuser VLC networks is presented. The proposed scheme allocates RGB LEDs to multiple users in a dynamic and efficient fashion, while satisfying illumination requirements in an indoor environment. The smart LED array comprised of RGB LEDs is divided into sectors according to the location of the users. The allocated sectors then provide optical power concentration toward the users for efficient and reliable data transmission. An algorithm for the dynamic allocation of the LEDs is also presented. To verify its effective resource allocation feature of the proposed scheme, simulations were performed. It is found that the proposed smart LED allocation scheme provides the effect of optical beamforming toward individual users, thereby increasing the collective power concentration of the optical signals on the desirable users and resulting in significantly increased data rate, while ensuring sufficient illumination in a multiuser VLC environment.

  17. A simplified spherical harmonic method for coupled electron-photon transport calculations

    International Nuclear Information System (INIS)

    Josef, J.A.

    1996-12-01

    In this thesis we have developed a simplified spherical harmonic method (SP N method) and associated efficient solution techniques for 2-D multigroup electron-photon transport calculations. The SP N method has never before been applied to charged-particle transport. We have performed a first time Fourier analysis of the source iteration scheme and the P 1 diffusion synthetic acceleration (DSA) scheme applied to the 2-D SP N equations. Our theoretical analyses indicate that the source iteration and P 1 DSA schemes are as effective for the 2-D SP N equations as for the 1-D S N equations. Previous analyses have indicated that the P 1 DSA scheme is unstable (with sufficiently forward-peaked scattering and sufficiently small absorption) for the 2-D S N equations, yet is very effective for the 1-D S N equations. In addition, we have applied an angular multigrid acceleration scheme, and computationally demonstrated that it performs as well for the 2-D SP N equations as for the 1-D S N equations. It has previously been shown for 1-D S N calculations that this scheme is much more effective than the DSA scheme when scattering is highly forward-peaked. We have investigated the applicability of the SP N approximation to two different physical classes of problems: satellite electronics shielding from geomagnetically trapped electrons, and electron beam problems. In the space shielding study, the SP N method produced solutions that are accurate within 10% of the benchmark Monte Carlo solutions, and often orders of magnitude faster than Monte Carlo. We have successfully modeled quasi-void problems and have obtained excellent agreement with Monte Carlo. We have observed that the SP N method appears to be too diffusive an approximation for beam problems. This result, however, is in agreement with theoretical expectations

  18. Clinician‐selected Electronic Information Resources do not Guarantee Accuracy in Answering Primary Care Physicians’ Information Needs. A review of: McKibbon, K. Ann, and Douglas B. Fridsma. “Effectiveness of Clinician‐selected Electronic Information Resources for Answering Primary Care Physicians’ Information Needs.” Journal of the American Medical Informatics Association 13.6 (2006: 653‐9.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2008-03-01

    Full Text Available Objective – To determine if electronic information resources selected by primary care physicians improve their ability to answer simulated clinical questions.Design – An observational study utilizing hour‐long interviews and think‐aloud protocols.Setting – The offices and clinics of primary care physicians in Canada and the United States.Subjects – Twenty‐five primary care physicians of whom 4 were women, 17 were from Canada, 22 were family physicians,and 24 were board certified.Methods – Participants provided responses to 23 multiple‐choice questions. Each physician then chose two questions and looked for the answers utilizing information resources of their own choice. The search processes, chosen resources and search times were noted. These were analyzed along with data on the accuracy of the answers and certainties related to the answer to each clinical question prior to the search.Main results – Twenty‐three physicians sought answers to 46 simulated clinical questions. Utilizing only electronic information resources, physicians spent a mean of 13.0 (SD 5.5 minutes searching for answers to the questions, an average of 7.3(SD 4.0 minutes for the first question and 5.8 (SD 2.2 minutes to answer the second question. On average, 1.8 resources were utilized per question. Resources that summarized information, such as the Cochrane Database of Systematic Reviews, UpToDate and Clinical Evidence, were favored 39.2% of the time, MEDLINE (Ovid and PubMed 35.7%, and Internet resources including Google 22.6%. Almost 50% of the search and retrieval strategies were keyword‐based, while MeSH, subheadings and limiting were used less frequently. On average, before searching physicians answered 10 of 23 (43.5% questions accurately. For questions that were searched using clinician‐selected electronic resources, 18 (39.1% of the 46 answers were accurate before searching, while 19 (42.1% were accurate after searching. The difference of

  19. Linear-algebraic approach to electronic excitation of atoms and molecules by electron impact

    International Nuclear Information System (INIS)

    Collins, L.A.; Schneider, B.I.

    1983-01-01

    A linear-algebraic method, based on an integral equations formulation, is applied to the excitation of atoms and molecules by electron impact. Various schemes are devised for treating the one-electron terms that sometimes cause instabilities when directly incorporated into the solution matrix. These include introducing Lagrange undetermined multipliers and correlation terms. Good agreement between the method and other computational techniques is obtained for electron scattering for hydrogenic and Li-like atomic ions and for H 2 + in two- to five-state close-coupling calculations

  20. An Ultra-Bright Pulsed Electron Beam with Low Longitudinal Emittance

    CERN Document Server

    Zolotorev, Max S; Denes, Peter; Heifets, Samuel; Hussain, Zahid; Lebedev, Gennadi; Lidia, Steven M; Robin, David; Sannibale, Fernando; Schönlein, Robert W; Vogel, Robert; Wan, Weishi

    2005-01-01

    We describe a novel scheme for an electron source in the 10 - 100 eV range with the capability of approaching the brightness quantum-limit and of lowering the effective temperature of the electrons orders of magnitude with respect to existing sources. Such a device can open the way for a wide range of novel applications that utilize angstrom-scale spatial resolution and ?eV-scale energy resolution. Possible examples include electron microscopy, electron holography, and investigations of dynamics on a picosecond time scale using pump-probe techniques. In this paper we describe the concepts for such a source including a complete and consistent set of parameters for the construction of a real device based on the presented scheme.

  1. Energy level schemes of f{sup N} electronic configurations for the di-, tri-, and tetravalent lanthanides and actinides in a free state

    Energy Technology Data Exchange (ETDEWEB)

    Ma, C.-G. [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Brik, M.G., E-mail: mikhail.brik@ut.ee [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Institute of Physics, University of Tartu, Ravila 14C, Tartu 50411 (Estonia); Institute of Physics, Jan Dlugosz University, Armii Krajowej 13/15, PL-42200 Czestochowa (Poland); Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland); Liu, D.-X.; Feng, B.; Tian, Ya [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Suchocki, A. [Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland)

    2016-02-15

    The energy level diagrams are theoretically constructed for the di-, tri-, tetravalent lanthanide and actinide ions, using the Hartree–Fock calculated parameters of the Coulomb and spin–orbit interactions within f{sup N} (N=1…13) electron configurations. These diagrams are analogous to Dieke's diagram, which was obtained experimentally. They can be used for an analysis of the optical spectra of all considered groups of ions in various environments. Systematic variation of some prominent energy levels (especially those ones with a potential for emission transitions) along the isoelectronic 4f/5f ions is considered. - Highlights: • Energy level schemes for di-, tri, tetravalent lanthanides/actinides are calculated. • Systematic variation of the characteristic energy levels across the series is considered. • Potentially interesting emission transitions are identified.

  2. Electron Cyclotron Resonance Heating of a High-Density Plasma

    DEFF Research Database (Denmark)

    Hansen, F. Ramskov

    1986-01-01

    Various schemes for electron cyclotron resonance heating of tokamak plasmas with the ratio of electron plasma frequency to electron cyclotron frequency, "»pe/^ce* larger than 1 on axis, are investigated. In particular, a mode conversion scheme is investigated using ordinary waves at the fundamental...... of the electron cyclotron frequency. These are injected obliquely from the outside of the tokamak near an optimal angle to the magnetic field lines. This method involves two mode conversions. The ordinary waves are converted into extraordinary waves near the plasma cut-off layer. The extraordinary waves...... are subsequently converted into electrostatic electron Bernstein waves at the upper hybrid resonance layer, and the Bernstein waves are completely absorbed close to the plasma centre. Results are presented from ray-tracinq calculations in full three-dimensional geometry using the dispersion function for a hot non...

  3. Review of material recovery from used electric and electronic equipment-alternative options for resource conservation.

    Science.gov (United States)

    Friege, Henning

    2012-09-01

    For waste from electric and electronic equipment, the WEEE Directive stipulates the separate collection of electric and electronic waste. As to new electric and electronic devices, the Restriction of Hazardous Substances (RoHS) Directive bans the use of certain chemicals dangerous for man and environment. From the implementation of the WEEE directive, many unsolved problems have been documented: poor collection success, emission of dangerous substances during collection and recycling, irretrievable loss of valuable metals among others. As to RoHS, data from the literature show a satisfying success. The problems identified in the process can be reduced to some basic dilemmas at the borders between waste management, product policy and chemical safety. The objectives of the WEEE Directive and the specific targets for use and recycling of appliances are not consistent. There is no focus on scarce resources. Extended producer responsibility is not sufficient to guarantee sustainable waste management. Waste management reaches its limits due to problems of implementation but also due to physical laws. A holistic approach is necessary looking at all branch points and sinks in the stream of used products and waste from electric and electronic equipment. This may be done with respect to the general rules for sustainable management of material streams covering the three dimensions of sustainable policy. The relationships between the players in the field of electric and electronic devices have to be taken into account. Most of the problems identified in the implementation process will not be solved by the current amendment of the WEEE Directive.

  4. New organization scheme for the energy supply in the not interconnected zones of Colombia

    International Nuclear Information System (INIS)

    Zapata, Josue; Bayona Lugdy

    2001-01-01

    The paper shows a new scheme of solutions in the financial institutional environment and regulatory, in this sense it thinks about the creation from a support unit to the rural energy administration that takes charge of to identify energy solutions and the technical and organizational support of the service of a foundation that manage the obtained resources and a interconnected scheme to the current conditions of the NIZ. In Colombia the not interconnected zones NIZ corresponds those of the country that don't receive electric power service through the national interconnected system, and who interconnection is not economically feasible

  5. Charting a Course through CORAL: Texas A&M University Libraries' Experience Implementing an Open-Source Electronic Resources Management System

    Science.gov (United States)

    Hartnett, Eric; Beh, Eugenia; Resnick, Taryn; Ugaz, Ana; Tabacaru, Simona

    2013-01-01

    In 2010, after two previous unsuccessful attempts at electronic resources management system (ERMS) implementation, Texas A&M University (TAMU) Libraries set out once again to find an ERMS that would fit its needs. After surveying the field, TAMU Libraries selected the University of Notre Dame Hesburgh Libraries-developed, open-source ERMS,…

  6. Communicating Knowledge of Plant Genetic Resources to the Public

    DEFF Research Database (Denmark)

    Windfeldt, Louise

    This thesis analyses how knowledge of plant genetic resources was communicated to the public through demonstration-projects in a governmental grant-scheme, which was part of the EU Rural Development Programme 2007 to 2013. The grant-receivers were museums and other Informal Learning Environments....... Three studies were made using frameworks from educational research, communication theory, and network theory: At first an analysis of the conditions influencing the formulation of the grant-scheme was made, secondly a study of the grant-receivers’ communication was conducted, and finally the cooperation......, and their diversity as well as cooperation between them were found to enhance the potential of learning and learners. Recommendations are given to the work with plant genetic resources: It is important that international strategies and an overall national programme govern the conservation, growing and development...

