WorldWideScience

Sample records for schemes index terms

  1. The 3D Elevation Program national indexing scheme

    Science.gov (United States)

    Thatcher, Cindy A.; Heidemann, Hans Karl; Stoker, Jason M.; Eldridge, Diane F.

    2017-11-02

    The 3D Elevation Program (3DEP) of the U.S. Geological Survey (USGS) acquires high-resolution elevation data for the Nation. This program has been operating under an opportunity-oriented approach, acquiring light detection and ranging (lidar) projects of varying sizes scattered across the United States. As a result, the national 3DEP elevation layer is subject to data gaps or unnecessary overlap between adjacent collections. To mitigate this problem, 3DEP is adopting a strategic, systematic approach to national data acquisition that will create efficiencies in efforts to achieve nationwide elevation data coverage and help capture additional Federal and non-Federal investments resulting from advance awareness of proposed acquisitions and partnership opportunities. The 3DEP Working Group, an interagency group managed by the USGS, has agreed that all future 3DEP collections within the lower 48 States should be coordinated by using a 1-kilometer by 1-kilometer tiling scheme for the conterminous United States. Fiscal Year 2018 is being considered a transition year, and in Fiscal Year 2019 the national indexing scheme will be fully implemented, so that all 3DEP-supported projects will be acquired and delivered in the national indexing scheme and projected into the Albers Equal Area projection. 

  2. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  3. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  4. A Comparison of Global Indexing Schemes to Facilitate Earth Science Data Management

    Science.gov (United States)

    Griessbaum, N.; Frew, J.; Rilee, M. L.; Kuo, K. S.

    2017-12-01

    Recent advances in database technology have led to systems optimized for managing petabyte-scale multidimensional arrays. These array databases are a good fit for subsets of the Earth's surface that can be projected into a rectangular coordinate system with acceptable geometric fidelity. However, for global analyses, array databases must address the same distortions and discontinuities that apply to map projections in general. The array database SciDB supports enormous databases spread across thousands of computing nodes. Additionally, the following SciDB characteristics are particularly germane to the coordinate system problem: SciDB efficiently stores and manipulates sparse (i.e. mostly empty) arrays. SciDB arrays have 64-bit indexes. SciDB supports user-defined data types, functions, and operators. We have implemented two geospatial indexing schemes in SciDB. The simplest uses two array dimensions to represent longitude and latitude. For representation as 64-bit integers, the coordinates are multiplied by a scale factor large enough to yield an appropriate Earth surface resolution (e.g., a scale factor of 100,000 yields a resolution of approximately 1m at the equator). Aside from the longitudinal discontinuity, the principal disadvantage of this scheme is its fixed scale factor. The second scheme uses a single array dimension to represent the bit-codes for locations in a hierarchical triangular mesh (HTM) coordinate system. A HTM maps the Earth's surface onto an octahedron, and then recursively subdivides each triangular face to the desired resolution. Earth surface locations are represented as the concatenation of an octahedron face code and a quadtree code within the face. Unlike our integerized lat-lon scheme, the HTM allow for objects of different size (e.g., pixels with differing resolutions) to be represented in the same indexing scheme. We present an evaluation of the relative utility of these two schemes for managing and analyzing MODIS swath data.

  5. Short-term incentive schemes for hospital managers

    Directory of Open Access Journals (Sweden)

    Lucas Malambe

    2013-10-01

    Full Text Available Orientation: Short-term incentives, considered to be an extrinsic motivation, are commonly used to motivate performance. This study explored hospital managers’ perceptions of short term incentives in maximising performance and retention. Research purpose: The study explored the experiences, views and perceptions of private hospital managers in South Africa regarding the use of short-term incentives to maximise performance and retention, as well as the applicability of the findings to public hospitals. Motivation for the study: Whilst there is an established link between performance reward schemes and organisational performance, there is little understanding of the effects of short term incentives on the performance and retention of hospital managers within the South African context. Research design, approach, and method: The study used a qualitative research design: interviews were conducted with a purposive sample of 19 hospital managers, and a thematic content analysis was performed. Main findings: Short-term incentives may not be the primary motivator for hospital managers, but they do play a critical role in sustaining motivation. Participants indicated that these schemes could also be applicable to public hospitals. Practical/managerial implications: Hospital managers are inclined to be more motivated by intrinsic than extrinsic factors. However, hospital managers (as middle managers also seem to be motivated by short-term incentives. A combination of intrinsic and extrinsic motivators should thus be used to maximise performance and retention. Contribution/value-add: Whilst the study sought to explore hospital managers’ perceptions of short-term incentives, it also found that an adequate balance between internal and external motivators is key to implementing an effective short-term incentive scheme.

  6. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  7. Quality Index Method (QIM) scheme developed for farmed Atlantic salmon ( Salmo salar )

    DEFF Research Database (Denmark)

    Sveinsdóttir, K.; Hyldig, Grethe; Martinsdóttir, E.

    2003-01-01

    The aim of the study was to develop 'Quality Index Method (QIM) scheme for raw, farmed Atlantic salmon (Salmo salar) and to evaluate the scheme. in a shelf life study. QIM is based on the evaluation of key parameters in the deterioration of seafood's. Demerit points are assigned to selected...... parameters according to their importance and a Quality Index (QI) is established by cumulating the resulting scores. The maximum storage time in ice was determined with Quantitative Descriptive Analysis (QDA) of the salmon after cooking and found to be 20-21 days. This was used as a reference to enable...... prediction of the remaining storage time of raw salmon in ice with QIM. The calculated QI evolved linearly with storage time in ice (QI=0.82x (days in ice)+0.18, R-2=0.97). Individual salmon varied in QI within each storage day. However, the multivariate analysis (PLS1) demonstrated that storage time could...

  8. A Comparative Evaluation of the Thesaurus of Engineering and Scientific Terms and the DDC Retrieval and Indexing Terminology.

    Science.gov (United States)

    1977-11-01

    classificaLion schemes such as UDC, the Dewey Decimal Classification, Ranganathon’sColon Classifica- S tion, the Bliss Bibliographic Classification...UNLIMITED!IBIR-4J1 * : . C)" A COMPARATIVE EVALUATION OF THE THESAURUS OF, SAENGINEERING AND SCIENTIFIC TERMS AND THE DDC RETRIEVAL AND INDEXING...f cce7,i on For TER1 AND THE DDC RETRIEVAL AND A--" o " INDEXING TERMINOLOGY NTIS - * ByD , 2 _jDitr" : i :/ _ _ . _Av: "jl r " 1 t v Codes

  9. Index-based reactive power compensation scheme for voltage regulation

    Science.gov (United States)

    Dike, Damian Obioma

    2008-10-01

    Increasing demand for electrical power arising from deregulation and the restrictions posed to the construction of new transmission lines by environment, socioeconomic, and political issues had led to higher grid loading. Consequently, voltage instability has become a major concern, and reactive power support is vital to enhance transmission grid performance. Improved reactive power support to distressed grid is possible through the application of relatively unfamiliar emerging technologies of "Flexible AC Transmission Systems (FACTS)" devices and "Distributed Energy Resources (DERS)." In addition to these infrastructure issues, a lack of situational awareness by system operators can cause major power outages as evidenced by the August 14, 2003 widespread North American blackout. This and many other recent major outages have highlighted the inadequacies of existing power system indexes. In this work, a novel "Index-based reactive compensation scheme" appropriate for both on-line and off-line computation of grid status has been developed. A new voltage stability index (Ls-index) suitable for long transmission lines was developed, simulated, and compared to the existing two-machine modeled L-index. This showed the effect of long distance power wheeling amongst regional transmission organizations. The dissertation further provided models for index modulated voltage source converters (VSC) and index-based load flow analysis of both FACTS and microgrid interconnected power systems using the Newton-Raphson's load flow model incorporated with multi-FACTS devices. The developed package has been made user-friendly through the embodiment of interactive graphical user interface and implemented on the IEEE 14, 30, and 300 bus systems. The results showed reactive compensation has system wide-effect, provided readily accessible system status indicators, ensured seamless DERs interconnection through new islanding modes and enhanced VSC utilization. These outcomes may contribute

  10. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  11. Design and evaluation of sparse quantization index modulation watermarking schemes

    Science.gov (United States)

    Cornelis, Bruno; Barbarien, Joeri; Dooms, Ann; Munteanu, Adrian; Cornelis, Jan; Schelkens, Peter

    2008-08-01

    In the past decade the use of digital data has increased significantly. The advantages of digital data are, amongst others, easy editing, fast, cheap and cross-platform distribution and compact storage. The most crucial disadvantages are the unauthorized copying and copyright issues, by which authors and license holders can suffer considerable financial losses. Many inexpensive methods are readily available for editing digital data and, unlike analog information, the reproduction in the digital case is simple and robust. Hence, there is great interest in developing technology that helps to protect the integrity of a digital work and the copyrights of its owners. Watermarking, which is the embedding of a signal (known as the watermark) into the original digital data, is one method that has been proposed for the protection of digital media elements such as audio, video and images. In this article, we examine watermarking schemes for still images, based on selective quantization of the coefficients of a wavelet transformed image, i.e. sparse quantization-index modulation (QIM) watermarking. Different grouping schemes for the wavelet coefficients are evaluated and experimentally verified for robustness against several attacks. Wavelet tree-based grouping schemes yield a slightly improved performance over block-based grouping schemes. Additionally, the impact of the deployment of error correction codes on the most promising configurations is examined. The utilization of BCH-codes (Bose, Ray-Chaudhuri, Hocquenghem) results in an improved robustness as long as the capacity of the error codes is not exceeded (cliff-effect).

  12. Enhancing the Extreme Climate Index (ECI) to monitor climate extremes for an index-based insurance scheme across Africa

    Science.gov (United States)

    Helmschrot, J.; Malherbe, J.; Chamunorwa, M.; Muthige, M.; Petitta, M.; Calmanti, S.; Cucchi, M.; Syroka, J.; Iyahen, E.; Engelbrecht, F.

    2017-12-01

    Climate services are a key component of National Adaptation Plan (NAP) processes, which require the analysis of current climate conditions, future climate change scenarios and the identification of adaptation strategies, including the capacity to finance and implement effective adaptation options. The Extreme Climate Facility (XCF) proposed by the African Risk Capacity (ARC) developed a climate index insurance scheme, which is based on the Extreme Climate Index (ECI): an objective, multi-hazard index capable of tracking changes in the frequency or magnitude of extreme weather events, thus indicating possible shifts to a new climate regime in various regions. The main hazards covered by ECI are extreme dry, wet and heat events, with the possibility of adding other region-specific risk events. The ECI is standardized across broad geographical regions, so that extreme events occurring under different climatic regimes in Africa can be compared. Initially developed by an Italian company specialized in Climate Services, research is now conducted at the CSIR and SASSCAL, to verify and further develop the ECI for application in southern African countries, through a project initiated by the World Food Programme (WFP) and ARC. The paper will present findings on the most appropriate definitions of extremely wet and dry conditions in Africa, in terms of their impact across a multitude of sub-regional climates of the African continent. Findings of a verification analysis of the ECI, as determined through vegetation monitoring data and the SASSCAL weather station network will be discussed. Changes in the ECI under climate change will subsequently be projected, using detailed regional projections generated by the CSIR and through the Coordinated Regional Downscaling Experiment (CORDEX). This work will be concluded by the development of a web-based climate service informing African Stakeholders on climate extremes.

  13. Finite volume schemes with equilibrium type discretization of source terms for scalar conservation laws

    International Nuclear Information System (INIS)

    Botchorishvili, Ramaz; Pironneau, Olivier

    2003-01-01

    We develop here a new class of finite volume schemes on unstructured meshes for scalar conservation laws with stiff source terms. The schemes are of equilibrium type, hence with uniform bounds on approximate solutions, valid in cell entropy inequalities and exact for some equilibrium states. Convergence is investigated in the framework of kinetic schemes. Numerical tests show high computational efficiency and a significant advantage over standard cell centered discretization of source terms. Equilibrium type schemes produce accurate results even on test problems for which the standard approach fails. For some numerical tests they exhibit exponential type convergence rate. In two of our numerical tests an equilibrium type scheme with 441 nodes on a triangular mesh is more accurate than a standard scheme with 5000 2 grid points

  14. Performance comparison of different graylevel image fusion schemes through a universal image quality index

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.