  7. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Science.gov (United States)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  8. Further test of new pairing scheme used in overhaul of BCS theory

    International Nuclear Information System (INIS)

    Zheng, X.H.; Walmsley, D.G.

    2014-01-01

    Highlights: • Explanation of a new pairing scheme to overhaul BCS theory. • Prediction of superconductor properties from normal state resistivity. • Applications to Nb, Pb, Al, Ta, Mo, Ir and W, T c between 9.5 and 0.012 K. • High accuracy compared with measured energy gap of Nb, Pb, Al and Ta. • Prediction of energy gap for Mo, Ir and W (so far not measured). - Abstract: A new electron pairing scheme, rectifying a fundamental flaw of the BCS theory, is tested extensively. It postulates that superconductivity arises solely from residual umklapp scattering when it is not in competition for the same destination electron states with normal scattering. It reconciles a long standing theoretical discrepancy in the strength of the electron–phonon interaction between the normal and superconductive states. The new scheme is exploited to calculate the superconductive electron–phonon spectral density, α 2 F(ν), entirely on the basis of normal state electrical resistivity. This leads to first principles superconductive properties (zero temperature energy gap and tunnelling conductance) in seven metals which turn out to be highly accurate when compared with known data; in other cases experimental verification is invited. The transition temperatures involved vary over almost three orders of magnitude: from 9.5 K for niobium to 0.012 K for tungsten

  9. Logical and physical resource management in the common node of a distributed function laboratory computer network

    International Nuclear Information System (INIS)

    Stubblefield, F.W.

    1976-01-01

    A scheme for managing resources required for transaction processing in the common node of a distributed function computer system has been given. The scheme has been found to be satisfactory for all common node services provided so far

  10. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  11. Conceptual design of hollow electron lenses for beam halo control in the Large Hadron Collider

    Energy Technology Data Exchange (ETDEWEB)

    Stancari, Giulio [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Previtali, Valentina [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Valishev, Alexander [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Bruce, Roderik [European Organization for Nuclear Research (CERN), Geneva (Switzerland); Redaelli, Stefano [European Organization for Nuclear Research (CERN), Geneva (Switzerland); Rossi, Adriana [European Organization for Nuclear Research (CERN), Geneva (Switzerland); Salvachua Ferrando, Belen [European Organization for Nuclear Research (CERN), Geneva (Switzerland)

    2014-06-26

    Collimation with hollow electron beams is a technique for halo control in high-power hadron beams. It is based on an electron beam (possibly pulsed or modulated in intensity) guided by strong axial magnetic fields which overlaps with the circulating beam in a short section of the ring. The concept was tested experimentally at the Fermilab Tevatron collider using a hollow electron gun installed in one of the Tevatron electron lenses. We are proposing a conceptual design for applying this technique to the Large Hadron Collider at CERN. A prototype hollow electron gun for the LHC was built and tested. The expected performance of the hollow electron beam collimator was based on Tevatron experiments and on numerical tracking simulations. Halo removal rates and enhancements of halo diffusivity were estimated as a function of beam and lattice parameters. Proton beam core lifetimes and emittance growth rates were checked to ensure that undesired effects were suppressed. Hardware specifications were based on the Tevatron devices and on preliminary engineering integration studies in the LHC machine. Required resources and a possible timeline were also outlined, together with a brief discussion of alternative halo-removal schemes and of other possible uses of electron lenses to improve the performance of the LHC.

  12. Oscillating molecular dipoles require strongly correlated electronic and nuclear motion

    International Nuclear Information System (INIS)

    Chang, Bo Y; Shin, Seokmin; Palacios, Alicia; Martín, Fernando; Sola, Ignacio R

    2015-01-01

    To create an oscillating electric dipole in an homonuclear diatomic cation without an oscillating driver one needs (i) to break the symmetry of the system and (ii) to sustain highly correlated electronic and nuclear motion. Based on numerical simulations in H 2 + we present results for two schemes. In the first one (i) is achieved by creating a superposition of symmetric and antisymmetric electronic states freely evolving, while (ii) fails. In a second scheme, by preparing the system in a dressed state of a strong static field, both conditions hold. We then analyze the robustness of this scheme with respect to features of the nuclear wave function and its intrinsic sources of decoherence. (tutorial)

  13. Two-pulse laser control of nuclear and electronic motion

    DEFF Research Database (Denmark)

    Grønager, Michael; Henriksen, Niels Engholm

    1997-01-01

    We discuss an explicitly time-dependent two-pulse laser scheme for controlling where nuclei and electrons are going in unimolecular reactions. We focus on electronic motion and show, with HD+ as an example, that one can find non-stationary states where the electron (with some probability...

  14. Designing a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology

    Directory of Open Access Journals (Sweden)

    Mirali Seyednaghavi

    2017-06-01

    Full Text Available : In the first phase of this study a model for electronic human resource management in government agencies based on new public services was explored by using software MAXQDA, then in the second phase, relationship between the elements of the theory were tested using software Smart PLS2. So the aim of this study is to design a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology. In this regard, according to Strauss and Corbin’s structured plan, five hypotheses were tested. Quantitative data analysis indicates that the pressures of the policies and global perspectives cause to move toward e-HRM. Among the contextual conditions macro structural mechanisms, considerations of actors, governance considerations have a significant impact on the strategy of new public services and therefore lead to the consequences of its implementation in public organizations. The findings suggest that e-HRM does not have a positive and meaningful impact on new public services, and in our country, although the recent political developments have somehow removed the gap between public policy makers, administrators, and the public, but there is still a long way to go.

  15. EIC Electron Beam Polarimetry Workshop Summary

    International Nuclear Information System (INIS)

    Lorenzon, W.

    2008-01-01

    A summary of the Precision Electron Beam Polarimetry Workshop for a future Electron Ion Collider (EIC) is presented. The workshop was hosted by the University of Michigan Physics Department in Ann Arbor on August 23-24, 2007 with the goal to explore and study the electron beam polarimetry issues associated with the EIC to achieve sub-1% precision in polarization determination. Ideas are being presented that were exchanged among experts in electron polarimetry and source and accelerator design to examine existing and novel electron beam polarization measurement schemes

  16. Joint venture schemes in Limpopo Province and their outcomes on smallholder farmers livelihoods

    Science.gov (United States)

    Mapedza, Everisto; van Koppen, Barbara; Sithole, Pinimidzai; Bourblanc, Magalie

    2016-04-01

    Joint Venture schemes based on the floppy irrigation technology are being promoted in the post-Apartheid South Africa's Limpopo Province. Access to land and water resources in South Africa are largely viewed as a mechanism for re-dressing the Apartheid injustices. This research was part of a broader applied research to help inform irrigation practise in the Limpopo Province. The research used literature review, key informant interviews and a questionnaire survey. The overall research question sought to understand how the Joint Venture Schemes had benefited the smallholder farmers. This paper argues that the joint venture partnership created a new injustice. Firstly, the Joint Venture Scheme design is fundamentally a bad idea which disempower farmers not only to water access but also land as well. The choice of the 'efficient' floppy irrigation technology was made by the state and entailed that land had to be managed as a single unit. In order to make more effective use of this highly sophisticated new technology, the smallholder farmers also needed to go into a joint venture partnership with a white commercial farmer. By virtue of signing the Joint Venture agreement the farmers were also forfeiting their land and water rights to be used for crop production. The smallholder farmers lost access to their water and land resources and were largely relegated to sharing profits - when they exist - with hardly any skills development despite what was initially envisaged in the Joint Venture partnership. Secondly, the implementation of the JVS has been skewed from the start which explains the bad results. This paper further shows how the negative outcomes affected women in particular. As the smallholder farmers argue the technological options chosen by the state have excluded both male and female farmers from accessing and utilising their land and water resources in order to improve their livelihoods; it has entrenched the role of the state and the private interests at the

  17. Strategic management of labor resources of agricultural enterprises on the basis of marketing

    Directory of Open Access Journals (Sweden)

    Julia Kalyuzhna

    2018-06-01

    Full Text Available Purpose. The goal of this paper is to characterize the theoretical aspects of strategic management of labor resources with the marketing principles in agrarian enterprises; to identify individual factors of influence on labor resources and to form a scheme effective strategic management of labor resources in conjunction with marketing activities of the enterprise. Methodology / approach. In the process of writing the article, were used such methods as: logical generalization – for the theoretical substantiation of the marketing activity’s and labor resources’ essence; statistical analysis – for the estimation of such factors, as migration movement of labor resources from rural areas, which influence on the functioning of agrarian enterprises; system analysis – for research and substantiation of effective strategic management of labor resources with the marketing principles as the main element of the enterprise’s activity. Results. Today in Ukraine one of the main problems of effective management of is the attraction and use of labor resources. Since labor is the main productive force in solving the issues of competitiveness, economic growth and ensuring the effective operation of the enterprise. The labor resources management is a complex process and has its own specific properties and regularities and should have systemic character and completeness based on the development of strategic management. Application of strategic management of labor resources with the marketing principles at agrarian enterprises will allow using economic, organizational and technical possibilities of production effectively. Originality / scientific novelty. An attempt to investigate the influence of interstate migration growth (decrease in the rural population as a negative factor of the labor resources reduction in agrarian enterprises, and the forecast for the prospective period was made. Practical value / implications. The forecasting level of labor

  18. Cooperative Control of Mobile Sensor Networks for Environmental Monitoring: An Event-Triggered Finite-Time Control Scheme.

    Science.gov (United States)

    Lu, Qiang; Han, Qing-Long; Zhang, Botao; Liu, Dongliang; Liu, Shirong

    2017-12-01

    This paper deals with the problem of environmental monitoring by developing an event-triggered finite-time control scheme for mobile sensor networks. The proposed control scheme can be executed by each sensor node independently and consists of two parts: one part is a finite-time consensus algorithm while the other part is an event-triggered rule. The consensus algorithm is employed to enable the positions and velocities of sensor nodes to quickly track the position and velocity of a virtual leader in finite time. The event-triggered rule is used to reduce the updating frequency of controllers in order to save the computational resources of sensor nodes. Some stability conditions are derived for mobile sensor networks with the proposed control scheme under both a fixed communication topology and a switching communication topology. Finally, simulation results illustrate the effectiveness of the proposed control scheme for the problem of environmental monitoring.

  19. An induced charge readout scheme incorporating image charge splitting on discrete pixels

    International Nuclear Information System (INIS)

    Kataria, D.O.; Lapington, J.S.

    2003-01-01

    Top hat electrostatic analysers used in space plasma instruments typically use microchannel plates (MCPs) followed by discrete pixel anode readout for the angular definition of the incoming particles. Better angular definition requires more pixels/readout electronics channels but with stringent mass and power budgets common in space applications, the number of channels is restricted. We describe here a technique that improves the angular definition using induced charge and an interleaved anode pattern. The technique adopts the readout philosophy used on the CRRES and CLUSTER I instruments but has the advantages of the induced charge scheme and significantly reduced capacitance. Charge from the MCP collected by an anode pixel is inductively split onto discrete pixels whose geometry can be tailored to suit the scientific requirements of the instrument. For our application, the charge is induced over two pixels. One of them is used for a coarse angular definition but is read out by a single channel of electronics, allowing a higher rate handling. The other provides a finer angular definition but is interleaved and hence carries the expense of lower rate handling. Using the technique and adding four channels of electronics, a four-fold increase in the angular resolution is obtained. Details of the scheme and performance results are presented

  20. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  1. Assessing DRG cost accounting with respect to resource allocation and tariff calculation: the case of Germany

    Science.gov (United States)

    2012-01-01

    The purpose of this paper is to analyze the German diagnosis related groups (G-DRG) cost accounting scheme by assessing its resource allocation at hospital level and its tariff calculation at national level. First, the paper reviews and assesses the three steps in the G-DRG resource allocation scheme at hospital level: (1) the groundwork; (2) cost-center accounting; and (3) patient-level costing. Second, the paper reviews and assesses the three steps in G-DRG national tariff calculation: (1) plausibility checks; (2) inlier calculation; and (3) the “one hospital” approach. The assessment is based on the two main goals of G-DRG introduction: improving transparency and efficiency. A further empirical assessment attests high costing quality. The G-DRG cost accounting scheme shows high system quality in resource allocation at hospital level, with limitations concerning a managerially relevant full cost approach and limitations in terms of advanced activity-based costing at patient-level. However, the scheme has serious flaws in national tariff calculation: inlier calculation is normative, and the “one hospital” model causes cost bias, adjustment and representativeness issues. The G-DRG system was designed for reimbursement calculation, but developed to a standard with strategic management implications, generalized by the idea of adapting a hospital’s cost structures to DRG revenues. This combination causes problems in actual hospital financing, although resource allocation is advanced at hospital level. PMID:22935314

  2. Assessing DRG cost accounting with respect to resource allocation and tariff calculation: the case of Germany.

    Science.gov (United States)

    Vogl, Matthias

    2012-08-30

    The purpose of this paper is to analyze the German diagnosis related groups (G-DRG) cost accounting scheme by assessing its resource allocation at hospital level and its tariff calculation at national level. First, the paper reviews and assesses the three steps in the G-DRG resource allocation scheme at hospital level: (1) the groundwork; (2) cost-center accounting; and (3) patient-level costing. Second, the paper reviews and assesses the three steps in G-DRG national tariff calculation: (1) plausibility checks; (2) inlier calculation; and (3) the "one hospital" approach. The assessment is based on the two main goals of G-DRG introduction: improving transparency and efficiency. A further empirical assessment attests high costing quality. The G-DRG cost accounting scheme shows high system quality in resource allocation at hospital level, with limitations concerning a managerially relevant full cost approach and limitations in terms of advanced activity-based costing at patient-level. However, the scheme has serious flaws in national tariff calculation: inlier calculation is normative, and the "one hospital" model causes cost bias, adjustment and representativeness issues. The G-DRG system was designed for reimbursement calculation, but developed to a standard with strategic management implications, generalized by the idea of adapting a hospital's cost structures to DRG revenues. This combination causes problems in actual hospital financing, although resource allocation is advanced at hospital level.

  3. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  4. The module of methodical support in system of electronic educational resources as the innovative element of the modern maintenance of formation

    Directory of Open Access Journals (Sweden)

    Ольга Николаевна Крылова

    2009-06-01

    Full Text Available The article introduces some results of research, which were devoted to evaluation of tearches' mobility to introduce innovations in the contents of education. The author considers innovative potential of modules of the methodical support for system of electronic educational resources.

  5. A missing-bending-magnet scheme for PEP

    International Nuclear Information System (INIS)

    Liu, R.Z.; Winick, H.

    1988-01-01

    This article presents a missing-bending-magnet scheme for PEP as a modification that could be considered if PEP were available as a fully dedicated synchrotron radiation source. The scheme can be applied to one or more PEP sextants without changing the rest. By removing some bending magnets, rearranging the remaining magnets, and adding two quadrupoles, ten additional straight sections per sextant can be created, each 5 m or more in length, for insertion devices. Beam lines therefrom, plus possible beam lines from bending magnets would enter a continuous experimental hall instead of individual tunnels and halls for each beam line. This should result in construction cost savings and increased operations efficiency. The ideal beam orbit is unchanged at the two ends and the middle of the sextant. At the end of the curved part of the sextant the lattice functions match those of the long interaction region straight section in the low emittance configuration of PEP. The electron beam characteristics in the newly created straight sections are described, including the enlargement of the horizontal beam size due to the nonzero dispersion. Some disadvantages of the scheme are increased operations complexity due to the need for nine new quadrupole families, increased beam emittance (by 14.5% is one sextant is modified), and reduced dynamic aperture. However, the dynamic aperture is still about as large as the physical aperture and should be adequate for good beam lifetime and injection. (orig.)

  6. Explaining resource consumption among non-normal neonates

    Science.gov (United States)

    Schwartz, Rachel M.; Michelman, Thomas; Pezzullo, John; Phibbs, Ciaran S.

    1991-01-01

    The adoption by Medicare in 1983 of prospective payment using diagnosis-related groups (DRGs) has stimulated research to develop case-mix grouping schemes that more accurately predict resource consumption by patients. In this article, the authors explore a new method designed to improve case-mix classification for newborns through the use of birth weight in combination with DRGs to adjust the unexplained case-mix severity. Although the findings are developmental in nature, they reveal that the model significantly improves our ability to explain resource use. PMID:10122360

  7. Exploiting Multimodal Biometrics in E-Privacy Scheme for Electronic Health Records

    OpenAIRE

    Omotosho, Adebayo; Adegbola, Omotanwa; Adelakin, Barakat; Adelakun, Adeyemi; Emuoyibofarhe, Justice

    2015-01-01

    Existing approaches to protect the privacy of Electronic Health Records are either insufficient for existing medical laws or they are too restrictive in their usage. For example, smart card-based encryption systems require the patient to be always present to authorize access to medical records. Questionnaires were administered by 50 medical practitioners to identify and categorize different Electronic Health Records attributes. The system was implemented using multi biometrics of patients to ...

  8. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  9. How should INGOs allocate resources?

    Directory of Open Access Journals (Sweden)

    Scott Wisor

    2012-02-01

    Full Text Available International Non-governmental Organizations (INGOs face difficult choices when choosing to allocate resources. Given that the resources made available to INGOs fall far short of what is needed to reduce massive human rights deficits, any chosen scheme of resource allocation requires failing to reach other individuals in great need. Facing these moral opportunity costs, what moral reasons should guide INGO resource allocation? Two reasons that clearly matter, and are recognized by philosophers and development practitioners, are the consequences (or benefit or harm reduction of any given resource allocation and the need (or priority of individual beneficiaries. If accepted, these reasons should lead INGOs to allocate resources to a limited number of countries where the most prioritarian weighted harm reduction will be achieved. I make three critiques against this view. First, on grounds the consequentialist accepts, I argue that INGOs ought to maintain a reasonably wide distribution of resources. Second, I argue that even if one is a consequentialist, consequentialism ought not act as an action guiding principle for INGOs. Third, I argue that additional moral reasons should influence decision making about INGO resource allocation. Namely, INGO decision making should attend to relational reasons, desert, respect for agency, concern for equity, and the importance of expressing a view of moral wrongs.

  10. Performance Analysis of Simple Channel Feedback Schemes for a Practical OFDMA System

    DEFF Research Database (Denmark)

    Pedersen, Klaus, I.; Kolding, Troels; Kovacs, Istvan

    2009-01-01

    In this paper, we evaluate the tradeoff between the amount of uplink channel feedback information and the orthogonal frequency-division multiple access (OFDMA) downlink performance with opportunistic frequency-domain packet scheduling. Three candidate channel feedback schemes are investigated......, including practical aspects, such as the effects of terminal measurement errors, bandwidth measurement granularity, quantization, and uplink signaling delays. The performance is evaluated by means of system-level simulations with detailed modeling of various radio resource-management algorithms, etc. Our...... results show that the optimal tradeoff between the channel feedback and the downlink OFDMA system performance depends on the radio channel frequency coherence bandwidth. We conclude that the so-called average best-M scheme is the most attractive channel feedback solution, where only the average channel...

  11. Power efficient dynamic resource scheduling algorithms for LTE

    OpenAIRE

    Han, C; Beh, KC; Nicolaou, M; Armour, SMD; Doufexi, A

    2010-01-01

    This paper presents a link level analysis of the rate and energy efficiency performance of the LTE downlink considering the unitary codebook based precoding scheme. In a multi-user environment, appropriate radio resource management strategies can be applied to the system to improve the performance gain by exploiting multi-user diversity in the time, frequency and space domains and the gains can be translated to energy reduction at the base station. Several existing and novel resource scheduli...