    2003-01-01

    We applied a recently introduced universal image quality index Q that quantifies the distortion of a processed image relative to its original version, to assess the performance of different graylevel image fusion schemes. The method is as follows. First, we adopt an original test image as the

  15. How are pharmaceutical patent term extensions justified? Australia's evolving scheme.

    Science.gov (United States)

    Lawson, Charles

    2013-12-01

    This article examines the evolving patent term extension schemes under the Patents Act 1903 (Cth), the Patents Act 1952 (Cth) and the Patents Act 1990 (Cth). The analysis traces the change from "inadequate remuneration" to a scheme directed specifically at certain pharmaceuticals. An examination of the policy justification shows there are legitimate questions about the desirability of any extension. The article concludes that key information provisions in the Patents Act 1990 (Cth) that might assist a better policy analysis are presently not working and that any justification needs evidence demonstrating that the benefits of patent term extensions to the community as a whole outweigh the costs and that the objectives of extensions can only be achieved by restricting competition.

  16. Spectral collocation method with a flexible angular discretization scheme for radiative transfer in multi-layer graded index medium

    Science.gov (United States)

    Wei, Linyang; Qi, Hong; Sun, Jianping; Ren, Yatao; Ruan, Liming

    2017-05-01

    The spectral collocation method (SCM) is employed to solve the radiative transfer in multi-layer semitransparent medium with graded index. A new flexible angular discretization scheme is employed to discretize the solid angle domain freely to overcome the limit of the number of discrete radiative direction when adopting traditional SN discrete ordinate scheme. Three radial basis function interpolation approaches, named as multi-quadric (MQ), inverse multi-quadric (IMQ) and inverse quadratic (IQ) interpolation, are employed to couple the radiative intensity at the interface between two adjacent layers and numerical experiments show that MQ interpolation has the highest accuracy and best stability. Variable radiative transfer problems in double-layer semitransparent media with different thermophysical properties are investigated and the influence of these thermophysical properties on the radiative transfer procedure in double-layer semitransparent media is also analyzed. All the simulated results show that the present SCM with the new angular discretization scheme can predict the radiative transfer in multi-layer semitransparent medium with graded index efficiently and accurately.

  17. Systems-based decomposition schemes for the approximate solution of multi-term fractional differential equations

    Science.gov (United States)

    Ford, Neville J.; Connolly, Joseph A.

    2009-07-01

    We give a comparison of the efficiency of three alternative decomposition schemes for the approximate solution of multi-term fractional differential equations using the Caputo form of the fractional derivative. The schemes we compare are based on conversion of the original problem into a system of equations. We review alternative approaches and consider how the most appropriate numerical scheme may be chosen to solve a particular equation.

  18. Assessment of hybrid rotation-translation scan schemes for in vivo animal SPECT imaging

    International Nuclear Information System (INIS)

    Xia Yan; Liu Yaqiang; Wang Shi; Ma Tianyu; Yao Rutao; Deng Xiao

    2013-01-01

    To perform in vivo animal single photon emission computed tomography imaging on a stationary detector gantry, we introduced a hybrid rotation-translation (HRT) tomographic scan, a combination of translational and limited angle rotational movements of the image object, to minimize gravity-induced animal motion. To quantitatively assess the performance of ten HRT scan schemes and the conventional rotation-only scan scheme, two simulated phantoms were first scanned with each scheme to derive the corresponding image resolution (IR) in the image field of view. The IR results of all the scan schemes were visually assessed and compared with corresponding outputs of four scan scheme evaluation indices, i.e. sampling completeness (SC), sensitivity (S), conventional system resolution (SR), and a newly devised directional spatial resolution (DR) that measures the resolution in any specified orientation. A representative HRT scheme was tested with an experimental phantom study. Eight of the ten HRT scan schemes evaluated achieved a superior performance compared to two other HRT schemes and the rotation-only scheme in terms of phantom image resolution. The same eight HRT scan schemes also achieved equivalent or better performance in terms of the four quantitative indices than the conventional rotation-only scheme. As compared to the conventional index SR, the new index DR appears to be a more relevant indicator of system resolution performance. The experimental phantom image obtained from the selected HRT scheme was satisfactory. We conclude that it is feasible to perform in vivo animal imaging with a HRT scan scheme and SC and DR are useful predictors for quantitatively assessing the performance of a scan scheme. (paper)

  19. A well-balanced scheme for Ten-Moment Gaussian closure equations with source term

    Science.gov (United States)

    Meena, Asha Kumari; Kumar, Harish

    2018-02-01

    In this article, we consider the Ten-Moment equations with source term, which occurs in many applications related to plasma flows. We present a well-balanced second-order finite volume scheme. The scheme is well-balanced for general equation of state, provided we can write the hydrostatic solution as a function of the space variables. This is achieved by combining hydrostatic reconstruction with contact preserving, consistent numerical flux, and appropriate source discretization. Several numerical experiments are presented to demonstrate the well-balanced property and resulting accuracy of the proposed scheme.

  20. Expert opinion on risks to the long-term viability of residential recycled water schemes: An Australian study.

    Science.gov (United States)

    West, Camilla; Kenway, Steven; Hassall, Maureen; Yuan, Zhiguo

    2017-09-01

    The water sector needs to make efficient and prudent investment decisions by carefully considering the long-term viability of water infrastructure projects. To support the assessment and planning of residential recycled water schemes in Australia, we have sought to clarify scheme objectives and to further define the array of critical risks that can impact the long-term viability of schemes. Building on historical information, we conducted a national survey which elicited responses from 88 Australian expert practitioners, of which 64% have over 10 years of industry experience and 42% have experience with more than five residential recycled water schemes. On the basis of expert opinion, residential recycled water schemes are considered to be highly relevant for diversifying and improving water supply security, reducing wastewater effluent discharge and pollutant load to waterways and contributing to sustainable urban development. At present however, the inability to demonstrate an incontestable business case is posing a significant risk to the long-term viability of residential recycled water schemes. Political, regulatory, organisational and financial factors were also rated as critical risks, in addition to community risk perception and fall in demand. The survey results shed further light on the regulatory environment of residential recycled water schemes, with regulatory participants rating the level and impact of risk factors higher than other survey participants in most cases. The research outcomes provide a comprehensive understanding of the critical risks to the long-term viability of residential recycled water schemes, thereby enabling the specification of targeted risk management measures at the assessment and planning stage of a scheme. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Environmental evaluation of agri-environment schemes using participatory approaches: Experiences of testing the Agri-Environmental Footprint Index

    DEFF Research Database (Denmark)

    Mauchline, Alice L.; Mortimer, Simon R.; Park, Julian P.

    2012-01-01

    The Agri-Environment Footprint Index (AFI) has been developed as a generic methodology to assess changes in the overall environmental impacts from agriculture at the farm level and to assist in the evaluation of European agri-environmental schemes (AES). The methodology is based on multi-criteria......The Agri-Environment Footprint Index (AFI) has been developed as a generic methodology to assess changes in the overall environmental impacts from agriculture at the farm level and to assist in the evaluation of European agri-environmental schemes (AES). The methodology is based on multi......-criteria analysis (MCA) and involves stakeholder participation to provide a locally customised evaluation based on weighted environmental indicators. The methodology was subjected to a feasibility assessment in a series of case studies across the EU. The AFI approach was able to measure significant differences....... The applicability of the AFI in routine monitoring of AES impacts and in providing feedback to improve policy design is discussed....

  2. A Heuristic Hierarchical Scheme for Academic Search and Retrieval

    DEFF Research Database (Denmark)

    Amolochitis, Emmanouil; Christou, Ioannis T.; Tan, Zheng-Hua

    2013-01-01

    and a graph-theoretic computed score that relates the paper’s index terms with each other. We designed and developed a meta-search engine that submits user queries to standard digital repositories of academic publications and re-ranks the repository results using the hierarchical heuristic scheme. We evaluate......, and by more than 907.5% in terms of LEX. We also re-rank the top-10 results of a subset of the original 58 user queries produced by Google Scholar, Microsoft Academic Search, and ArnetMiner; the results show that PubSearch compares very well against these search engines as well. The proposed scheme can...... be easily plugged in any existing search engine for retrieval of academic publications....

  3. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  4. Long-term hemispheric variation of the flare index

    International Nuclear Information System (INIS)

    Feng Song; Deng Lin-Hua; Xu Shi-Chun

    2013-01-01

    The long-term hemispheric variation of the flare index is investigated. It is found that, (1) the phase difference of the flare index between the northern and southern hemispheres is about 6–7 months, which is near the time delay between flare activity and sunspot activity; (2) both the dominant and phase-leading hemisphere of the flare index is the northern hemisphere in the considered time interval, implying that the hemispheric asynchrony of solar activity has a close connection with the N-S asymmetry of solar activity. (research papers)

  5. PKIS: practical keyword index search on cloud datacenter

    Directory of Open Access Journals (Sweden)

    Park Jae Hyun

    2011-01-01

    Full Text Available Abstract This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches--efficiency and group search in cloud datacenter. The process of this paper is as follows: first, we create two schemes of efficiency and group search--practical keyword index search--I and II; second, we define and analyze group search secrecy and keyword index search privacy in our schemes; third, we experiment on efficient performances over our proposed encrypted DB. As the result, we summarize two major results: (1our proposed schemes can support a secure group search without re-encrypting all documents under the group-key update and (2our experiments represent that our scheme is approximately 935 times faster than Golle's scheme and about 16 times faster than Song's scheme for 10,000 documents. Based on our experiments and results, this paper has the following contributions: (1 in the current cloud computing environments, our schemes provide practical, realistic, and secure solutions over the encrypted DB and (2 this paper identifies the importance of interoperability with database management system for designing efficient schemes.

  6. The two normalization schemes of factorial moments in high energy collisions and the dependence intermittency degree on average transverse momentum

    International Nuclear Information System (INIS)

    Wu Yuanfnag; Liu Lianshou

    1992-01-01

    The two different normalization scheme of factorial moments are analyzed carefully. It is found that in both the cases of fixed multiplicity and of intermittency independent of multiplicity, the intermittency indexes obtained from these two normalization schemes are equal to each other. In the case of non-fixed multiplicity and intermittency depending on multiplicity, the formulae expressing the intermittency indexes from the two different normalization schemes in terms of the dynamical index are given. The experimentally observed dependency of intermittency degree on transverse momentum cut is fully recovered by means of the assumption that intermittency degree depends on average transverse momentum per event. It confirms importance of the dependency of intermittency on average momentum

  7. Assessing long-term sustainable environmental impacts of agri-environment schemes on land use

    DEFF Research Database (Denmark)

    Vesterager, Jens Peter; Teilmann, Kasper Aalling; Vejre, Henrik

    2012-01-01

    , and indicators of the environmental state at farm level. In a Danish test case, agricultural practices at twenty-five farms in two groundwater protection zones were assessed. Data was collected from databases, registers, maps and interviews with farmers. The index was calculated for 1996/7 and 2006/7 to track......The lack of generic methods to assess the environmental consequences of agricultural practices and the lack of consensus on monitoring and evaluation of environmental, agricultural and socio-economic effects of agri-environment schemes (AES) in EU Member States call for better evaluation methods....... It is important to consider the robustness of each indicator: to assess whether changes will occur over time; whether changes are linked to management practices or external factors; and whether data are available up to date. Indicators dependent upon uptake data from agri-environmental schemes should be used...

  8. CHex: An Efficient RDF Storage and Indexing Scheme for Column-Oriented Databases

    OpenAIRE

    Xin Wang; Shuyi Wang; Pufeng Du; Zhiyong Feng

    2011-01-01

    As increasingly large RDF data sets are being published on the Web, effcient RDF data management has become an essential factor in realizing the Semantic Web vision. However, most existing RDF storage schemes, which are built on top of row-store relational databases, are constrained in terms of efficiency and scalability. Still, the growing popularity of the RDF format used in real-world applications arguably calls for an effort to deal with these drawbacks. In this paper, we propose a novel ...

  9. Fourth order Douglas implicit scheme for solving three dimension reaction diffusion equation with non-linear source term

    Science.gov (United States)

    Hasnain, Shahid; Saqib, Muhammad; Mashat, Daoud Suleiman

    2017-07-01

    This research paper represents a numerical approximation to non-linear three dimension reaction diffusion equation with non-linear source term from population genetics. Since various initial and boundary value problems exist in three dimension reaction diffusion phenomena, which are studied numerically by different numerical methods, here we use finite difference schemes (Alternating Direction Implicit and Fourth Order Douglas Implicit) to approximate the solution. Accuracy is studied in term of L2, L∞ and relative error norms by random selected grids along time levels for comparison with analytical results. The test example demonstrates the accuracy, efficiency and versatility of the proposed schemes. Numerical results showed that Fourth Order Douglas Implicit scheme is very efficient and reliable for solving 3-D non-linear reaction diffusion equation.