  12. QoE-Driven D2D Media Services Distribution Scheme in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingkai Chen

    2017-01-01

    Full Text Available Device-to-device (D2D communication has been widely studied to improve network performance and considered as a potential technological component for the next generation communication. Considering the diverse users’ demand, Quality of Experience (QoE is recognized as a new degree of user’s satisfaction for media service transmissions in the wireless communication. Furthermore, we aim at promoting user’s Mean of Score (MOS value to quantify and analyze user’s QoE in the dynamic cellular networks. In this paper, we explore the heterogeneous media service distribution in D2D communications underlaying cellular networks to improve the total users’ QoE. We propose a novel media service scheme based on different QoE models that jointly solve the massive media content dissemination issue for cellular networks. Moreover, we also investigate the so-called Media Service Adaptive Update Scheme (MSAUS framework to maximize users’ QoE satisfaction and we derive the popularity and priority function of different media service QoE expression. Then, we further design Media Service Resource Allocation (MSRA algorithm to schedule limited cellular networks resource, which is based on the popularity function to optimize the total users’ QoE satisfaction and avoid D2D interference. In addition, numerical simulation results indicate that the proposed scheme is more effective in cellular network content delivery, which makes it suitable for various media service propagation.

  13. Assessing the groundwater recharge under various irrigation schemes in Central Taiwan

    Science.gov (United States)

    Chen, Shih-Kai; Jang, Cheng-Shin; Lin, Zih-Ciao; Tsai, Cheng-Bin

    2014-05-01

    The flooded paddy fields can be considered as a major source of groundwater recharge in Central Taiwan. The risk of rice production has increased notably due to climate change in this area. To respond to agricultural water shortage caused by climate change without affecting rice yield in the future, the application of water-saving irrigation is the substantial resolution. The System of Rice Intensification (SRI) was developed as a set of insights and practices used in growing irrigated rice. Based on the water-saving irrigation practice of SRI, impacts of the new methodology on the reducing of groundwater recharge were assessed in central Taiwan. The three-dimensional finite element groundwater model (FEMWATER) with the variable boundary condition analog functions, was applied in simulating groundwater recharge under different irrigation schemes. According to local climatic and environmental characteristics associated with SRI methodology, the change of infiltration rate was evaluated and compared with the traditional irrigation schemes, including continuous irrigation and rotational irrigation scheme. The simulation results showed that the average infiltration rate in the rice growing season decreased when applying the SRI methodology, and the total groundwater recharge amount of SRI with a 5-day irrigation interval reduced 12% and 9% compared with continuous irrigation (6cm constant ponding water depth) and rotational scheme (5-day irrigation interval with 6 cm initial ponding water depth), respectively. The results could be used as basis for planning long-term adaptive water resource management strategies to climate change in Central Taiwan. Keywords: SRI, Irrigation schemes, Groundwater recharge, Infiltration

  14. Impact of Electronic Resources and Usage in Academic Libraries in Ghana: Evidence from Koforidua Polytechnic & All Nations University College, Ghana

    Science.gov (United States)

    Akussah, Maxwell; Asante, Edward; Adu-Sarkodee, Rosemary

    2015-01-01

    The study investigates the relationship between impact of electronic resources and its usage in academic libraries in Ghana: evidence from Koforidua Polytechnic & All Nations University College, Ghana. The study was a quantitative approach using questionnaire to gather data and information. A valid response rate of 58.5% was assumed. SPSS…

  15. Development of an estuarine assessment scheme for the management of a highly urbanised catchment/estuary system, Sydney estuary, Australia.

    Science.gov (United States)

    Birch, G F; Gunns, T J; Chapman, D; Harrison, D

    2016-05-01

    As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and

  16. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  17. The PSO support scheme for natural gas - subsidy to industry or environmental policy

    International Nuclear Information System (INIS)

    Eldegard, Tom

    2006-01-01

    Some aspects of the PSO scheme for natural gas are examined critically. Two central arguments used for justifying the PSO subsidy scheme of natural gas and its distribution are reviewed; these include the 'smallholder argument' and the 'environmental argument'. The 'smallholder argument' claims that since Norway has the natural gas resources, it should also make use of the natural gas in the country, and not simply send the raw material to other countries. The 'environmental argument' states that natural gas compared to other fossil fuels such as coal and fuel oil, is a far cleaner alternative, thus an environmental-friendly alternative entitled to financial support. The arguments are critically examined by the author (ml)

  18. Bonding and electron counting in hyper-closo metalloboranes and metallocarbaboranes

    International Nuclear Information System (INIS)

    Johnston, R.L

    1991-01-01

    Since the characterisation of the first hyper-or iso-closo metalloboranes and metallocarbaboranes there has been considerable debate regarding the most appropriate formal electron counting scheme for these species. While they clearly show deviations from the usual geometries as a result of a formal electron deficiency, there is some disagreement as to whether the electron deficiency should be considered on the metal centre (iso-closo) or associated with the delocalised cluster bonding (hyper-closo). We review the structural evidence and some of the theoretical contributions to the debate, and describe MO calculations which address the validity of the alternative electron counting schemes. Although we find that the hyper-closo model is more generally applicable, the structures show such a diversity of bonding characteristics that any simple attempt to generalise electron counting rules is unlikely to be applicable to all known examples. 53 refs

  19. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  20. Design and Implementation of Green Construction Scheme for a High-rise Residential Building Project

    Science.gov (United States)

    Zhou, Yong; Huang, You Zhen

    2018-06-01

    This paper mainly studies the green construction scheme of a high-rise residential building project. From "four sections one environmental protection", saving material, water saving, energy saving, economical use of land and environmental protection conduct analysis and research. Adopting scientific, advanced, reasonable and economical construction technology measures, implementing green construction method. Promoting energy-saving technologies in buildings, ensuring the sustainable use of resources, Maximum savings of resources and energy, increase energy efficiency, to reduce pollution, reducing the adverse environmental impact of construction activities, ensure construction safety, build sustainable buildings.

  1. Enhanced signaling scheme with admission control in the hybrid optical wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    that it can support stringent Quality of Service (QoS) requirements. In this paper, we describe and evaluate a resource management framework designed for the HOW networks. There are two parts in the resource management framework The first part is the Enhanced MPCP (E-MPCP) scheme aiming at improving signaling...... dropping probability depend on several factors. These factors include the frame duration, the traffic load and the total number of shared users. The results also highlight that our proposed system achieves significant improvements over the traditional approach in terms of user QoS guarantee and network...

  2. A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Nam Nguyen

    2015-01-01

    Full Text Available The existing IEEE and 3GPP standards have laid the foundation for integrating cellular and WiFi network to deliver a seamless experience for the end-users when roaming across multiple access networks. However, in recent studies, the issue of making roaming decision and intelligently selecting the most preferable Point of Service to optimize network resource and improve end user’s experience has not been considered properly. In this paper, we propose a novel cellular and WiFi roaming decision and AP selection scheme based on state of the art, 3GPP TS24.312 and IEEE 802.11u, k standards. Our proposed scheme assists the mobile nodes to decide the right timing to make roaming decision and select preferable point of service based on the operator’s policies and real-time network condition. We also introduce our simulation model of a heterogeneous network with cellular and WiFi interworking as well as 3GPP ANDSF, TS24.312. It is a complete end-to-end system model from application to physical layer with considering user’s mobility and realistic traffic model. The proposed scheme outperformed the conventional WiFi selection scheme in terms of dynamically steering mobile node’s data traffic from macrocell to available Access Points. The proposed scheme increased the utilization and balanced the traffic load of access points and improved user’s experienced throughput.

  3. Cross stratum resources protection in fog-computing-based radio over fiber networks for 5G services

    Science.gov (United States)

    Guo, Shaoyong; Shao, Sujie; Wang, Yao; Yang, Hui

    2017-09-01

    In order to meet the requirement of internet of things (IoT) and 5G, the cloud radio access network is a paradigm which converges all base stations computational resources into a cloud baseband unit (BBU) pool, while the distributed radio frequency signals are collected by remote radio head (RRH). A precondition for centralized processing in the BBU pool is an interconnection fronthaul network with high capacity and low delay. However, it has become more complex and frequent in the interaction between RRH and BBU and resource scheduling among BBUs in cloud. Cloud radio over fiber network has been proposed in our previous work already. In order to overcome the complexity and latency, in this paper, we first present a novel cross stratum resources protection (CSRP) architecture in fog-computing-based radio over fiber networks (F-RoFN) for 5G services. Additionally, a cross stratum protection (CSP) scheme considering the network survivability is introduced in the proposed architecture. The CSRP with CSP scheme can effectively pull the remote processing resource locally to implement the cooperative radio resource management, enhance the responsiveness and resilience to the dynamic end-to-end 5G service demands, and globally optimize optical network, wireless and fog resources. The feasibility and efficiency of the proposed architecture with CSP scheme are verified on our software defined networking testbed in terms of service latency, transmission success rate, resource occupation rate and blocking probability.

  4. Performance evaluation of multi-stratum resources integration based on network function virtualization in software defined elastic data center optical interconnect.

    Science.gov (United States)

    Yang, Hui; Zhang, Jie; Ji, Yuefeng; Tian, Rui; Han, Jianrui; Lee, Young

    2015-11-30

    Data center interconnect with elastic optical network is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. In our previous work, we implemented multi-stratum resilience between IP and elastic optical networks that allows to accommodate data center services. In view of this, this study extends to consider the resource integration by breaking the limit of network device, which can enhance the resource utilization. We propose a novel multi-stratum resources integration (MSRI) architecture based on network function virtualization in software defined elastic data center optical interconnect. A resource integrated mapping (RIM) scheme for MSRI is introduced in the proposed architecture. The MSRI can accommodate the data center services with resources integration when the single function or resource is relatively scarce to provision the services, and enhance globally integrated optimization of optical network and application resources. The overall feasibility and efficiency of the proposed architecture are experimentally verified on the control plane of OpenFlow-based enhanced software defined networking (eSDN) testbed. The performance of RIM scheme under heavy traffic load scenario is also quantitatively evaluated based on MSRI architecture in terms of path blocking probability, provisioning latency and resource utilization, compared with other provisioning schemes.

  5. Preserving anonymity in e-voting system using voter non-repudiation oriented scheme

    Science.gov (United States)

    Hamid, Isredza Rahmi A.; Radzi, Siti Nafishah Md; Rahman, Nurul Hidayah Ab; Wen, Chuah Chai; Abdullah, Nurul Azma

    2017-10-01

    The voting system has been developed from traditional paper ballot to electronic voting (e-voting). The e-voting system has high potential to be widely used in election event. However, the e-voting system still does not meet the most important security properties which are voter's authenticity and non-repudiation. This is because voters can simply vote again by entering other people's identification number. In this project, an electronic voting using voter non-repudiation oriented scheme will be developed. This system contains ten modules which are log in, vote session, voter, candidate, open session, voting results, user account, initial score, logs and reset vote count. In order to ensure there would be no non-repudiation issue, a voter non-repudiation oriented scheme concept will be adapted and implemented in the system. This system will be built using Microsoft Visual Studio 2013 which only can be accessed using personal computers at the voting center. This project will be beneficial for future use in order to overcome non-repudiation issue.

  6. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  7. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  8. A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2012-03-01

    Full Text Available In this paper, we integrate a grid system and a wireless network to present a convenient computational service system, called the Semi-Preemptive Computational Service system (SePCS for short, which provides users with a wireless access environment and through which a user can share his/her resources with others. In the SePCS, each node is dynamically given a score based on its CPU level, available memory size, current length of waiting queue, CPU utilization and bandwidth. With the scores, resource nodes are classified into three levels. User requests based on their time constraints are also classified into three types. Resources of higher levels are allocated to more tightly constrained requests so as to increase the total performance of the system. To achieve this, a resource broker with the Semi-Preemptive Algorithm (SPA is also proposed. When the resource broker cannot find suitable resources for the requests of higher type, it preempts the resource that is now executing a lower type request so that the request of higher type can be executed immediately. The SePCS can be applied to a Vehicular Ad Hoc Network (VANET, users of which can then exploit the convenient mobile network services and the wireless distributed computing. As a result, the performance of the system is higher than that of the tested schemes.

  9. Utilization of Electronic Information Resources by Undergraduate Students of University of Ibadan: A Case Study of Social Sciences and Education

    Science.gov (United States)

    Owolabi, Sola; Idowu, Oluwafemi A.; Okocha, Foluke; Ogundare, Atinuke Omotayo

    2016-01-01

    The study evaluated utilization of electronic information resources by undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan. The study adopted a descriptive survey design with a study population of 1872 undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan, from which a…

  10. Numerical shoves and countershoves in electron transport calculations

    International Nuclear Information System (INIS)

    Filippone, W.L.

    1986-01-01

    The justification for applying the relatively complex (compared to S/sub n/) streaming ray (SR) algorithm to electron transport problems is its potential for doing rapid and accurate calculations. Because of the Lagrangian treatment of the cell-uncollided electrons, the only significant sources of error are the numerical treatment of the scattering kernel and the spatial differencing scheme used for the cell-collided electrons. Considerable progress has been made in reducing the former source of error. If one is willing to pay the price, the latter source of error can be reduced to any desired level by refining the mesh size or by using high-order differencing schemes. Here the method of numerical shoves and countershoves is introduced, which reduces spatial differencing errors using relatively little additional computational effort

  11. Controlling front-end electronics boards using commercial solutions

    CERN Document Server

    Beneyton, R; Jost, B; Schmeling, S

    2002-01-01

    LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown. (5 refs).

  12. Shaping the Electronic Library--The UW-Madison Approach.

    Science.gov (United States)

    Dean, Charles W., Ed.; Frazier, Ken; Pope, Nolan F.; Gorman, Peter C.; Dentinger, Sue; Boston, Jeanne; Phillips, Hugh; Daggett, Steven C.; Lundquist, Mitch; McClung, Mark; Riley, Curran; Allan, Craig; Waugh, David

    1998-01-01

    This special theme section describes the University of Wisconsin-Madison's experience building its Electronic Library. Highlights include integrating resources and services; the administrative framework; the public electronic library, including electronic publishing capability and access to World Wide Web-based and other electronic resources;…

  13. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  14. Entanglement distribution schemes employing coherent photon-to-spin conversion in semiconductor quantum dot circuits

    Science.gov (United States)

    Gaudreau, Louis; Bogan, Alex; Korkusinski, Marek; Studenikin, Sergei; Austing, D. Guy; Sachrajda, Andrew S.

    2017-09-01

    Long distance entanglement distribution is an important problem for quantum information technologies to solve. Current optical schemes are known to have fundamental limitations. A coherent photon-to-spin interface built with quantum dots (QDs) in a direct bandgap semiconductor can provide a solution for efficient entanglement distribution. QD circuits offer integrated spin processing for full Bell state measurement (BSM) analysis and spin quantum memory. Crucially the photo-generated spins can be heralded by non-destructive charge detection techniques. We review current schemes to transfer a polarization-encoded state or a time-bin-encoded state of a photon to the state of a spin in a QD. The spin may be that of an electron or that of a hole. We describe adaptations of the original schemes to employ heavy holes which have a number of attractive properties including a g-factor that is tunable to zero for QDs in an appropriately oriented external magnetic field. We also introduce simple throughput scaling models to demonstrate the potential performance advantage of full BSM capability in a QD scheme, even when the quantum memory is imperfect, over optical schemes relying on linear optical elements and ensemble quantum memories.

  15. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the doubly unresolved subtraction terms

    Science.gov (United States)

    Somogyi, Gábor

    2013-04-01

    We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.

  16. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the doubly unresolved subtraction terms

    OpenAIRE

    Somogyi, Gabor

    2013-01-01

    We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.

  17. An overview of power electronic converter technology for renewable energy systems

    DEFF Research Database (Denmark)

    Chen, Zhe

    2013-01-01

    This chapter presents power electronic technology which is an enabling tool for modern wind and marine energy conversion systems. In this chapter, the main power electronic devices are described. Various power electronic converter topologies are represented, and commonly used modulation schemes...

  18. Energy Efficient Resource Allocation for Cognitive Radios: A Generalized Sensing Analysis

    KAUST Repository

    Alabbasi, AbdulRahman; Rezki, Zouheir; Shihada, Basem

    2014-01-01

    In this paper, two resource allocation schemes for energy efficient cognitive radio systems are proposed. Our design considers resource allocation approaches that adopt spectrum sharing combined with soft-sensing information, adaptive sensing thresholds, and adaptive power to achieve an energy efficient system. An energy per good-bit metric is considered as an energy efficient objective function. A multi-carrier system, such as, orthogonal frequency division multiplexing, is considered in the framework. The proposed resource allocation schemes, using different approaches, are designated as sub-optimal and optimal. The sub-optimal approach is attained by optimizing over a channel inversion power policy. The optimal approach utilizes the calculus of variation theory to optimize a problem of instantaneous objective function subject to average and instantaneous constraints with respect to functional optimization variables. In addition to the analytical results, selected numerical results are provided to quantify the impact of soft-sensing information and the optimal adaptive sensing threshold on the system performance.

  19. Energy Efficient Resource Allocation for Cognitive Radios: A Generalized Sensing Analysis

    KAUST Repository

    Alabbasi, Abdulrahman

    2014-12-31

    In this paper, two resource allocation schemes for energy efficient cognitive radio systems are proposed. Our design considers resource allocation approaches that adopt spectrum sharing combined with soft-sensing information, adaptive sensing thresholds, and adaptive power to achieve an energy efficient system. An energy per good-bit metric is considered as an energy efficient objective function. A multi-carrier system, such as, orthogonal frequency division multiplexing, is considered in the framework. The proposed resource allocation schemes, using different approaches, are designated as sub-optimal and optimal. The sub-optimal approach is attained by optimizing over a channel inversion power policy. The optimal approach utilizes the calculus of variation theory to optimize a problem of instantaneous objective function subject to average and instantaneous constraints with respect to functional optimization variables. In addition to the analytical results, selected numerical results are provided to quantify the impact of soft-sensing information and the optimal adaptive sensing threshold on the system performance.

  20. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  1. Knowledge and uptake of community-based health insurance scheme among residents of Olowora, Lagos

    Directory of Open Access Journals (Sweden)

    O A Ibukun

    2013-01-01

    Full Text Available Background and Objective: The informal sector population in developing nations has low health coverage from Community Based Health Insurance (CBHI and problems such as limited awareness about the potential impact of prepayment health financing and the limited resources to finance health care can impede success. This study assessed the community based health insurance scheme uptake and determinants in Olowora, Lagos State. Methods: This was a descriptive cross sectional study carried out in July 2010 in all households of 12 out of 41 streets in Olowora,by multistage sampling. Four hundred and sixteen interviewer-administered questionnaires were completed and returned. Analysis was by Epi- info version 3.5.1 software. Results: Although 75.5% of respondents were aware of the Community Health Insurance scheme at Olowora, just about half (49.5% of them had good knowledge of the scheme. A substantial proportion (44.2% of respondents did not believe in contributing money for illness yet to come, and majority (72.3% of such respondents prefers payment for health care when ill. While about half (53% of respondentshad enrolled into the community health insurance scheme, 45.6% of those who had not enrolled were not aware of the scheme. Lack of money was the main reason (51.5% why some enrollees had defaulted. Conclusion: The study identified information gaps and poor understanding of the scheme as well as poverty as factors that have negatively affected uptake. The scheme management has to re-evaluate its sensitization programmes, and also strengthen marketing strategies with special emphasis on the poor.

  2. Performance evaluation of data center service localization based on virtual resource migration in software defined elastic optical network.

    Science.gov (United States)

    Yang, Hui; Zhang, Jie; Ji, Yuefeng; Tan, Yuanlong; Lin, Yi; Han, Jianrui; Lee, Young

    2015-09-07

    Data center interconnection with elastic optical network is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. In our previous work, we implemented cross stratum optimization of optical network and application stratums resources that allows to accommodate data center services. In view of this, this study extends the data center resources to user side to enhance the end-to-end quality of service. We propose a novel data center service localization (DCSL) architecture based on virtual resource migration in software defined elastic data center optical network. A migration evaluation scheme (MES) is introduced for DCSL based on the proposed architecture. The DCSL can enhance the responsiveness to the dynamic end-to-end data center demands, and effectively reduce the blocking probability to globally optimize optical network and application resources. The overall feasibility and efficiency of the proposed architecture are experimentally verified on the control plane of our OpenFlow-based enhanced SDN testbed. The performance of MES scheme under heavy traffic load scenario is also quantitatively evaluated based on DCSL architecture in terms of path blocking probability, provisioning latency and resource utilization, compared with other provisioning scheme.

  3. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  4. The use of quality benchmarking in assessing web resources for the dermatology virtual branch library of the National electronic Library for Health (NeLH).