  10. Fourth order Douglas implicit scheme for solving three dimension reaction diffusion equation with non-linear source term

    Directory of Open Access Journals (Sweden)

    Shahid Hasnain

    2017-07-01

    Full Text Available This research paper represents a numerical approximation to non-linear three dimension reaction diffusion equation with non-linear source term from population genetics. Since various initial and boundary value problems exist in three dimension reaction diffusion phenomena, which are studied numerically by different numerical methods, here we use finite difference schemes (Alternating Direction Implicit and Fourth Order Douglas Implicit to approximate the solution. Accuracy is studied in term of L2, L∞ and relative error norms by random selected grids along time levels for comparison with analytical results. The test example demonstrates the accuracy, efficiency and versatility of the proposed schemes. Numerical results showed that Fourth Order Douglas Implicit scheme is very efficient and reliable for solving 3-D non-linear reaction diffusion equation.

  11. Payment schemes and cost efficiency: evidence from Swiss public hospitals.

    Science.gov (United States)

    Meyer, Stefan

    2015-03-01

    This paper aims at analysing the impact of prospective payment schemes on cost efficiency of acute care hospitals in Switzerland. We study a panel of 121 public hospitals subject to one of four payment schemes. While several hospitals are still reimbursed on a per diem basis for the treatment of patients, most face flat per-case rates-or mixed schemes, which combine both elements of reimbursement. Thus, unlike previous studies, we are able to simultaneously analyse and isolate the cost-efficiency effects of different payment schemes. By means of stochastic frontier analysis, we first estimate a hospital cost frontier. Using the two-stage approach proposed by Battese and Coelli (Empir Econ 20:325-332, 1995), we then analyse the impact of these payment schemes on the cost efficiency of hospitals. Controlling for hospital characteristics, local market conditions in the 26 Swiss states (cantons), and a time trend, we show that, compared to per diem, hospitals which are reimbursed by flat payment schemes perform better in terms of cost efficiency. Our results suggest that mixed schemes create incentives for cost containment as well, although to a lesser extent. In addition, our findings indicate that cost-efficient hospitals are primarily located in cantons with competitive markets, as measured by the Herfindahl-Hirschman index in inpatient care. Furthermore, our econometric model shows that we obtain biased estimates from frontier analysis if we do not account for heteroscedasticity in the inefficiency term.

  12. Mid-term periodicities and heliospheric modulation of coronal index ...

    Indian Academy of Sciences (India)

    PRITHVI RAJ SINGH

    2018-03-06

    Mar 6, 2018 ... long-term periodicity of ∼11 years, with different solar activities. The physical processes that occur inside the. Sun are reflected by a periodic character in terms of coronal index of coronal emission (Fe XIV 530.3 nm) during solar activity cycles. Recently, a link between the strength of photospheric magnetic ...

  13. Semi-passive, Chemical Oxidation Schemes for the Long-term Treatment of Contaminants

    Energy Technology Data Exchange (ETDEWEB)

    Frank W. Schwartz

    2005-12-13

    This research involves a combined experimental and modeling study that builds on our previous DOE-sponsored work in investigating how KMnO{sub 4} can be better used with in situ remediation of groundwater contaminated by chlorinated ethylenes (e.g., PCE, TCE, DCE). This study aims to provide scientific basis for developing a new long-term, semi-passive ISCO scheme that uses controlled release KMnO{sub 4} as a reactive barrier component. Specific objectives of the study are (1) to construct controlled release KMnO{sub 4} as a new reactive barrier component that could deliver permanganate at a controlled rate over long time periods of years, (2) to quantitatively describe release mechanisms associated with the controlled release KMnO{sub 4}, (3) to demonstrate efficacy of the new remediation scheme using proof-of-concept experiments, and (4) to design advanced forms of controlled release systems through numerical optimization. The new scheme operates in a long-term, semi-passive manner to control spreading of a dissolved contaminant plume with periodic replacement of the controlled release KMnO{sub 4} installed in the subsurface. As a first step in developing this remedial concept, we manufactured various prototype controlled release KMnO{sub 4} forms. Then we demonstrated using column experiments that the controlled release KMnO{sub 4} could deliver small amount of permanganate into flowing water at controlled rates over long time periods of years. An analytical model was also used to estimate the diffusivities and durations of the controlled release KMnO{sub 4}. Finally, proof-of-concept flow-tank experiments were performed to demonstrate the efficacy of the controlled release KMnO{sub 4} scheme in controlling dissolved TCE plume in a long-term, semi-passive manner. Another important thrust of our research effort involved numerical optimization of controlled release systems. This study used a numerical model that is capable of describing release patterns of active

  14. The refractive index in electron microscopy and the errors of its approximations

    Energy Technology Data Exchange (ETDEWEB)

    Lentzen, M.

    2017-05-15

    In numerical calculations for electron diffraction often a simplified form of the electron-optical refractive index, linear in the electric potential, is used. In recent years improved calculation schemes have been proposed, aiming at higher accuracy by including higher-order terms of the electric potential. These schemes start from the relativistically corrected Schrödinger equation, and use a second simplified form, now for the refractive index squared, being linear in the electric potential. The second and higher-order corrections thus determined have, however, a large error, compared to those derived from the relativistically correct refractive index. The impact of the two simplifications on electron diffraction calculations is assessed through numerical comparison of the refractive index at high-angle Coulomb scattering and of cross-sections for a wide range of scattering angles, kinetic energies, and atomic numbers. - Highlights: • The standard model for the refractive index in electron microscopy is investigated. • The error of the standard model is proportional to the electric potential squared. • Relativistically correct error terms are derived from the energy-momentum relation. • The errors are assessed for Coulomb scattering varying energy and atomic number. • Errors of scattering cross-sections are pronounced at large angles and attain 10%.

  15. The refractive index in electron microscopy and the errors of its approximations

    International Nuclear Information System (INIS)

    Lentzen, M.

    2017-01-01

    In numerical calculations for electron diffraction often a simplified form of the electron-optical refractive index, linear in the electric potential, is used. In recent years improved calculation schemes have been proposed, aiming at higher accuracy by including higher-order terms of the electric potential. These schemes start from the relativistically corrected Schrödinger equation, and use a second simplified form, now for the refractive index squared, being linear in the electric potential. The second and higher-order corrections thus determined have, however, a large error, compared to those derived from the relativistically correct refractive index. The impact of the two simplifications on electron diffraction calculations is assessed through numerical comparison of the refractive index at high-angle Coulomb scattering and of cross-sections for a wide range of scattering angles, kinetic energies, and atomic numbers. - Highlights: • The standard model for the refractive index in electron microscopy is investigated. • The error of the standard model is proportional to the electric potential squared. • Relativistically correct error terms are derived from the energy-momentum relation. • The errors are assessed for Coulomb scattering varying energy and atomic number. • Errors of scattering cross-sections are pronounced at large angles and attain 10%.

  16. Term Based Comparison Metrics for Controlled and Uncontrolled Indexing Languages

    Science.gov (United States)

    Good, B. M.; Tennis, J. T.

    2009-01-01

    Introduction: We define a collection of metrics for describing and comparing sets of terms in controlled and uncontrolled indexing languages and then show how these metrics can be used to characterize a set of languages spanning folksonomies, ontologies and thesauri. Method: Metrics for term set characterization and comparison were identified and…

  17. Who stays, who drops out? Biosocial predictors of longer-term adherence in participants attending an exercise referral scheme in the UK

    Directory of Open Access Journals (Sweden)

    Tobi Patrick

    2012-05-01

    Full Text Available Abstract Background Exercise referral schemes are one of the most popular forms of physical activity intervention in primary care in the UK and present an opportunity to better understand the factors related to exercise adherence. But standard schemes tend to be delivered over a short period and so provide information about the factors associated with short-term adherence. This retrospective register-based study of a longer-duration scheme allowed investigation of longer-term adherence. Methods Social, physiological and anthropometric data were extracted from records of a cohort of ERS participants who had enrolled between 01 January and 31 December 2007 (n = 701. Characteristics of adherers and non-adherers were compared and potential predictors of longer-term adherence examined using binomial logistic regression. Results Significant adjusted odds ratios predicting longer-term adherence were found for age and medical condition. For every 10 year increase in age, the odds of people continuing exercise increased by 21.8% (OR = 1.02; CI = 1.00 to 1.04; p = 0.03. Participants referred with orthopaedic (OR = 0.25; CI = 0.07-0.94; p = 0.04, cardiovascular (OR = 0.18; CI = 0.05-0.70; p = 0.01 and other (OR = 0.20; CI = 0.04-0.93; p = 0.04 problems had significantly lower odds of adhering than those with metabolic conditions. Conclusion Improved understanding of the factors that influence adherence to exercise referral schemes will enable providers develop better referral guidance and tailor schemes to better meet participants’ needs. Longer-term schemes offer the opportunity to understand participants’ likelihood of maintaining adherence to exercise.

  18. A Semi-Analytical Methodology for Multiwell Productivity Index of Well-Industry-Production-Scheme in Tight Oil Reservoirs

    Directory of Open Access Journals (Sweden)

    Guangfeng Liu

    2018-04-01

    Full Text Available Recently, the well-industry-production-scheme (WIPS has attracted more and more attention to improve tight oil recovery. However, multi-well pressure interference (MWPI induced by well-industry-production-scheme (WIPS strongly challenges the traditional transient pressure analysis methods, which focus on single multi-fractured horizontal wells (SMFHWs without MWPI. Therefore, a semi-analytical methodology for multiwell productivity index (MPI was proposed to study well performance of WIPS scheme in tight reservoir. To facilitate methodology development, the conceptual models of tight formation and WIPS scheme were firstly described. Secondly, seepage models of tight reservoir and hydraulic fractures (HFs were sequentially established and then dynamically coupled. Numerical simulation was utilized to validate our model. Finally, identification of flow regimes and sensitivity analysis were conducted. Our results showed that there was good agreement between our proposed model and numerical simulation; moreover, our approach also gave promising calculation speed over numerical simulation. Some expected flow regimes were significantly distorted due to WIPS. The slope of type curves which characterize the linear or bi-linear flow regime is bigger than 0.5 or 0.25. The horizontal line which characterize radial flow regime is also bigger 0.5. The smaller the oil rate, the more severely flow regimes were distorted. Well rate mainly determines the distortion of MPI curves, while fracture length, well spacing, fracture spacing mainly determine when the distortion of the MPI curves occurs. The bigger the well rate, the more severely the MPI curves are distorted. While as the well spacing decreases, fracture length increases, fracture spacing increases, occurrence of MWPI become earlier. Stress sensitivity coefficient mainly affects the MPI at the formation pseudo-radial flow stage, almost has no influence on the occurrence of MWPI. This work gains some

  19. Compression of Index Term Dictionary in an Inverted-File-Oriented Database: Some Effective Algorithms.

    Science.gov (United States)

    Wisniewski, Janusz L.

    1986-01-01

    Discussion of a new method of index term dictionary compression in an inverted-file-oriented database highlights a technique of word coding, which generates short fixed-length codes obtained from the index terms themselves by analysis of monogram and bigram statistical distributions. Substantial savings in communication channel utilization are…

  20. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  1. A DYNAMIC INDEXING SCHEME FOR MULTIDIMENSIONAL DATA

    Directory of Open Access Journals (Sweden)

    Manuk G. Manukyan

    2018-03-01

    Full Text Available We present a new dynamic index structure for multidimensional data. The considered index structure is based on an extended grid file concept. Strengths and weaknesses of the grid files were analyzed. Based on that analysis we proposed to strengthen the concept of grid files by considering their stripes as linear hash tables, introducing the concept of chunk and representing the grid file structure as a graph. As a result we significantly reduced the amount of disk operations. Efficient algorithms for storage and access of index directory are proposed, in order to minimize memory usage and lookup operations complexities. Estimations of complexities for these algorithms are presented. A comparison of our approach to support effective grid file structure with other known approaches is presented. This comparison shows effectiveness of suggested metadata storage environment. An estimation of directory size is presented. A prototype to support of our grid file concept has been created and experimentally compared with MongoDB (a renowned NoSQL database. Comparison results show effectiveness of our approach in the cases of given point lookup, lookup by wide ranges and closest objects lookup when considering more than one dimension, and also better memory usage.

  2. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the subtraction terms I

    Science.gov (United States)

    Somogyi, Gábor; Trócsányi, Zoltán

    2008-08-01

    In previous articles we outlined a subtraction scheme for regularizing doubly-real emission and real-virtual emission in next-to-next-to-leading order (NNLO) calculations of jet cross sections in electron-positron annihilation. In order to find the NNLO correction these subtraction terms have to be integrated over the factorized unresolved phase space and combined with the two-loop corrections. In this paper we perform the integration of all one-parton unresolved subtraction terms.

  3. Asymptotically and exactly energy balanced augmented flux-ADER schemes with application to hyperbolic conservation laws with geometric source terms

    Science.gov (United States)

    Navas-Montilla, A.; Murillo, J.

    2016-07-01

    In this work, an arbitrary order HLL-type numerical scheme is constructed using the flux-ADER methodology. The proposed scheme is based on an augmented Derivative Riemann solver that was used for the first time in Navas-Montilla and Murillo (2015) [1]. Such solver, hereafter referred to as Flux-Source (FS) solver, was conceived as a high order extension of the augmented Roe solver and led to the generation of a novel numerical scheme called AR-ADER scheme. Here, we provide a general definition of the FS solver independently of the Riemann solver used in it. Moreover, a simplified version of the solver, referred to as Linearized-Flux-Source (LFS) solver, is presented. This novel version of the FS solver allows to compute the solution without requiring reconstruction of derivatives of the fluxes, nevertheless some drawbacks are evidenced. In contrast to other previously defined Derivative Riemann solvers, the proposed FS and LFS solvers take into account the presence of the source term in the resolution of the Derivative Riemann Problem (DRP), which is of particular interest when dealing with geometric source terms. When applied to the shallow water equations, the proposed HLLS-ADER and AR-ADER schemes can be constructed to fulfill the exactly well-balanced property, showing that an arbitrary quadrature of the integral of the source inside the cell does not ensure energy balanced solutions. As a result of this work, energy balanced flux-ADER schemes that provide the exact solution for steady cases and that converge to the exact solution with arbitrary order for transient cases are constructed.

  4. An adaptive short-term prediction scheme for wind energy storage management

    International Nuclear Information System (INIS)

    Blonbou, Ruddy; Monjoly, Stephanie; Dorville, Jean-Francois

    2011-01-01

    Research highlights: → We develop a real time algorithm for grid-connected wind energy storage management. → The method aims to guarantee, with ±5% error margin, the power sent to the grid. → Dynamic scheduling of energy storage is based on short-term energy prediction. → Accurate predictions reduce the need in storage capacity. -- Abstract: Efficient forecasting scheme that includes some information on the likelihood of the forecast and based on a better knowledge of the wind variations characteristics along with their influence on power output variation is of key importance for the optimal integration of wind energy in island's power system. In the Guadeloupean archipelago (French West-Indies), with a total wind power capacity of 25 MW; wind energy can represent up to 5% of the instantaneous electricity production. At this level, wind energy contribution can be equivalent to the current network primary control reserve, which causes balancing difficult. The share of wind energy is due to grow even further since the objective is set to reach 118 MW by 2020. It is an absolute evidence for the network operator that due to security concerns of the electrical grid, the share of wind generation should not increase unless solutions are found to solve the prediction problem. The University of French West-Indies and Guyana has developed a short-term wind energy prediction scheme that uses artificial neural networks and adaptive learning procedures based on Bayesian approach and Gaussian approximation. This paper reports the results of the evaluation of the proposed approach; the improvement with respect to the simple persistent prediction model was globally good. A discussion on how such a tool combined with energy storage capacity could help to smooth the wind power variation and improve the wind energy penetration rate into island utility network is also proposed.

  5. Multi-Hierarchical Gray Correlation Analysis Applied in the Selection of Green Building Design Scheme

    Science.gov (United States)

    Wang, Li; Li, Chuanghong

    2018-02-01

    As a sustainable form of ecological structure, green building is widespread concerned and advocated in society increasingly nowadays. In the survey and design phase of preliminary project construction, carrying out the evaluation and selection of green building design scheme, which is in accordance with the scientific and reasonable evaluation index system, can improve the ecological benefits of green building projects largely and effectively. Based on the new Green Building Evaluation Standard which came into effect on January 1, 2015, the evaluation index system of green building design scheme is constructed taking into account the evaluation contents related to the green building design scheme. We organized experts who are experienced in construction scheme optimization to mark and determine the weight of each evaluation index through the AHP method. The correlation degree was calculated between each evaluation scheme and ideal scheme by using multilevel gray relational analysis model and then the optimal scheme was determined. The feasibility and practicability of the evaluation method are verified by introducing examples.

  6. Mid-term periodicities and heliospheric modulation of coronal index and solar flare index during solar cycles 22-23

    Science.gov (United States)

    Singh, Prithvi Raj; Saxena, A. K.; Tiwari, C. M.

    2018-04-01

    We applied fast Fourier transform techniques and Morlet wavelet transform on the time series data of coronal index, solar flare index, and galactic cosmic ray, for the period 1986-2008, in order to investigate the long- and mid-term periodicities including the Rieger ({˜ }130 to {˜ }190 days), quasi-period ({˜ }200 to {˜ }374 days), and quasi-biennial periodicities ({˜ }1.20 to {˜ }3.27 years) during the combined solar cycles 22-23. We emphasize the fact that a lesser number of periodicities are found in the range of low frequencies, while the higher frequencies show a greater number of periodicities. The rotation rates at the base of convection zone have periods for coronal index of {˜ }1.43 years and for solar flare index of {˜ }1.41 year, and galactic cosmic ray, {˜ }1.35 year, during combined solar cycles 22-23. In relation to these two solar parameters (coronal index and solar flare index), for the solar cycles 22-23, we found that galactic cosmic ray modulation at mid cut-off rigidity (Rc = 2.43GV) is anti-correlated with time-lag of few months.

  7. An Indexing Scheme for Case-Based Manufacturing Vision Development

    DEFF Research Database (Denmark)

    Wang, Chengbo; Johansen, John; Luxhøj, James T.

    2004-01-01

    with the competence improvement of an enterprises manufacturing system. There are two types of cases within the CBRM – an event case (EC) and a general supportive case (GSC). We designed one set of indexing vocabulary for the two types of cases, but a different indexing representation structure for each of them......This paper focuses on one critical element, indexing – retaining and representing knowledge in an applied case-based reasoning (CBR) model for supporting strategic manufacturing vision development (CBRM). Manufacturing vision (MV) is a kind of knowledge management concept and process concerned...

  8. Hybrid finite volume/ finite element method for radiative heat transfer in graded index media

    Science.gov (United States)

    Zhang, L.; Zhao, J. M.; Liu, L. H.; Wang, S. Y.

    2012-09-01

    The rays propagate along curved path determined by the Fermat principle in the graded index medium. The radiative transfer equation in graded index medium (GRTE) contains two specific redistribution terms (with partial derivatives to the angular coordinates) accounting for the effect of the curved ray path. In this paper, the hybrid finite volume with finite element method (hybrid FVM/FEM) (P.J. Coelho, J. Quant. Spectrosc. Radiat. Transf., vol. 93, pp. 89-101, 2005) is extended to solve the radiative heat transfer in two-dimensional absorbing-emitting-scattering graded index media, in which the spatial discretization is carried out using a FVM, while the angular discretization is by a FEM. The FEM angular discretization is demonstrated to be preferable in dealing with the redistribution terms in the GRTE. Two stiff matrix assembly schemes of the angular FEM discretization, namely, the traditional assembly approach and a new spherical assembly approach (assembly on the unit sphere of the solid angular space), are discussed. The spherical assembly scheme is demonstrated to give better results than the traditional assembly approach. The predicted heat flux distributions and temperature distributions in radiative equilibrium are determined by the proposed method and compared with the results available in other references. The proposed hybrid FVM/FEM method can predict the radiative heat transfer in absorbing-emitting-scattering graded index medium with good accuracy.

  9. Hybrid finite volume/ finite element method for radiative heat transfer in graded index media

    International Nuclear Information System (INIS)

    Zhang, L.; Zhao, J.M.; Liu, L.H.; Wang, S.Y.

    2012-01-01

    The rays propagate along curved path determined by the Fermat principle in the graded index medium. The radiative transfer equation in graded index medium (GRTE) contains two specific redistribution terms (with partial derivatives to the angular coordinates) accounting for the effect of the curved ray path. In this paper, the hybrid finite volume with finite element method (hybrid FVM/FEM) (P.J. Coelho, J. Quant. Spectrosc. Radiat. Transf., vol. 93, pp. 89-101, 2005) is extended to solve the radiative heat transfer in two-dimensional absorbing-emitting-scattering graded index media, in which the spatial discretization is carried out using a FVM, while the angular discretization is by a FEM. The FEM angular discretization is demonstrated to be preferable in dealing with the redistribution terms in the GRTE. Two stiff matrix assembly schemes of the angular FEM discretization, namely, the traditional assembly approach and a new spherical assembly approach (assembly on the unit sphere of the solid angular space), are discussed. The spherical assembly scheme is demonstrated to give better results than the traditional assembly approach. The predicted heat flux distributions and temperature distributions in radiative equilibrium are determined by the proposed method and compared with the results available in other references. The proposed hybrid FVM/FEM method can predict the radiative heat transfer in absorbing-emitting-scattering graded index medium with good accuracy.

  10. High order well-balanced finite volume WENO schemes and discontinuous Galerkin methods for a class of hyperbolic systems with source terms

    International Nuclear Information System (INIS)

    Xing Yulong; Shu Chiwang

    2006-01-01

    Hyperbolic balance laws have steady state solutions in which the flux gradients are nonzero but are exactly balanced by the source term. In our earlier work [J. Comput. Phys. 208 (2005) 206-227; J. Sci. Comput., accepted], we designed a well-balanced finite difference weighted essentially non-oscillatory (WENO) scheme, which at the same time maintains genuine high order accuracy for general solutions, to a class of hyperbolic systems with separable source terms including the shallow water equations, the elastic wave equation, the hyperbolic model for a chemosensitive movement, the nozzle flow and a two phase flow model. In this paper, we generalize high order finite volume WENO schemes and Runge-Kutta discontinuous Galerkin (RKDG) finite element methods to the same class of hyperbolic systems to maintain a well-balanced property. Finite volume and discontinuous Galerkin finite element schemes are more flexible than finite difference schemes to treat complicated geometry and adaptivity. However, because of a different computational framework, the maintenance of the well-balanced property requires different technical approaches. After the description of our well-balanced high order finite volume WENO and RKDG schemes, we perform extensive one and two dimensional simulations to verify the properties of these schemes such as the exact preservation of the balance laws for certain steady state solutions, the non-oscillatory property for general solutions with discontinuities, and the genuine high order accuracy in smooth regions

  11. Short-Term Prognostic Index for Breast Cancer: NPI or Lpi

    Directory of Open Access Journals (Sweden)

    V. Van Belle

    2011-01-01

    Full Text Available Axillary lymph node involvement is an important prognostic factor for breast cancer survival but is confounded by the number of nodes examined. We compare the performance of the log odds prognostic index (Lpi, using a ratio of the positive versus negative lymph nodes, with the Nottingham Prognostic Index (NPI for short-term breast cancer specific disease free survival. A total of 1818 operable breast cancer patients treated in the University Hospital of Leuven between 2000 and 2005 were included. The performance of the NPI and Lpi were compared on two levels: calibration and discrimination. The latter was evaluated using the concordance index (cindex, the number of patients in the extreme groups, and difference in event rates between these. The NPI had a significant higher cindex, but a significant lower percentage of patients in the extreme risk groups. After updating both indices, no significant differences between NPI and Lpi were noted.

  12. Development and application of a short- /long-term composited drought index in the upper Huaihe River basin, China

    Directory of Open Access Journals (Sweden)

    M. Yu

    2015-06-01

    Full Text Available Accurate and reliable drought monitoring is of primary importance for drought mitigation and reduction of social-ecological vulnerability. The aim of the paper was to propose a short-term/long-term composited drought index (CDI which could be widely used for drought monitoring and early warning in China. In the study, the upper Huaihe River basin above the Xixian gauge station, which has been hit by severe droughts frequently in recent decades, was selected as the case study site. The short-term CDI was developed by the Principle Component Analysis of the self-calibrating Palmer Drought Severity Index (sc-PDSI, the 1- and 3-month Standardized Precipitation Evapotranspiration Index (SPEI, Z Index (ZIND, the Soil Moisture Index (SMI with the long-term CDI being formulated by use of the self-calibrating Palmer Hydrology Drought Index (sc-PHDI, the 6-, 12-, 18- and 24-month SPEI, the Standardized Streamflow Index (SSI, the SMI. The sc-PDSI, the PHDI, the ZIND, the SPEI on a monthly time scale were calculated based on the monthly air temperature and precipitation, and the monthly SMI and SSI were computed based on the simulated soil moisture and runoff by the distributed Xinanjiang model. The thresholds of the short-term/long-term CDI were determined according to frequency statistics of different drought indices. Finally, the feasibility of the two CDIs was investigated against the scPDSI, the SPEI and the historical drought records. The results revealed that the short-term/long-term CDI could capture the onset, severity, persistence of drought events very well with the former being better at identifying the dynamic evolution of drought condition while the latter better at judging the changing trend of drought over a long time period.

  13. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  14. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  15. Unsplit schemes for hyperbolic conservation laws with source terms in one space dimension

    International Nuclear Information System (INIS)

    Papalexandris, M.V.; Leonard, A.; Dimotakis, P.E.