    Science.gov (United States)

    Kamel Boulos, M N; Roudsari, A V; Gordon, C; Muir Gray, J A

    2001-01-01

    In 1998, the U.K. National Health Service Information for Health Strategy proposed the implementation of a National electronic Library for Health to provide clinicians, healthcare managers and planners, patients and the public with easy, round the clock access to high quality, up-to-date electronic information on health and healthcare. The Virtual Branch Libraries are among the most important components of the National electronic Library for Health. They aim at creating online knowledge based communities, each concerned with some specific clinical and other health-related topics. This study is about the envisaged Dermatology Virtual Branch Libraries of the National electronic Library for Health. It aims at selecting suitable dermatology Web resources for inclusion in the forthcoming Virtual Branch Libraries after establishing preliminary quality benchmarking rules for this task. Psoriasis, being a common dermatological condition, has been chosen as a starting point. Because quality is a principal concern of the National electronic Library for Health, the study includes a review of the major quality benchmarking systems available today for assessing health-related Web sites. The methodology of developing a quality benchmarking system has been also reviewed. Aided by metasearch Web tools, candidate resources were hand-selected in light of the reviewed benchmarking systems and specific criteria set by the authors. Over 90 professional and patient-oriented Web resources on psoriasis and dermatology in general are suggested for inclusion in the forthcoming Dermatology Virtual Branch Libraries. The idea of an all-in knowledge-hallmarking instrument for the National electronic Library for Health is also proposed based on the reviewed quality benchmarking systems. Skilled, methodical, organized human reviewing, selection and filtering based on well-defined quality appraisal criteria seems likely to be the key ingredient in the envisaged National electronic Library for

  5. Development of highly accurate approximate scheme for computing the charge transfer integral

    Energy Technology Data Exchange (ETDEWEB)

    Pershin, Anton; Szalay, Péter G. [Laboratory for Theoretical Chemistry, Institute of Chemistry, Eötvös Loránd University, P.O. Box 32, H-1518 Budapest (Hungary)

    2015-08-21

    The charge transfer integral is a key parameter required by various theoretical models to describe charge transport properties, e.g., in organic semiconductors. The accuracy of this important property depends on several factors, which include the level of electronic structure theory and internal simplifications of the applied formalism. The goal of this paper is to identify the performance of various approximate approaches of the latter category, while using the high level equation-of-motion coupled cluster theory for the electronic structure. The calculations have been performed on the ethylene dimer as one of the simplest model systems. By studying different spatial perturbations, it was shown that while both energy split in dimer and fragment charge difference methods are equivalent with the exact formulation for symmetrical displacements, they are less efficient when describing transfer integral along the asymmetric alteration coordinate. Since the “exact” scheme was found computationally expensive, we examine the possibility to obtain the asymmetric fluctuation of the transfer integral by a Taylor expansion along the coordinate space. By exploring the efficiency of this novel approach, we show that the Taylor expansion scheme represents an attractive alternative to the “exact” calculations due to a substantial reduction of computational costs, when a considerably large region of the potential energy surface is of interest. Moreover, we show that the Taylor expansion scheme, irrespective of the dimer symmetry, is very accurate for the entire range of geometry fluctuations that cover the space the molecule accesses at room temperature.

  6. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  7. Delivering an Alternative Medicine Resource to the User's Desktop via World Wide Web.

    Science.gov (United States)

    Li, Jie; Wu, Gang; Marks, Ellen; Fan, Weiyu

    1998-01-01

    Discusses the design and implementation of a World Wide Web-based alternative medicine virtual resource. This homepage integrates regional, national, and international resources and delivers library services to the user's desktop. Goals, structure, and organizational schemes of the system are detailed, and design issues for building such a…

  8. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks.

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-04-18

    Using mobile vehicles as "data mules" to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.

  9. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Yixuan Xu

    2017-04-01

    Full Text Available Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D, but also vehicle to vehicle transmission (V2V. Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.

  10. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-Hoc Networks

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-01-01

    Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%. PMID:28420218

  11. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  12. The Optimal Configuration Scheme of the Virtual Power Plant Considering Benefits and Risks of Investors

    Directory of Open Access Journals (Sweden)

    Jingmin Wang

    2017-07-01

    Full Text Available A virtual power plant (VPP is a special virtual unit that integrates various distributed energy resources (DERs distributed in the generation and consumption sides. The optimal configuration scheme of the VPP needs to break the geographical restrictions to make full use of DERs, considering the uncertainties. First, the components of the DERs and the structure of the VPP are briefly introduced. Next, the cubic exponential smoothing method is adopted to predict the VPP load requirement. Finally, the optimal configuration of the DER capacities inside the VPP is calculated by using portfolio theory and genetic algorithms (GA. The results show that the configuration scheme can optimize the DER capacities considering uncertainties, guaranteeing economic benefits of investors, and fully utilizing the DERs. Therefore, this paper provides a feasible reference for the optimal configuration scheme of the VPP from the perspective of investors.

  13. There is a Relationship between Resource Expenditures and Reference Transactions in Academic Libraries. A Review of: Dubnjakovic, A. (2012. Electronic resource expenditure and the decline in reference transaction statistics in academic libraries. Journal of Academic Librarianship, 38(2, 94-100. doi:10.1016/j.acalib.2012.01.001

    Directory of Open Access Journals (Sweden)

    Annie M. Hughes

    2013-03-01

    Full Text Available Objective – To provide an analysis of the impact of expenditures on electronic resourcesand gate counts on the increase or decrease in reference transactions.Design – Analysis of results of existing survey data from the National Center for Educational Statistics (NCES 2006 Academic Library Survey(ALS.Setting – Academic libraries in the United States.Subjects – 3925 academic library respondents.Methods – The author chose to use survey data collected from the 2006 ALS conducted bythe NCES. The survey included data on various topics related to academic libraries, but in the case of this study, the author chose to analyze three of the 193 variables included. The three variables: electronic books expenditure, computer hardware and software, and expenditures on bibliographic utilities, were combined into one variable called electronic resource expenditure. Gate counts were also considered as a variable. Electronic resource expenditure was also split as a variable into three groups: low, medium, and high. Multiple regression analysis and general linear modeling, along with tests of reliability, were employed. Main Results – The author determined that low, medium, and high spenders with regard to electronic resources exhibited differences in gate counts, and gate counts have an effect on reference transactions in any given week. Gate counts tend to not have much of an effect on reference transactions for the higher spenders, and higher spenders tend to have a higher number of reference transactions overall. Low spenders have lower gate counts and also a lower amount of reference transactions.Conclusion – The findings from this study show that academic libraries spending more on electronic resources also tend to have an increase with regard to reference transactions. The author also concludes that library spaces are no longer the determining factor with regard to number of reference transactions. Spending more on electronic resources is

  14. Electronic resources access and usage among the postgraduates of ...

    African Journals Online (AJOL)

    ... and usage among the postgraduates of a Nigerian University of Technology. ... faced by postgraduates in using e-resources include takes too much time to find, ... Resources, Access, Use, Postgraduat, Students, University, Technology, Nigeria ... By Country · List All Titles · Free To Read Titles This Journal is Open Access.

  15. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  16. Quantum computers based on electron spins controlled by ultrafast off-resonant single optical pulses.

    Science.gov (United States)

    Clark, Susan M; Fu, Kai-Mei C; Ladd, Thaddeus D; Yamamoto, Yoshihisa

    2007-07-27

    We describe a fast quantum computer based on optically controlled electron spins in charged quantum dots that are coupled to microcavities. This scheme uses broadband optical pulses to rotate electron spins and provide the clock signal to the system. Nonlocal two-qubit gates are performed by phase shifts induced by electron spins on laser pulses propagating along a shared waveguide. Numerical simulations of this scheme demonstrate high-fidelity single-qubit and two-qubit gates with operation times comparable to the inverse Zeeman frequency.

  17. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    Science.gov (United States)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  18. First-principles real-space tight-binding LMTO calculation of electronic structures for atomic clusters

    International Nuclear Information System (INIS)

    Xie, Z.L.; Dy, K.S.; Wu, S.Y.

    1997-01-01

    A real-space scheme has been developed for a first-principles calculation of electronic structures and total energies of atomic clusters. The scheme is based on the combination of the tight-binding linear muffin-tin orbital (TBLMTO) method and the method of real-space Green close-quote s function. With this approach, the local electronic density of states can be conveniently determined from the real-space Green close-quote s function. Furthermore, the full electron density of a cluster can be directly calculated in real space. The scheme has been shown to be very efficient due to the incorporation of the method of real-space Green close-quote s function and Delley close-quote s method of evaluating multicenter integrals. copyright 1996 The American Physical Society

  19. Generation of high harmonic free electron laser with phase-merging effect

    Energy Technology Data Exchange (ETDEWEB)

    Li, Heting, E-mail: liheting@ustc.edu.cn; Jia, Qika; Zhao, Zhouyu

    2017-03-01

    An easy-to-implement scheme is proposed to produce the longitudinal electron bunch density modulation with phase-merging phenomenon. In this scheme an electron bunch is firstly transversely dispersed in a modified dogleg to generate the exact dependence of electron energy on the transverse position, then it is modulated in a normal modulator. After travelling through a modified chicane with specially designed transfer matrix elements, the density modulation with phase-merging effect is generated which contains high harmonic components of the seed laser. We present theoretical analysis and numerical simulations for seeded soft x-ray free-electron laser. The results demonstrate that this technique can significantly enhance the frequency up-conversion efficiency and allow a seeded FEL operating at very high harmonics.

  20. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  1. On mixed electron-photon radiation therapy optimization using the column generation approach.

    Science.gov (United States)

    Renaud, Marc-André; Serban, Monica; Seuntjens, Jan

    2017-08-01

    Despite considerable increase in the number of degrees of freedom handled by recent radiotherapy optimisation algorithms, treatments are still typically delivered using a single modality. Column generation is an iterative method for solving large optimisation problems. It is well suited for mixed-modality (e.g., photon-electron) optimisation as the aperture shaping and modality selection problem can be solved rapidly, and the performance of the algorithm scales favourably with increasing degrees of freedom. We demonstrate that the column generation method applied to mixed photon-electron planning can efficiently generate treatment plans and investigate its behaviour under different aperture addition schemes. Column generation was applied to the problem of mixed-modality treatment planning for a chest wall case and a leg sarcoma case. 6 MV beamlets (100 cm SAD) were generated for the photon components along with 5 energies for electron beamlets (6, 9, 12, 16 and 20 MeV), simulated as shortened-SAD (80 cm) beams collimated with a photon MLC. For the chest wall case, IMRT-only, modulated electron radiation therapy (MERT)-only, and mixed electron-photon (MBRT) treatment plans were created using the same planning criteria. For the sarcoma case, MBRT and MERT plans were created to study the behaviour of the algorithm under two different sets of planning criteria designed to favour specific modalities. Finally, the efficiency and plan quality of four different aperture addition schemes was analysed by creating chest wall MBRT treatment plans which incorporate more than a single aperture per iteration of the column generation loop based on a heuristic aperture ranking scheme. MBRT plans produced superior target coverage and homogeneity relative to IMRT and MERT plans created using the same optimisation criteria, all the while preserving the normal tissue-sparing advantages of electron therapy. Adjusting the planning criteria to favour a specific modality in the sarcoma

  2. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  3. Socio-ecological impact of development schemes in the homelands of South Africa

    Energy Technology Data Exchange (ETDEWEB)

    de Wet, C. (Rhodes Univ., Grahamstown (South Africa))

    Development schemes in rural areas have a significant ecological impact as they often involve a reorganization of land-use and resource-utilization patterns. This reorganization is usually intended to have a positive ecological effect by combating erosion, promoting rational land-use patterns and using the potential of the area to best effect, thereby also providing economic benefits to the people living there. Often development schemes have the opposite effect - a negative ecological and economic impact as well as causing considerable social disruption, which in its turn has further negative ecological consequences. This paper looks at several kinds of development projects, seeking to understand why they have limited rather than increased ecological, economic and social options, and to what extent such negative effects can be avoided in future development projects in rural areas.