    1997-01-01

    The present work is concerned with an application of the theory of characteristics to conservation laws with source terms in one space dimension, such as the Euler equations for reacting flows. Space-time paths are introduced on which the flow/chemistry equations decouple to a characteristic set of ODE's for the corresponding homogeneous laws, thus allowing the introduction of functions analogous to the Riemann invariants in classical theory. The geometry of these paths depends on the spatial gradients of the solution. This particular decomposition can be used in the design of efficient unsplit algorithms for the numerical integration of the equations. As a first step, these ideas are implemented for the case of a scalar conservation law with a nonlinear source term. The resulting algorithm belongs to the class of MUSCL-type, shock-capturing schemes. Its accuracy and robustness are checked through a series of tests. The stiffness of the source term is also studied. Then, the algorithm is generalized for a system of hyperbolic equations, namely the Euler equations for reacting flows. A numerical study of unstable detonations is performed. 57 refs

  16. Measuring client experiences in long-term care in the Netherlands: a pilot study with the Consumer Quality Index Long-term Care

    Directory of Open Access Journals (Sweden)

    Kool Rudolf B

    2010-04-01

    Full Text Available Abstract Background This study aims to describe the development, testing and optimization of a new standard instrument, the Consumer Quality Index (CQ-index® Long-term Care, for measuring client experiences with long-term care in the Netherlands. Methods Three versions of the CQ-index questionnaires and protocols for study sampling and data collection were developed, designed for interviews with residents of nursing or residential care homes and postal surveys among representatives of psychogeriatric residents and homecare clients. From July to November 2006 a pilot study was conducted among 2,697 clients of 68 nursing or residential care homes, 2,164 representatives of clients in 57 psychogeriatric care institutions, and 1,462 clients of 19 homecare organizations. We performed psychometric analyses and descriptive analyses, and evaluated the pilot study. Results The pilot study showed the feasibility and usability of the instruments, supported the multidimensionality of the questionnaires and showed first findings on client experiences and possibilities for quality improvement. Nine scales applied to all care settings: shared decision making, attitude and courtesy, information, body care, competence and safety of care, activities, autonomy, mental well-being, and availability of personnel. The pilot resulted in three optimized questionnaires and recommendations for nationwide implementation. Conclusions The CQ-index® Long-term Care provides a good basis to investigate the quality of nursing homes, residential care homes and homecare from the clients' perspective. This standardized instrument enables a nationwide comparison of the quality of long-term care for the purpose of transparency and quality assurance.

  17. Compressing bitmap indexes for faster search operations

    International Nuclear Information System (INIS)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2002-01-01

    In this paper, we study the effects of compression on bitmap indexes. The main operations on the bitmaps during query processing are bitwise logical operations such as AND, OR, NOT, etc. Using the general purpose compression schemes, such as gzip, the logical operations on the compressed bitmaps are much slower than on the uncompressed bitmaps. Specialized compression schemes, like the byte-aligned bitmap code(BBC), are usually faster in performing logical operations than the general purpose schemes, but in many cases they are still orders of magnitude slower than the uncompressed scheme. To make the compressed bitmap indexes operate more efficiently, we designed a CPU-friendly scheme which we refer to as the word-aligned hybrid code (WAH). Tests on both synthetic and real application data show that the new scheme significantly outperforms well-known compression schemes at a modest increase in storage space. Compared to BBC, a scheme well-known for its operational efficiency, WAH performs logical operations about 12 times faster and uses only 60 percent more space. Compared to the uncompressed scheme, in most test cases WAH is faster while still using less space. We further verified with additional tests that the improvement in logical operation speed translates to similar improvement in query processing speed

  18. Compressing bitmap indexes for faster search operations

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2002-04-25

    In this paper, we study the effects of compression on bitmap indexes. The main operations on the bitmaps during query processing are bitwise logical operations such as AND, OR, NOT, etc. Using the general purpose compression schemes, such as gzip, the logical operations on the compressed bitmaps are much slower than on the uncompressed bitmaps. Specialized compression schemes, like the byte-aligned bitmap code(BBC), are usually faster in performing logical operations than the general purpose schemes, but in many cases they are still orders of magnitude slower than the uncompressed scheme. To make the compressed bitmap indexes operate more efficiently, we designed a CPU-friendly scheme which we refer to as the word-aligned hybrid code (WAH). Tests on both synthetic and real application data show that the new scheme significantly outperforms well-known compression schemes at a modest increase in storage space. Compared to BBC, a scheme well-known for its operational efficiency, WAH performs logical operations about 12 times faster and uses only 60 percent more space. Compared to the uncompressed scheme, in most test cases WAH is faster while still using less space. We further verified with additional tests that the improvement in logical operation speed translates to similar improvement in query processing speed.

  19. An efficient and stable hydrodynamic model with novel source term discretization schemes for overland flow and flood simulations

    Science.gov (United States)

    Xia, Xilin; Liang, Qiuhua; Ming, Xiaodong; Hou, Jingming

    2017-05-01

    Numerical models solving the full 2-D shallow water equations (SWEs) have been increasingly used to simulate overland flows and better understand the transient flow dynamics of flash floods in a catchment. However, there still exist key challenges that have not yet been resolved for the development of fully dynamic overland flow models, related to (1) the difficulty of maintaining numerical stability and accuracy in the limit of disappearing water depth and (2) inaccurate estimation of velocities and discharges on slopes as a result of strong nonlinearity of friction terms. This paper aims to tackle these key research challenges and present a new numerical scheme for accurately and efficiently modeling large-scale transient overland flows over complex terrains. The proposed scheme features a novel surface reconstruction method (SRM) to correctly compute slope source terms and maintain numerical stability at small water depth, and a new implicit discretization method to handle the highly nonlinear friction terms. The resulting shallow water overland flow model is first validated against analytical and experimental test cases and then applied to simulate a hypothetic rainfall event in the 42 km2 Haltwhistle Burn, UK.

  20. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  1. Nonoscillatory shock capturing scheme using flux limited dissipation

    International Nuclear Information System (INIS)

    Jameson, A.

    1985-01-01

    A method for modifying the third order dissipative terms by the introduction of flux limiters is proposed. The first order dissipative terms can then be eliminated entirely, and in the case of a scalar conservation law the scheme is converted into a total variation diminishing scheme provided that an appropriate value is chosen for the dissipative coefficient. Particular attention is given to: (1) the treatment of the scalar conservation law; (2) the treatment of the Euler equations for inviscid compressible flow; (3) the boundary conditions; and (4) multistage time stepping and multigrid schemes. Numerical results for transonic flows suggest that a central difference scheme augmented by flux limited dissipative terms can lead to an effective nonoscillatory shock capturing method. 20 references

  2. A novel grain cluster-based homogenization scheme

    International Nuclear Information System (INIS)

    Tjahjanto, D D; Eisenlohr, P; Roters, F

    2010-01-01

    An efficient homogenization scheme, termed the relaxed grain cluster (RGC), for elasto-plastic deformations of polycrystals is presented. The scheme is based on a generalization of the grain cluster concept. A volume element consisting of eight (= 2 × 2 × 2) hexahedral grains is considered. The kinematics of the RGC scheme is formulated within a finite deformation framework, where the relaxation of the local deformation gradient of each individual grain is connected to the overall deformation gradient by the, so-called, interface relaxation vectors. The set of relaxation vectors is determined by the minimization of the constitutive energy (or work) density of the overall cluster. An additional energy density associated with the mismatch at the grain boundaries due to relaxations is incorporated as a penalty term into the energy minimization formulation. Effectively, this penalty term represents the kinematical condition of deformation compatibility at the grain boundaries. Simulations have been performed for a dual-phase grain cluster loaded in uniaxial tension. The results of the simulations are presented and discussed in terms of the effective stress–strain response and the overall deformation anisotropy as functions of the penalty energy parameters. In addition, the prediction of the RGC scheme is compared with predictions using other averaging schemes, as well as to the result of direct finite element (FE) simulation. The comparison indicates that the present RGC scheme is able to approximate FE simulation results of relatively fine discretization at about three orders of magnitude lower computational cost

  3. Genetic progress in multistage dairy cattle breeding schemes using genetic markers.

    Science.gov (United States)

    Schrooten, C; Bovenhuis, H; van Arendonk, J A M; Bijma, P

    2005-04-01

    The aim of this paper was to explore general characteristics of multistage breeding schemes and to evaluate multistage dairy cattle breeding schemes that use information on quantitative trait loci (QTL). Evaluation was either for additional genetic response or for reduction in number of progeny-tested bulls while maintaining the same response. The reduction in response in multistage breeding schemes relative to comparable single-stage breeding schemes (i.e., with the same overall selection intensity and the same amount of information in the final stage of selection) depended on the overall selection intensity, the selection intensity in the various stages of the breeding scheme, and the ratio of the accuracies of selection in the various stages of the breeding scheme. When overall selection intensity was constant, reduction in response increased with increasing selection intensity in the first stage. The decrease in response was highest in schemes with lower overall selection intensity. Reduction in response was limited in schemes with low to average emphasis on first-stage selection, especially if the accuracy of selection in the first stage was relatively high compared with the accuracy in the final stage. Closed nucleus breeding schemes in dairy cattle that use information on QTL were evaluated by deterministic simulation. In the base scheme, the selection index consisted of pedigree information and own performance (dams), or pedigree information and performance of 100 daughters (sires). In alternative breeding schemes, information on a QTL was accounted for by simulating an additional index trait. The fraction of the variance explained by the QTL determined the correlation between the additional index trait and the breeding goal trait. Response in progeny test schemes relative to a base breeding scheme without QTL information ranged from +4.5% (QTL explaining 5% of the additive genetic variance) to +21.2% (QTL explaining 50% of the additive genetic variance). A

  4. Establishing the long-term fuel management scheme using point reactivity model

    International Nuclear Information System (INIS)

    Park, Yong-Soo; Kim, Jae-Hak; Lee, Young-Ouk; Song, Jae-Woong; Zee, Sung-Kyun

    1994-01-01

    A new approach to establish the long-term fuel management scheme is presented in this paper. The point reactivity model is used to predict the core average reactivity. An attempt to calculate batchwise power fraction is introduced through the two-dimensional nodal power algorithm based on the modified one-group diffusion equation and the number of fuel assemblies on the core periphery. Suggested is an empirical formula to estimate the radial leakage reactivity with ripe core design experience reflected. This approach predicts the cycle lengths and the discharge burnups of individual fuel batches up to an equilibrium core when the proper input data such as batch enrichment, batch size, type and content of burnable poison and reloading strategies are given. Eight benchmark calculations demonstrate that the new approach used in this study is reasonably accurate and highly efficient for the purpose of scoping calculation when compared with design code predictions. (author)

  5. Evolution system study of a generalized scheme of relativistic magnetohydrodynamic

    International Nuclear Information System (INIS)

    Mahjoub, Bechir.

    1977-01-01

    A generalized scheme of relativistic magnetohydrodynamics is studied with a thermodynamical differential relation proposed by Fokker; this scheme takes account of interaction between the fluid and the magnetic field. Taking account of an integrability condition of this relation, the evolution system corresponding to this scheme is identical to the one corresponding to the usual scheme; it has the same characteristics; it is non-strictly hyperbolic with the same hypothesis of compressibility and it has, with respect to the Cauchy problem, an unique solution in a Gevrey class of index α=3/2 [fr

  6. Forcing scheme analysis for the axisymmetric lattice Boltzmann method under incompressible limit.

    Science.gov (United States)

    Zhang, Liangqi; Yang, Shiliang; Zeng, Zhong; Chen, Jie; Yin, Linmao; Chew, Jia Wei

    2017-04-01

    Because the standard lattice Boltzmann (LB) method is proposed for Cartesian Navier-Stokes (NS) equations, additional source terms are necessary in the axisymmetric LB method for representing the axisymmetric effects. Therefore, the accuracy and applicability of the axisymmetric LB models depend on the forcing schemes adopted for discretization of the source terms. In this study, three forcing schemes, namely, the trapezium rule based scheme, the direct forcing scheme, and the semi-implicit centered scheme, are analyzed theoretically by investigating their derived macroscopic equations in the diffusive scale. Particularly, the finite difference interpretation of the standard LB method is extended to the LB equations with source terms, and then the accuracy of different forcing schemes is evaluated for the axisymmetric LB method. Theoretical analysis indicates that the discrete lattice effects arising from the direct forcing scheme are part of the truncation error terms and thus would not affect the overall accuracy of the standard LB method with general force term (i.e., only the source terms in the momentum equation are considered), but lead to incorrect macroscopic equations for the axisymmetric LB models. On the other hand, the trapezium rule based scheme and the semi-implicit centered scheme both have the advantage of avoiding the discrete lattice effects and recovering the correct macroscopic equations. Numerical tests applied for validating the theoretical analysis show that both the numerical stability and the accuracy of the axisymmetric LB simulations are affected by the direct forcing scheme, which indicate that forcing schemes free of the discrete lattice effects are necessary for the axisymmetric LB method.