  4. Formalization of hydrocarbon conversion scheme of catalytic cracking for mathematical model development

    Science.gov (United States)

    Nazarova, G.; Ivashkina, E.; Ivanchina, E.; Kiseleva, S.; Stebeneva, V.

    2015-11-01

    The issue of improving the energy and resource efficiency of advanced petroleum processing can be solved by the development of adequate mathematical model based on physical and chemical regularities of process reactions with a high predictive potential in the advanced petroleum refining. In this work, the development of formalized hydrocarbon conversion scheme of catalytic cracking was performed using thermodynamic parameters of reaction defined by the Density Functional Theory. The list of reaction was compiled according to the results of feedstock structural-group composition definition, which was done by the n-d-m-method, the Hazelvuda method, qualitative composition of feedstock defined by gas chromatography-mass spectrometry and individual composition of catalytic cracking gasoline fraction. Formalized hydrocarbon conversion scheme of catalytic cracking will become the basis for the development of the catalytic cracking kinetic model.

  5. Assembly and offset assignment scheme for self-similar traffic in optical burst switched networks

    CSIR Research Space (South Africa)

    Muwonge, KB

    2007-10-01

    Full Text Available at the Label Edge Router (LER) to buffer traffic in the electronic domain. Burst assembly and offset assignment schemes are implemented in a complementary manner to improve QoS of an OBS network. The authors show that OBS network performance is directly related...

  6. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  7. Electronic Safety Resource Tools -- Supporting Hydrogen and Fuel Cell Commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Barilo, Nick F.

    2014-09-29

    The Pacific Northwest National Laboratory (PNNL) Hydrogen Safety Program conducted a planning session in Los Angeles, CA on April 1, 2014 to consider what electronic safety tools would benefit the next phase of hydrogen and fuel cell commercialization. A diverse, 20-person team led by an experienced facilitator considered the question as it applied to the eight most relevant user groups. The results and subsequent evaluation activities revealed several possible resource tools that could greatly benefit users. The tool identified as having the greatest potential for impact is a hydrogen safety portal, which can be the central location for integrating and disseminating safety information (including most of the tools identified in this report). Such a tool can provide credible and reliable information from a trustworthy source. Other impactful tools identified include a codes and standards wizard to guide users through a series of questions relating to application and specific features of the requirements; a scenario-based virtual reality training for first responders; peer networking tools to bring users from focused groups together to discuss and collaborate on hydrogen safety issues; and a focused tool for training inspectors. Table ES.1 provides results of the planning session, including proposed new tools and changes to existing tools.

  8. Encoding Schemes For A Digital Optical Multiplier Using The Modified Signed-Digit Number Representation

    Science.gov (United States)

    Lasher, Mark E.; Henderson, Thomas B.; Drake, Barry L.; Bocker, Richard P.

    1986-09-01

    The modified signed-digit (MSD) number representation offers full parallel, carry-free addition. A MSD adder has been described by the authors. This paper describes how the adder can be used in a tree structure to implement an optical multiply algorithm. Three different optical schemes, involving position, polarization, and intensity encoding, are proposed for realizing the trinary logic system. When configured in the generic multiplier architecture, these schemes yield the combinatorial logic necessary to carry out the multiplication algorithm. The optical systems are essentially three dimensional arrangements composed of modular units. Of course, this modularity is important for design considerations, while the parallelism and noninterfering communication channels of optical systems are important from the standpoint of reduced complexity. The authors have also designed electronic hardware to demonstrate and model the combinatorial logic required to carry out the algorithm. The electronic and proposed optical systems will be compared in terms of complexity and speed.

  9. Intelligent Aggregation Based on Content Routing Scheme for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jiachen Xu

    2017-10-01

    Full Text Available Cloud computing has emerged as today’s most exciting computing paradigm for providing services using a shared framework, which opens a new door for solving the problems of the explosive growth of digital resource demands and their corresponding convenience. With the exponential growth of the number of data types and data size in so-called big data work, the backbone network is under great pressure due to its transmission capacity, which is lower than the growth of the data size and would seriously hinder the development of the network without an effective approach to solve this problem. In this paper, an Intelligent Aggregation based on a Content Routing (IACR scheme for cloud computing, which could reduce the amount of data in the network effectively and play a basic supporting role in the development of cloud computing, is first put forward. All in all, the main innovations in this paper are: (1 A framework for intelligent aggregation based on content routing is proposed, which can support aggregation based content routing; (2 The proposed IACR scheme could effectively route the high aggregation ratio data to the data center through the same routing path so as to effectively reduce the amount of data that the network transmits. The theoretical analyses experiments and results show that, compared with the previous original routing scheme, the IACR scheme can balance the load of the whole network, reduce the amount of data transmitted in the network by 41.8%, and reduce the transmission time by 31.6% in the same network with a more balanced network load.

  10. Coordinated Scheme of Under-Frequency Load Shedding with Intelligent Appliances in a Cyber Physical Power System

    Directory of Open Access Journals (Sweden)

    Qi Wang

    2016-08-01

    Full Text Available The construction of a cyber physical system in a power grid provides more potential control strategies for the power grid. With the rapid employment of intelligent terminal equipment (e.g., smart meters and intelligent appliances in the environment of a smart grid, abundant dynamic response information could be introduced to support a secure and stable power system. Combining demand response technology with the traditional under-frequency load shedding (UFLS scheme, a new UFLS strategy-determining method involving intelligent appliances is put forward to achieve the coordinated control of quick response resources and the traditional control resources. Based on this method, intelligent appliances can be used to meet the regulatory requirements of system operation in advance and prevent significant frequency drop, thereby improving the flexibility and stability of the system. Time-domain simulation verifies the effectiveness of the scheme, which is able to mitigate frequency drop and reduce the amount of load shedding.

  11. EFFECTIVE ELECTRONIC TUTORIAL

    Directory of Open Access Journals (Sweden)

    Andrei A. Fedoseev

    2014-01-01

    Full Text Available The article analyzes effective electronic tutorials creation and application based on the theory of pedagogy. Herewith the issues of necessary electronic tutorial functional, ways of the educational process organization with the use of information and communication technologies and the logistics of electronic educational resources are touched upon. 

  12. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  13. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  14. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  15. Is a Multi-Hop Relay Scheme Gainful in an IEEE 802.22-Based Cognitive Radio System?

    Science.gov (United States)

    Shin, Jungchae; Lee, Dong-Kyu; Cho, Ho-Shin

    In this paper, we formulate a plan to operate multi-hop relays in IEEE 802.22-based cognitive radio (CR) systems and evaluate system performance to consider the propriety of a multi-hop relay scheme in CR systems. A centralized radio resource management and a simple deployment of relay stations (RSs) are assessed to make relay operations feasible under CR conditions. Simulation results show that the proposed multi-hop relay scheme significantly increases system throughput compared to a no-relay CR system as the incumbent user (IU) traffic gets heavier. Furthermore, the optimal number of hops can be determined given the traffic conditions.

  16. Quantum teleportation and entanglement swapping of electron spins in superconducting hybrid structures

    Energy Technology Data Exchange (ETDEWEB)

    Bubanja, Vladimir, E-mail: vladimir.bubanja@callaghaninnovation.govt.nz

    2015-06-15

    We present schemes for quantum teleportation and entanglement swapping of electronic spin states in hybrid superconductor–normal-metal systems. The proposed schemes employ subgap transport whereby the lowest order processes involve Cooper pair-electron and double Cooper-pair cotunneling in quantum teleportation and entanglement swapping protocols, respectively. The competition between elastic cotunneling and Cooper-pair splitting results in the success probability of 25% in both cases. Described implementations of these protocols are within reach of present-day experimental techniques.

  17. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    Science.gov (United States)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  18. A Collimation Scheme for Ions Changing Charge State in the LEIR Ring

    CERN Document Server

    Pasternak, Jaroslaw; Carli, Christian; Chanel, Michel; Mahner, Edgar

    2005-01-01

    Avalanche-like pressure rise and an associated decrease of the beam life-time, caused by (i) beam loss due to charge exchange interactions with rest gas molecules and (ii) electron capture from the electron beam of the electron cooler and (iii) ion impact induced outgassing, is a potential limitation for heavy ion accelerators. The vacuum system of the LEIR ring as to be upgraded to reach the dynamical vacuum pressure in the low 10-12 Torr range necessary to reach design performance. A collimation system to intercept lost ions by absorber blocks made of low beam-induced outgassing material will be installed. This paper reviews the collimation scheme and simulations of beam loss patterns around the ring.

  19. Multi-stage robust scheme for citrus identification from high resolution airborne images

    Science.gov (United States)

    Amorós-López, Julia; Izquierdo Verdiguier, Emma; Gómez-Chova, Luis; Muñoz-Marí, Jordi; Zoilo Rodríguez-Barreiro, Jorge; Camps-Valls, Gustavo; Calpe-Maravilla, Javier

    2008-10-01

    Identification of land cover types is one of the most critical activities in remote sensing. Nowadays, managing land resources by using remote sensing techniques is becoming a common procedure to speed up the process while reducing costs. However, data analysis procedures should satisfy the accuracy figures demanded by institutions and governments for further administrative actions. This paper presents a methodological scheme to update the citrus Geographical Information Systems (GIS) of the Comunidad Valenciana autonomous region, Spain). The proposed approach introduces a multi-stage automatic scheme to reduce visual photointerpretation and ground validation tasks. First, an object-oriented feature extraction process is carried out for each cadastral parcel from very high spatial resolution (VHR) images (0.5m) acquired in the visible and near infrared. Next, several automatic classifiers (decision trees, multilayer perceptron, and support vector machines) are trained and combined to improve the final accuracy of the results. The proposed strategy fulfills the high accuracy demanded by policy makers by means of combining automatic classification methods with visual photointerpretation available resources. A level of confidence based on the agreement between classifiers allows us an effective management by fixing the quantity of parcels to be reviewed. The proposed methodology can be applied to similar problems and applications.

  20. Game-Theoretic Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Network

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2018-01-01

    Full Text Available Device-to-Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.

  1. Performance analyses of a hybrid geothermal–fossil power generation system using low-enthalpy geothermal resources

    International Nuclear Information System (INIS)

    Liu, Qiang; Shang, Linlin; Duan, Yuanyuan

    2016-01-01

    Highlights: • Geothermal energy is used to preheat the feedwater in a coal-fired power unit. • The performance of a hybrid geothermal–fossil power generation system is analyzed. • Models for both parallel and serial geothermal preheating schemes are presented. • Effects of geothermal source temperatures, distances and heat losses are analyzed. • Power increase of the hybrid system over an ORC and tipping distance are discussed. - Abstract: Low-enthalpy geothermal heat can be efficiently utilized for feedwater preheating in coal-fired power plants by replacing some of the high-grade steam that can then be used to generate more power. This study analyzes a hybrid geothermal–fossil power generation system including a supercritical 1000 MW power unit and a geothermal feedwater preheating system. This study models for parallel and serial geothermal preheating schemes and analyzes the thermodynamic performance of the hybrid geothermal–fossil power generation system for various geothermal resource temperatures. The models are used to analyze the effects of the temperature matching between the geothermal water and the feedwater, the heat losses and pumping power during the geothermal water transport and the resource distance and temperature on the power increase to improve the power generation. The serial geothermal preheating (SGP) scheme generally generates more additional power than the parallel geothermal preheating (PGP) scheme for geothermal resource temperatures of 100–130 °C, but the SGP scheme generates slightly less additional power than the PGP scheme when the feedwater is preheated to as high a temperature as possible before entering the deaerator for geothermal resource temperatures higher than 140 °C. The additional power decreases as the geothermal source distance increases since the pipeline pumping power increases and the geothermal water temperature decreases due to heat losses. More than 50% of the power decrease is due to geothermal

  2. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  3. Effect of “Irkoy Gomni” Micro-credit scheme on Resource- Use in ...

    African Journals Online (AJOL)

    This study was carried out to ascertain whether credit obtained for cattle fattening has had any meaningful contribution to the resources used by the beneficiary farmers in Kollo LGA of Tillabery Region Niger Republic. One hundred loan beneficiary cattle fattening farmers were randomly selected out of a sampling frame of ...

  4. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  5. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  6. Resource development and the Mackenzie Valley Resource Management Act

    International Nuclear Information System (INIS)

    Donihee, J.

    1999-01-01

    Changes to the resource management regime of the Northwest Territories based on land claim agreements with native peoples which result from the Mackenzie Valley Resource Management Act are the result of commitments made by Canada during the negotiation of these land claims. This statute effects important changes to the legislative framework for environmental impact assessment and land and water management. It also establishes land use planning processes for the Gwich'in and Sahtu settlement areas and will result in an environmental and cumulative effects monitoring program for the Mackenzie Valley. The Act also establishes new institutions of public government responsible for environmental impact assessment, land and water management, and land use planning. These boards will play an internal and continuing role in resource development and management in the Mackenzie Valley. A brief overview is included of some features of the new legislative scheme, specifically focussing on environmental impact assessment and water management. An understanding of the new regime will be important for oil and gas companies that are looking north with renewed interest as a result of improved oil and gas prices and also for mining companies given the continuing interest in diamond exploration and development in the Northwest Territories. 29 refs

  7. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  8. The Benefits of Digital Pathology in the Assessment of HER2 ISH in a National External Quality Assessment Scheme.

    Directory of Open Access Journals (Sweden)

    Katherine Sheehan

    2016-06-01

    Due to the large number of participants enrolled in the UK NEQAS HER2 ISH scheme, it is not possible to provide each laboratory with a H&E-stained slide. Without a reference H&E-stained slide it can be difficult to clearly identify invasive tumour cells on an ISH-stained preparation increasing the chance of error in the assessment of HER2 gene status in tissue samples. However, with the technological advancement of digital pathology, it has been possible to provide UK NEQAS participants with a relevant H&E-stained slide of the tissue samples. In Conclusion, digital pathology has greatly facilitated the move from cell lines to breast cancer tissue samples for the UK NEQAS HER2 ISH module. Access to the digitized H&E-stained slides has enabled participants to quickly and more accurately visualize and pinpoint areas of invasive tumour. Our experience confirms the significant role for this electronic resource in EQA, education and continuing professional development.

  9. Preference and Use of Electronic Information and Resources by Blind/Visually Impaired in NCR Libraries in India

    Directory of Open Access Journals (Sweden)

    Shailendra Kumar

    2013-06-01

    Full Text Available This paper aims to determine the preference and use of electronic information and resources by blind/visually impaired users in the leading National Capital Region (NCR libraries of India. Survey methodology has been used as the basic research tool for data collection with the help of questionnaires. The 125 in total users surveyed in all the five libraries were selected randomly on the basis of willingness of the users with experience of working in digital environments to participate in the survey. The survey results were tabulated and analyzed with descriptive statistics methods using Excel software and 'Stata version 11'. The findings reveal that ICT have a positive impact in the lives of people with disabilities as it helps them to work independently and increases the level of confidence among them. The Internet is the most preferred medium of access to information among the majority of blind/visually impaired users. The 'Complexity of content available on the net' is found as the major challenge faced during Internet use by blind users of NCR libraries. 'Audio books on CDs/DVDs and DAISY books' are the most preferred electronic resources among the majority of blind/visually impaired users. This study will help the library professionals and organizations/institutions serving people with disabilities to develop effective library services for blind/visually impaired users in the digital environment on the basis of findings on information usage behavior in the study.

  10. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  11. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.

    Science.gov (United States)

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-07-05

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.

  12. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2016-07-01

    Full Text Available With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.

  13. Universal health coverage in Latin American countries: how to improve solidarity-based schemes.

    Science.gov (United States)

    Titelman, Daniel; Cetrángolo, Oscar; Acosta, Olga Lucía

    2015-04-04

    In this Health Policy we examine the association between the financing structure of health systems and universal health coverage. Latin American health systems encompass a wide range of financial sources, which translate into different solidarity-based schemes that combine contributory (payroll taxes) and non-contributory (general taxes) sources of financing. To move towards universal health coverage, solidarity-based schemes must heavily rely on countries' capacity to increase public expenditure in health. Improvement of solidarity-based schemes will need the expansion of mandatory universal insurance systems and strengthening of the public sector including increased fiscal expenditure. These actions demand a new model to integrate different sources of health-sector financing, including general tax revenue, social security contributions, and private expenditure. The extent of integration achieved among these sources will be the main determinant of solidarity and universal health coverage. The basic challenges for improvement of universal health coverage are not only to spend more on health, but also to reduce the proportion of out-of-pocket spending, which will need increased fiscal resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Adaptation of failure scenario based resilience schemes toward availability guarantees

    Science.gov (United States)

    Scheffel, Matthias

    2006-07-01

    Various resilience schemes have been proposed to allow for fault-tolerant transport networks. Their common aim is to survive certain failure patterns such as node or span failures by providing alternative transmission paths. However, network operators guarantee the resulting network reliability in terms of service availability to their business customers. A maximum duration of service disruption per year must not be exceeded. We investigate an optimal design of resilient network configurations that adapts to end-to-end availability requirements. We formulate an integer linear program that minimizes the resource utilization and investigate a case study.

  15. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  16. Modified Monte Carlo method for study of electron transport in degenerate electron gas in the presence of electron–electron interactions, application to graphene

    International Nuclear Information System (INIS)

    Borowik, Piotr; Thobel, Jean-Luc; Adamowicz, Leszek

    2017-01-01

    Standard computational methods used to take account of the Pauli Exclusion Principle into Monte Carlo (MC) simulations of electron transport in semiconductors may give unphysical results in low field regime, where obtained electron distribution function takes values exceeding unity. Modified algorithms were already proposed and allow to correctly account for electron scattering on phonons or impurities. Present paper extends this approach and proposes improved simulation scheme allowing including Pauli exclusion principle for electron–electron (e–e) scattering into MC simulations. Simulations with significantly reduced computational cost recreate correct values of the electron distribution function. Proposed algorithm is applied to study transport properties of degenerate electrons in graphene with e–e interactions. This required adapting the treatment of e–e scattering in the case of linear band dispersion relation. Hence, this part of the simulation algorithm is described in details.

  17. Modified Monte Carlo method for study of electron transport in degenerate electron gas in the presence of electron–electron interactions, application to graphene

    Energy Technology Data Exchange (ETDEWEB)

    Borowik, Piotr, E-mail: pborow@poczta.onet.pl [Warsaw University of Technology, Faculty of Physics, ul. Koszykowa 75, 00-662 Warszawa (Poland); Thobel, Jean-Luc, E-mail: jean-luc.thobel@iemn.univ-lille1.fr [Institut d' Electronique, de Microélectronique et de Nanotechnologies, UMR CNRS 8520, Université Lille 1, Avenue Poincaré, CS 60069, 59652 Villeneuve d' Ascq Cédex (France); Adamowicz, Leszek, E-mail: adamo@if.pw.edu.pl [Warsaw University of Technology, Faculty of Physics, ul. Koszykowa 75, 00-662 Warszawa (Poland)

    2017-07-15

    Standard computational methods used to take account of the Pauli Exclusion Principle into Monte Carlo (MC) simulations of electron transport in semiconductors may give unphysical results in low field regime, where obtained electron distribution function takes values exceeding unity. Modified algorithms were already proposed and allow to correctly account for electron scattering on phonons or impurities. Present paper extends this approach and proposes improved simulation scheme allowing including Pauli exclusion principle for electron–electron (e–e) scattering into MC simulations. Simulations with significantly reduced computational cost recreate correct values of the electron distribution function. Proposed algorithm is applied to study transport properties of degenerate electrons in graphene with e–e interactions. This required adapting the treatment of e–e scattering in the case of linear band dispersion relation. Hence, this part of the simulation algorithm is described in details.

  18. The Adoption and Diffusion of Electronic Wallets

    OpenAIRE

    Jean-Michel Sahut

    2008-01-01

    Despite the strong and consistent increase in the use of electronic payment methods worldwide, the diffusion of electronic wallets is still far from widespread. Analysis of the failure of electronic wallet uptake has either focused on technical issues or chosen to analyse a specific scheme. This article proposes a joint approach to analysing key factors affecting the adoption of e-wallets by using the 'Technology Acceptance Model" [1] which we have expanded to take into a...

  19. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.

    Science.gov (United States)

    Wu, Yilun; Lu, Xicheng; Su, Jinshu; Chen, Peixin

    2016-12-01

    Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.

  20. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    Science.gov (United States)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.