  7. Giant Kerr nonlinearities using refractive-index enhancement

    International Nuclear Information System (INIS)

    Yavuz, D. D.; Sikes, D. E.

    2010-01-01

    By utilizing refractive-index enhancement with vanishing absorption, a scheme is suggested that achieves giant Kerr nonlinearities between two weak laser beams. One application of this scheme is discussed and an all-optical distributed Bragg reflector is proposed that works at very low light levels.

  8. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  9. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  10. List of U.S. Army Research Institute Research and Technical Publications for Public Release/Unlimited Distribution. Fiscal Year 2007 (October 1, 2006 to September 30, 2007) With Author Index and Report Titles and Subject Terms Index

    Science.gov (United States)

    2008-04-01

    Year 2007 October 1, 2006 to September 30, 2007 With Author Index and Report Titles and Subject Terms Index United States Army Research Institute for...Fiscal Year 2007 October 1, 2006 to September 30, 2007 With Author Index and Report Titles and Subject Terms Index CONTENTS Page Introduction...39 Author Index .................................................................................................................. 39

  11. Hilbert schemes of points on some classes surface singularities

    OpenAIRE

    Gyenge, Ádám

    2016-01-01

    We study the geometry and topology of Hilbert schemes of points on the orbifold surface [C^2/G], respectively the singular quotient surface C^2/G, where G is a finite subgroup of SL(2,C) of type A or D. We give a decomposition of the (equivariant) Hilbert scheme of the orbifold into affine space strata indexed by a certain combinatorial set, the set of Young walls. The generating series of Euler characteristics of Hilbert schemes of points of the singular surface of type A or D is computed in...

  12. Nutrition-related risk indexes and long-term mortality in noncritically ill inpatients who receive total parenteral nutrition (prospective multicenter study).

    Science.gov (United States)

    Tapia, María José; Ocón, Julia; Cabrejas-Gómez, Carmen; Ballesteros-Pomar, María D; Vidal-Casariego, Alfonso; Arraiza-Irigoyen, Carmen; Olivares, Josefina; Conde-García, Ma Carmen; García-Manzanares, Álvaro; Botella-Romero, Francisco; Quílez-Toboso, Rosa P; Cabrerizo, Lucio; Rubio, Miguel A; Chicharro, Luisa; Burgos, Rosa; Pujante, Pedro; Ferrer, Mercedes; Zugasti, Ana; Petrina, Estrella; Manjón, Laura; Diéguez, Marta; Carrera, Ma José; Vila-Bundo, Anna; Urgelés, Juan Ramón; Aragón-Valera, Carmen; Sánchez-Vilar, Olga; Bretón, Irene; García-Peris, Pilar; Muñoz-Garach, Araceli; Márquez, Efren; del Olmo, Dolores; Pereira, José Luis; Tous, María C; Olveira, Gabriel

    2015-10-01

    Malnutrition in hospitalized patients is associated with an increased risk of death, in both the short and the long term. The purpose of this study was to determine which nutrition-related risk index predicts long-term mortality better (three years) in patients who receive total parenteral nutrition (TPN). This prospective, multicenter study involved noncritically ill patients who were prescribed TPN during hospitalization. Data were collected on Subjective Global Assessment (SGA), Nutritional Risk Index (NRI), Geriatric Nutritional Risk Index (GNRI), body mass index, albumin and prealbumin, as well as long-term mortality. Over the 1- and 3-year follow-up periods, 174 and 244 study subjects (28.8% and 40.3%) respectively, died. Based on the Cox proportional hazards survival model, the nutrition-related risk indexes most strongly associated with mortality were SGA and albumin (Nutrition and Metabolism. All rights reserved.

  13. Assimilation of Soil Wetness Index and Leaf Area Index into the ISBA-A-gs land surface model: grassland case study

    Directory of Open Access Journals (Sweden)

    A. L. Barbu

    2011-07-01

    Full Text Available The performance of the joint assimilation in a land surface model of a Soil Wetness Index (SWI product provided by an exponential filter together with Leaf Area Index (LAI is investigated. The data assimilation is evaluated with different setups using the SURFEX modeling platform, for a period of seven years (2001–2007, at the SMOSREX grassland site in southwestern France. The results obtained with a Simplified Extended Kalman Filter demonstrate the effectiveness of a joint data assimilation scheme when both SWI and Leaf Area Index are merged into the ISBA-A-gs land surface model. The assimilation of a retrieved Soil Wetness Index product presents several challenges that are investigated in this study. A significant improvement of around 13 % of the root-zone soil water content is obtained by assimilating dimensionless root-zone SWI data. For comparison, the assimilation of in situ surface soil moisture is considered as well. A lower impact on the root zone is noticed. Under specific conditions, the transfer of the information from the surface to the root zone was found not accurate. Also, our results indicate that the assimilation of in situ LAI data may correct a number of deficiencies in the model, such as low LAI values in the senescence phase by using a seasonal-dependent error definition for background and observations. In order to verify the specification of the errors for SWI and LAI products, a posteriori diagnostics are employed. This approach highlights the importance of the assimilation design on the quality of the analysis. The impact of data assimilation scheme on CO2 fluxes is also quantified by using measurements of net CO2 fluxes gathered at the SMOSREX site from 2005 to 2007. An improvement of about 5 % in terms of rms error is obtained.

  14. Mid-term fire danger index based on satellite imagery and ancillary geographic data

    Science.gov (United States)

    Stefanidou, A.; Dragozi, E.; Tompoulidou, M.; Stepanidou, L.; Grigoriadis, D.; Katagis, T.; Stavrakoudis, D.; Gitas, I.

    2017-09-01

    Fire danger forecast constitutes one of the most important components of integrated fire management since it provides crucial information for efficient pre-fire planning, alertness and timely response to a possible fire event. The aim of this work is to develop an index that has the capability of predicting accurately fire danger on a mid-term basis. The methodology that is currently under development is based on an innovative approach that employs dry fuel spatial connectivity as well as biophysical and topological variables for the reliable prediction of fire danger. More specifically, the estimation of the dry fuel connectivity is based on a previously proposed automated procedure implemented in R software that uses Moderate Resolution Imaging Spectrometer (MODIS) time series data. Dry fuel connectivity estimates are then combined with other ancillary data such as fuel type and proximity to roads in order to result in the generation of the proposed mid-term fire danger index. The innovation of the proposed index—which will be evaluated by comparison to historical fire data—lies in the fact that its calculation is almost solely affected by the availability of satellite data. Finally, it should be noted that the index is developed within the framework of the National Observatory of Forest Fires (NOFFi) project.

  15. Spatial Frequency Multiplexing of Fiber-Optic Interferometric Refractive Index Sensors Based on Graded-Index Multimode Fibers

    Science.gov (United States)

    Liu, Li; Gong, Yuan; Wu, Yu; Zhao, Tian; Wu, Hui-Juan; Rao, Yun-Jiang

    2012-01-01

    Fiber-optic interferometric sensors based on graded-index multimode fibers have very high refractive-index sensitivity, as we previously demonstrated. In this paper, spatial-frequency multiplexing of this type of fiber-optic refractive index sensors is investigated. It is estimated that multiplexing of more than 10 such sensors is possible. In the multiplexing scheme, one of the sensors is used to investigate the refractive index and temperature responses. The fast Fourier transform (FFT) of the combined reflective spectra is analyzed. The intensity of the FFT spectra is linearly related with the refractive index and is not sensitive to the temperature.

  16. Effects of sparse sampling schemes on image quality in low-dose CT

    International Nuclear Information System (INIS)

    Abbas, Sajid; Lee, Taewon; Cho, Seungryong; Shin, Sukyoung; Lee, Rena

    2013-01-01

    Purpose: Various scanning methods and image reconstruction algorithms are actively investigated for low-dose computed tomography (CT) that can potentially reduce a health-risk related to radiation dose. Particularly, compressive-sensing (CS) based algorithms have been successfully developed for reconstructing images from sparsely sampled data. Although these algorithms have shown promises in low-dose CT, it has not been studied how sparse sampling schemes affect image quality in CS-based image reconstruction. In this work, the authors present several sparse-sampling schemes for low-dose CT, quantitatively analyze their data property, and compare effects of the sampling schemes on the image quality.Methods: Data properties of several sampling schemes are analyzed with respect to the CS-based image reconstruction using two measures: sampling density and data incoherence. The authors present five different sparse sampling schemes, and simulated those schemes to achieve a targeted dose reduction. Dose reduction factors of about 75% and 87.5%, compared to a conventional scan, were tested. A fully sampled circular cone-beam CT data set was used as a reference, and sparse sampling has been realized numerically based on the CBCT data.Results: It is found that both sampling density and data incoherence affect the image quality in the CS-based reconstruction. Among the sampling schemes the authors investigated, the sparse-view, many-view undersampling (MVUS)-fine, and MVUS-moving cases have shown promising results. These sampling schemes produced images with similar image quality compared to the reference image and their structure similarity index values were higher than 0.92 in the mouse head scan with 75% dose reduction.Conclusions: The authors found that in CS-based image reconstructions both sampling density and data incoherence affect the image quality, and suggest that a sampling scheme should be devised and optimized by use of these indicators. With this strategic

  17. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  18. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  19. Relationship of Occlusal Schemes with the Occurrence of Temporomandibular Disorders

    Directory of Open Access Journals (Sweden)

    Dina H. Sugiaman

    2013-07-01

    Full Text Available Masticatory system is a complex functional unit of the body responsible for mastication, speech, and deglutition process. Temporomandibular disorders (TMD is used to describe all functional disturbances of the masticatory system. The etiology of TMD is multifactorial, such as occlusal disharmony and emotional stress. The relationship between occlusion and TMD has been highly debated in dentistry, one of the occlusal factors is the occlusal scheme. Occlusal schemes are defined as bilateral canine guidance, unilateral canine guidance, group function and balanced occlusion. However, studies about the relationship of occlusal schemes and the occurrence of the TMD are still limited and remained controversial. Objective: To investigate the relationship of occlusal schemes witht he occurrence of TMD. Methods: A cross-sectional study was conducted at the Faculty of Dentistry, Uniiversitas Indonesia. A total of 127 students were included in this study. Subjects were examined based on Clinical Helkimo Index and divided into TMD and non-TMD groups. Subjects were categorized as non-TMD groups if the value of the clinical Helkimo index was 0 and as TMD group when the value ranged between 1-25. Results: Balanced occlusion schemes has a greater risk of TMD occurrence with odds ratio value 5.6 and 95% confidence interval 1.188 to 26.331 (p=0.021. Conclusion: Balanced occlusion has a significant relationship with the occurrence of TMD.

  20. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  1. The social gradient in birthweight at term: quantification of the mediating role of maternal smoking and body mass index

    DEFF Research Database (Denmark)

    Mortensen, Laust H; Diderichsen, Finn; Smith, George Davey

    2009-01-01

    Maternal education is associated with the birthweight of offspring. We sought to quantify the role of maternal body mass index (BMI) and smoking as intermediary variables between maternal education and birthweight at term.......Maternal education is associated with the birthweight of offspring. We sought to quantify the role of maternal body mass index (BMI) and smoking as intermediary variables between maternal education and birthweight at term....

  2. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  3. Time-space trade-offs for lempel-ziv compressed indexing

    DEFF Research Database (Denmark)

    Bille, Philip; Ettienne, Mikko Berggren; Gørtz, Inge Li

    2017-01-01

    Given a string S, the compressed indexing problem is to preprocess S into a compressed representation that supports fast substring queries. The goal is to use little space relative to the compressed size of S while supporting fast queries. We present a compressed index based on the Lempel-Ziv 1977...... compression scheme. Let n, and z denote the size of the input string, and the compressed LZ77 string, respectively. We obtain the following time-space trade-offs. Given a pattern string P of length m, we can solve the problem in (i) O (m + occ lg lg n) time using O(z lg(n/z) lg lg z) space, or (ii) (m (1...... best space bound, but has a leading term in the query time of O(m(1 + lgϵ z/lg(n/z))). However, for any polynomial compression ratio, i.e., z = O(n1-δ), for constant δ > 0, this becomes O(m). Our index also supports extraction of any substring of length ℓ in O(ℓ + lg(n/z)) time. Technically, our...

  4. Optimal on/off scheme for all-optical switching

    DEFF Research Database (Denmark)

    Kristensen, Philip Trøst; Heuck, Mikkel; Mørk, Jesper

    2012-01-01

    We present a two-pulsed on/off scheme based on coherent control for fast switching of the optical energy in a micro cavity and use calculus of variations to optimize the switching in terms of energy.......We present a two-pulsed on/off scheme based on coherent control for fast switching of the optical energy in a micro cavity and use calculus of variations to optimize the switching in terms of energy....

  5. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  6. Harvested Energy Prediction Schemes for Wireless Sensor Networks: Performance Evaluation and Enhancements

    Directory of Open Access Journals (Sweden)

    Muhammad

    2017-01-01

    Full Text Available We review harvested energy prediction schemes to be used in wireless sensor networks and explore the relative merits of landmark solutions. We propose enhancements to the well-known Profile-Energy (Pro-Energy model, the so-called Improved Profile-Energy (IPro-Energy, and compare its performance with Accurate Solar Irradiance Prediction Model (ASIM, Pro-Energy, and Weather Conditioned Moving Average (WCMA. The performance metrics considered are the prediction accuracy and the execution time which measure the implementation complexity. In addition, the effectiveness of the considered models, when integrated in an energy management scheme, is also investigated in terms of the achieved throughput and the energy consumption. Both solar irradiance and wind power datasets are used for the evaluation study. Our results indicate that the proposed IPro-Energy scheme outperforms the other candidate models in terms of the prediction accuracy achieved by up to 78% for short term predictions and 50% for medium term prediction horizons. For long term predictions, its prediction accuracy is comparable to the Pro-Energy model but outperforms the other models by up to 64%. In addition, the IPro scheme is able to achieve the highest throughput when integrated in the developed energy management scheme. Finally, the ASIM scheme reports the smallest implementation complexity.

  7. Long-Term Effect of Maxillary Distraction Osteogenesis (DO) on Nasal Index in Adult Patients with Cleft Lip and Palate Deformities.

    Science.gov (United States)

    Jena, Ashok Kumar; Rattan, Vidya; Singh, Satinder Pal; Utreja, Ashok Kumar; Sombir, Singh

    2016-03-01

    To test the hypothesis that there is no immediate and long-term effects of maxillary distraction osteogenesis (DO) on nasal index among adult subjects with cleft lip and palate deformities. Twelve adult subjects in the age range of 17-20 years with complete unilateral cleft lip and palate underwent advancement of maxilla by DO. The immediate and long-term effects of maxillary DO on nasal index were evaluated from extra-oral full face frontal photographs recorded prior to DO (T0), at the end of active DO (T1) and at least 2-years after the DO (T2). The ANOVA, Post Hoc test (Bonferroni) and Pearson correlation coefficients were used. The probability value (P value) 0.05 was considered as statistically significant. SNM angle and Ptm-M distance increased significantly by DO (P distraction (T1) and by 12.69 to 97.84 ± 9.14 % at the end of long-term follow-up (T2). The correlation between sagittal maxillary advancement and nasal index was statistically significant (P maxillary advancement, the nasal index increased by 1.38 % and 1.8 % at the end of active distraction and long-term follow-up respectively. The advancement of maxilla by distraction osteogenesis among subjects with cleft lip and palate deformities increased nasal index significantly.

  8. A Computer Oriented Scheme for Coding Chemicals in the Field of Biomedicine.

    Science.gov (United States)

    Bobka, Marilyn E.; Subramaniam, J.B.

    The chemical coding scheme of the Medical Coding Scheme (MCS), developed for use in the Comparative Systems Laboratory (CSL), is outlined and evaluated in this report. The chemical coding scheme provides a classification scheme and encoding method for drugs and chemical terms. Using the scheme complicated chemical structures may be expressed…

  9. Performance Comparison of Grid-Faulty Control Schemes for Inverter-Based Industrial Microgrids

    Directory of Open Access Journals (Sweden)

    Antonio Camacho

    2017-12-01

    Full Text Available Several control schemes specifically designed to operate inverter-based industrial microgrids during voltage sags have been recently proposed. This paper first classifies these control schemes in three categories and then performs a comparative analysis of them. Representative control schemes of each category are selected, described and used to identify the main features and performance of the considered category. The comparison is based on the evaluation of several indexes, which measure the power quality of the installation and utility grid during voltage sags, including voltage regulation, reactive current injection and transient response. The paper includes selected simulation results from a 500 kVA industrial microgrid to validate the expected features of the considered control schemes. Finally, in view of the obtained results, the paper proposes an alternative solution to cope with voltage sags, which includes the use of a static compensator in parallel with the microgrid. The novelty of this proposal is the suitable selection of the control schemes for both the microgrid and the static compensator. The superior performance of the proposal is confirmed by the analysis of the quality indexes. Its practical limitations are also revealed, showing that the topic studied in this paper is still open for further research.

  10. Indexing Moving Points

    DEFF Research Database (Denmark)

    Agarwal, Pankaj K.; Arge, Lars Allan; Erickson, Jeff

    2003-01-01

    We propose three indexing schemes for storing a set S of N points in the plane, each moving along a linear trajectory, so that any query of the following form can be answered quickly: Given a rectangle R and a real value t, report all K points of S that lie inside R at time t. We first present an...

  11. Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Li Jiang

    2015-01-01

    selection and dynamic power allocation in order to maximize SC and to minimize energy consumption. Moreover, we consider finite-state Markov channels and residual relay energy in the relay selection and power allocation process. Specifically, the formulation of the proposed relay selection and power allocation scheme is based on the restless bandit problem, which is solved by the primal-dual index heuristic algorithm. Additionally, the obtained optimal relay selection policy has an indexability property that dramatically reduces the computational complexity. Numerical results are presented to show that our proposed scheme has the maximum SC and minimum energy consumption compared to the existing ones.

  12. A new relative hazard index

    International Nuclear Information System (INIS)

    Smith, C.F.; Burnett, T.W.T; Kastenberg, W.E.

    1976-01-01

    Several indexes for the evaluation of relative radionuclide hazards have been previously developed. In this paper, a new relative hazard index is derived for use in the assessment of the future burden to mankind from the presence of radionuclides in the environment. Important features of this hazard index are that it takes into account multiple decay schemes, non-equilibrium conditions, and finite time periods. As an application of this hazard index, a comparison is made between thermal reactor radioactive waste and the uranium required as fuel with the following conclusions: (1) For short time intervals (d 234 U breaking the uranium decay chain. (3) For long time intervals of concern (d >= 500 000 years), the reactor waste and consumed uranium indexes are equal after a much shorter decay time (approximately 10 years.) (author)

  13. Balanced Central Schemes for the Shallow Water Equations on Unstructured Grids

    Science.gov (United States)

    Bryson, Steve; Levy, Doron

    2004-01-01

    We present a two-dimensional, well-balanced, central-upwind scheme for approximating solutions of the shallow water equations in the presence of a stationary bottom topography on triangular meshes. Our starting point is the recent central scheme of Kurganov and Petrova (KP) for approximating solutions of conservation laws on triangular meshes. In order to extend this scheme from systems of conservation laws to systems of balance laws one has to find an appropriate discretization of the source terms. We first show that for general triangulations there is no discretization of the source terms that corresponds to a well-balanced form of the KP scheme. We then derive a new variant of a central scheme that can be balanced on triangular meshes. We note in passing that it is straightforward to extend the KP scheme to general unstructured conformal meshes. This extension allows us to recover our previous well-balanced scheme on Cartesian grids. We conclude with several simulations, verifying the second-order accuracy of our scheme as well as its well-balanced properties.

  14. Towards the ultimate variance-conserving convection scheme

    International Nuclear Information System (INIS)

    Os, J.J.A.M. van; Uittenbogaard, R.E.

    2004-01-01

    In the past various arguments have been used for applying kinetic energy-conserving advection schemes in numerical simulations of incompressible fluid flows. One argument is obeying the programmed dissipation by viscous stresses or by sub-grid stresses in Direct Numerical Simulation and Large Eddy Simulation, see e.g. [Phys. Fluids A 3 (7) (1991) 1766]. Another argument is that, according to e.g. [J. Comput. Phys. 6 (1970) 392; 1 (1966) 119], energy-conserving convection schemes are more stable i.e. by prohibiting a spurious blow-up of volume-integrated energy in a closed volume without external energy sources. In the above-mentioned references it is stated that nonlinear instability is due to spatial truncation rather than to time truncation and therefore these papers are mainly concerned with the spatial integration. In this paper we demonstrate that discretized temporal integration of a spatially variance-conserving convection scheme can induce non-energy conserving solutions. In this paper the conservation of the variance of a scalar property is taken as a simple model for the conservation of kinetic energy. In addition, the derivation and testing of a variance-conserving scheme allows for a clear definition of kinetic energy-conserving advection schemes for solving the Navier-Stokes equations. Consequently, we first derive and test a strictly variance-conserving space-time discretization for the convection term in the convection-diffusion equation. Our starting point is the variance-conserving spatial discretization of the convection operator presented by Piacsek and Williams [J. Comput. Phys. 6 (1970) 392]. In terms of its conservation properties, our variance-conserving scheme is compared to other spatially variance-conserving schemes as well as with the non-variance-conserving schemes applied in our shallow-water solver, see e.g. [Direct and Large-eddy Simulation Workshop IV, ERCOFTAC Series, Kluwer Academic Publishers, 2001, pp. 409-287

  15. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  16. A Blind Adaptive Color Image Watermarking Scheme Based on Principal Component Analysis, Singular Value Decomposition and Human Visual System

    Directory of Open Access Journals (Sweden)

    M. Imran

    2017-09-01

    Full Text Available A blind adaptive color image watermarking scheme based on principal component analysis, singular value decomposition, and human visual system is proposed. The use of principal component analysis to decorrelate the three color channels of host image, improves the perceptual quality of watermarked image. Whereas, human visual system and fuzzy inference system helped to improve both imperceptibility and robustness by selecting adaptive scaling factor, so that, areas more prone to noise can be added with more information as compared to less prone areas. To achieve security, location of watermark embedding is kept secret and used as key at the time of watermark extraction, whereas, for capacity both singular values and vectors are involved in watermark embedding process. As a result, four contradictory requirements; imperceptibility, robustness, security and capacity are achieved as suggested by results. Both subjective and objective methods are acquired to examine the performance of proposed schemes. For subjective analysis the watermarked images and watermarks extracted from attacked watermarked images are shown. For objective analysis of proposed scheme in terms of imperceptibility, peak signal to noise ratio, structural similarity index, visual information fidelity and normalized color difference are used. Whereas, for objective analysis in terms of robustness, normalized correlation, bit error rate, normalized hamming distance and global authentication rate are used. Security is checked by using different keys to extract the watermark. The proposed schemes are compared with state-of-the-art watermarking techniques and found better performance as suggested by results.

  17. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  18. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  19. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  20. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  1. KWIC Index to Government Publications

    Directory of Open Access Journals (Sweden)

    Margaret Norden

    2013-05-01

    Full Text Available United States and United Nations publications were not efficiently proc- essed nor readily available to the reader at Brandeis University Library. Data processing equipment was used to make a list of this material which could be referred to by a computer produced KWIC index. Currency and availability to the user, and time and cost efficiencies for the library were given precedence over detailed subject access. United States and United Nations classification schemes> and existing bibliographies and indexes were used extensively.

  2. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  3. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  4. An Adaptive Monitoring Scheme for Automatic Control of Anaesthesia in dynamic surgical environments based on Bispectral Index and Blood Pressure.

    Science.gov (United States)

    Yu, Yu-Ning; Doctor, Faiyaz; Fan, Shou-Zen; Shieh, Jiann-Shing

    2018-04-13

    During surgical procedures, bispectral index (BIS) is a well-known measure used to determine the patient's depth of anesthesia (DOA). However, BIS readings can be subject to interference from many factors during surgery, and other parameters such as blood pressure (BP) and heart rate (HR) can provide more stable indicators. However, anesthesiologist still consider BIS as a primary measure to determine if the patient is correctly anaesthetized while relaying on the other physiological parameters to monitor and ensure the patient's status is maintained. The automatic control of administering anesthesia using intelligent control systems has been the subject of recent research in order to alleviate the burden on the anesthetist to manually adjust drug dosage in response physiological changes for sustaining DOA. A system proposed for the automatic control of anesthesia based on type-2 Self Organizing Fuzzy Logic Controllers (T2-SOFLCs) has been shown to be effective in the control of DOA under simulated scenarios while contending with uncertainties due to signal noise and dynamic changes in pharmacodynamics (PD) and pharmacokinetic (PK) effects of the drug on the body. This study considers both BIS and BP as part of an adaptive automatic control scheme, which can adjust to the monitoring of either parameter in response to changes in the availability and reliability of BIS signals during surgery. The simulation of different control schemes using BIS data obtained during real surgical procedures to emulate noise and interference factors have been conducted. The use of either or both combined parameters for controlling the delivery Propofol to maintain safe target set points for DOA are evaluated. The results show that combing BIS and BP based on the proposed adaptive control scheme can ensure the target set points and the correct amount of drug in the body is maintained even with the intermittent loss of BIS signal that could otherwise disrupt an automated control system.

  5. Prognostic nutritional index predicts postoperative complications and long-term outcomes of gastric cancer.

    Science.gov (United States)

    Jiang, Nan; Deng, Jing-Yu; Ding, Xue-Wei; Ke, Bin; Liu, Ning; Zhang, Ru-Peng; Liang, Han

    2014-08-14

    To investigate the impact of prognostic nutritional index (PNI) on the postoperative complications and long-term outcomes in gastric cancer patients undergoing total gastrectomy. The data for 386 patients with gastric cancer were extracted and analyzed between January 2003 and December 2008 in our center. The patients were divided into two groups according to the cutoff value of the PNI: those with a PNI ≥ 46 and those with a PNI gastric cancer patients.

  6. Numerical Simulations of Reacting Flows Using Asynchrony-Tolerant Schemes for Exascale Computing

    Science.gov (United States)

    Cleary, Emmet; Konduri, Aditya; Chen, Jacqueline

    2017-11-01

    Communication and data synchronization between processing elements (PEs) are likely to pose a major challenge in scalability of solvers at the exascale. Recently developed asynchrony-tolerant (AT) finite difference schemes address this issue by relaxing communication and synchronization between PEs at a mathematical level while preserving accuracy, resulting in improved scalability. The performance of these schemes has been validated for simple linear and nonlinear homogeneous PDEs. However, many problems of practical interest are governed by highly nonlinear PDEs with source terms, whose solution may be sensitive to perturbations caused by communication asynchrony. The current work applies the AT schemes to combustion problems with chemical source terms, yielding a stiff system of PDEs with nonlinear source terms highly sensitive to temperature. Examples shown will use single-step and multi-step CH4 mechanisms for 1D premixed and nonpremixed flames. Error analysis will be discussed both in physical and spectral space. Results show that additional errors introduced by the AT schemes are negligible and the schemes preserve their accuracy. We acknowledge funding from the DOE Computational Science Graduate Fellowship administered by the Krell Institute.

  7. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  8. Supergravity modification of D-term hybrid inflation: Solving the cosmic string and spectral index problems via a right-handed sneutrino

    International Nuclear Information System (INIS)

    Lin Chiamin; McDonald, John

    2006-01-01

    Supergravity corrections due to the energy density of a right-handed sneutrino can generate a negative mass squared for the inflaton, flattening the inflaton potential and reducing the spectral index and inflaton energy density. For the case of D-term hybrid inflation, we show that the spectral index can be lowered from the conventional value n=0.98 to a value within the range favored by the latest WMAP analysis, n=0.951 -0.019 +0.015 . The modified energy density is consistent with nonobservation of cosmic strings in the CMB if n<0.946. The WMAP lower bound on the spectral index implies that the D-term cosmic string contribution may be very close present CMB limits, contributing at least 5% to the CMB multipoles

  9. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    International Nuclear Information System (INIS)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra; Kalogeropoulou, Christina; Pratikakis, Ioannis; Costaridou, Lena

    2015-01-01

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  10. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    Energy Technology Data Exchange (ETDEWEB)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra [Department of Medical Physics, School of Medicine,University of Patras, Patras 26504 (Greece); Kalogeropoulou, Christina [Department of Radiology, School of Medicine, University of Patras, Patras 26504 (Greece); Pratikakis, Ioannis [Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi 67100 (Greece); Costaridou, Lena, E-mail: costarid@upatras.gr [Department of Medical Physics, School of Medicine, University of Patras, Patras 26504 (Greece)

    2015-08-15

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  11. Semantic Indexing of Multimedia Content Using Visual, Audio, and Text Cues

    Directory of Open Access Journals (Sweden)

    W. H. Adams

    2003-02-01

    Full Text Available We present a learning-based approach to the semantic indexing of multimedia content using cues derived from audio, visual, and text features. We approach the problem by developing a set of statistical models for a predefined lexicon. Novel concepts are then mapped in terms of the concepts in the lexicon. To achieve robust detection of concepts, we exploit features from multiple modalities, namely, audio, video, and text. Concept representations are modeled using Gaussian mixture models (GMM, hidden Markov models (HMM, and support vector machines (SVM. Models such as Bayesian networks and SVMs are used in a late-fusion approach to model concepts that are not explicitly modeled in terms of features. Our experiments indicate promise in the proposed classification and fusion methodologies: our proposed fusion scheme achieves more than 10% relative improvement over the best unimodal concept detector.

  12. Detecting inter-annual variations in the phenology of evergreen conifers using long-term MODIS vegetation index time series.

    OpenAIRE

    Ulsig, Laura

    2016-01-01

    Long-term observations of vegetation phenology can be used to monitor the response of terrestrial ecosystems to climate change. Satellite remote sensing provides the most efficient means to observe phenological events through time series analysis of vegetation indices such as the Normalised Difference Vegetation Index (NDVI). This study investigates the potential of the Photochemical Reflectance Index (PRI), which has been linked to vegetation light use efficiency, to improve the accuracy of ...

  13. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  14. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  15. An Analysis of an Implicit Factored Scheme for Simulating Shock Waves

    Science.gov (United States)

    1988-05-01

    can cope with a wide range of boundary conditions and equations of state, For modelling -( shock waves in solids, elastic- plastic terms must also be...positive caracteristic speeds. One-sided schemes have superior dissipative and dispersive properties compared to those of centered schemes (Steger and...Elastic- plastic con. ditions must be- incorporated into the problem and usually the addition of suitable bource or sink terms to c-’ustion (1

  16. Self-adjusting entropy-stable scheme for compressible Euler equations

    International Nuclear Information System (INIS)

    Cheng Xiao-Han; Nie Yu-Feng; Cai Li; Feng Jian-Hu; Luo Xiao-Yu

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, which is based on entropy variables, is employed to make the numerical diffusion term be automatically added around discontinuities. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy. (paper)

  17. Evolving Stochastic Learning Algorithm based on Tsallis entropic index

    Science.gov (United States)

    Anastasiadis, A. D.; Magoulas, G. D.

    2006-03-01

    In this paper, inspired from our previous algorithm, which was based on the theory of Tsallis statistical mechanics, we develop a new evolving stochastic learning algorithm for neural networks. The new algorithm combines deterministic and stochastic search steps by employing a different adaptive stepsize for each network weight, and applies a form of noise that is characterized by the nonextensive entropic index q, regulated by a weight decay term. The behavior of the learning algorithm can be made more stochastic or deterministic depending on the trade off between the temperature T and the q values. This is achieved by introducing a formula that defines a time-dependent relationship between these two important learning parameters. Our experimental study verifies that there are indeed improvements in the convergence speed of this new evolving stochastic learning algorithm, which makes learning faster than using the original Hybrid Learning Scheme (HLS). In addition, experiments are conducted to explore the influence of the entropic index q and temperature T on the convergence speed and stability of the proposed method.

  18. Detecting Inter-Annual Variations in the Phenology of Evergreen Conifers Using Long-Term MODIS Vegetation Index Time Series

    OpenAIRE

    Ulsig, Laura; Nichol, Caroline J.; Huemmrich, Karl F.; Landis, David R.; Middleton, Elizabeth M.; Lyapustin, Alexei I.; Mammarella, Ivan; Levula, Janne; Porcar-Castell, Albert

    2017-01-01

    Long-term observations of vegetation phenology can be used to monitor the response of terrestrial ecosystems to climate change. Satellite remote sensing provides the most efficient means to observe phenological events through time series analysis of vegetation indices such as the Normalized Difference Vegetation Index (NDVI). This study investigates the potential of a Photochemical Reflectance Index (PRI), which has been linked to vegetation light use efficiency, to improve the accuracy of MO...

  19. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  20. Renormalization in self-consistent approximation schemes at finite temperature I: theory

    International Nuclear Information System (INIS)

    Hees, H. van; Knoll, J.

    2001-07-01

    Within finite temperature field theory, we show that truncated non-perturbative self-consistent Dyson resummation schemes can be renormalized with local counter-terms defined at the vacuum level. The requirements are that the underlying theory is renormalizable and that the self-consistent scheme follows Baym's Φ-derivable concept. The scheme generates both, the renormalized self-consistent equations of motion and the closed equations for the infinite set of counter terms. At the same time the corresponding 2PI-generating functional and the thermodynamic potential can be renormalized, in consistency with the equations of motion. This guarantees the standard Φ-derivable properties like thermodynamic consistency and exact conservation laws also for the renormalized approximation scheme to hold. The proof uses the techniques of BPHZ-renormalization to cope with the explicit and the hidden overlapping vacuum divergences. (orig.)

  1. Accuracy of spectral and finite difference schemes in 2D advection problems

    DEFF Research Database (Denmark)

    Naulin, V.; Nielsen, A.H.

    2003-01-01

    In this paper we investigate the accuracy of two numerical procedures commonly used to solve 2D advection problems: spectral and finite difference (FD) schemes. These schemes are widely used, simulating, e.g., neutral and plasma flows. FD schemes have long been considered fast, relatively easy...... that the accuracy of FD schemes can be significantly improved if one is careful in choosing an appropriate FD scheme that reflects conservation properties of the nonlinear terms and in setting up the grid in accordance with the problem....

  2. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  3. Malfunction diagnosis and applications of stable adaptive schemes for a nuclear reactor system

    International Nuclear Information System (INIS)

    Fukuda, Toshio; Shibata, Heki.

    1979-01-01

    Malfunction diagnosis concerns a method to detect the abnormal phenomena during nuclear reactor operations, while stable adaptive schemes does the application of Model Reference Adaptive System (MRAS) to the nonlinear dynamics of a reactor for parameter identification and control. The new method for the malfunction diagnosis consists of the following ideas; an index defined as the sum of ratios of the square of a factor score to the contribution weight of the factor, which is evaluated by applying the multi-factor analysis technique to the data of the state of nuclear reactor systems like neutron flux, temperature, flow rate and so on. The excess of the index over some given threshold shows the reactor system would be in an abnormal state. Then a theory of optimal filtering by Kalman with the aid of the stochastic approximation is applied to estimate the neutron flux distribution at its abnormal state and subsequently the squared sum of difference between desirable and estimated flux distributions shows the spot at which the abnormal phenomena would have occurred in terms of the peak of its distribution. Parameter identification and adaptive control schemes are presented for a point reactor and a loosely-coupled-core reactor with internal feedbacks which lead to the nonlinearity of the overall system. Both schemes are shown stable with new representations of the systems, which correspond to the nonminimal system representation, in the vein of the MRAS via the Lyapunov's method. For the sake of the parameter identification, model parameters can be adjusted adaptively as soon as measurements start, while plant parameters can also adaptively be compensated through control input to reduce the output error between the model and the plant for the case of the adaptive control. Some experiments of parameter identification for the thermal-hydraulic system are carried out successfully using a simplified channel in which flow rate is varied in a binary form. (J.P.N.)

  4. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  5. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  6. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  7. An efficient and provable secure revocable identity-based encryption scheme.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  8. Long-term screening for sleep apnoea in paced patients: preliminary assessment of a novel patient management flowchart by using automatic pacemaker indexes and sleep lab polygraphy.

    Science.gov (United States)

    Aimé, Ezio; Rovida, Marina; Contardi, Danilo; Ricci, Cristian; Gaeta, Maddalena; Innocenti, Ester; Cabral Tantchou-Tchoumi, Jacques

    2014-10-01

    The primary aim of this pilot study was to prospectively assess a flowchart to screen and diagnose paced patients (pts) affected by sleep apnoeas, by crosschecking indexes derived from pacemakers (minute ventilation sensor on-board) with Sleep-Lab Polygraphy (PG) outcomes. Secondarily, "smoothed" long-term pacemaker indexes (all the information between two consecutive follow-up visits) have been retrospectively compared vs. standard short-term pacemaker indexes (last 24h) at each follow-up (FU) visit, to test their correlation and diagnostic concordance. Data from long-term FU of 61 paced pts were collected. At each visit, the standard short-term apnoea+hypopnoea (PM_AHI) index was retrieved from the pacemaker memory. Patients showing PM_AHI ≥ 30 at least once during FU were proposed to undergo a PG for diagnostic confirmation. Smoothed pacemaker (PM_SAHI) indexes were calculated by averaging the overall number of apnoeas/hypopnoeas over the period between two FU visits, and retrospectively compared with standard PM_AHI. Data were available from 609 consecutive visits (overall 4.64 ± 1.78 years FU). PM_AHI indexes were positive during FU in 40/61 pts (65.6%); 26/40 pts (65%) accepted to undergo a PG recording; Sleep-Lab confirmed positivity in 22/26 pts (84.6% positive predictive value for PM_AHI). A strong correlation (r=0.73) and a high level of concordance were found between smoothed and standard indexes (multivariate analysis, Cohen's-k and Z-score tests). Pacemaker-derived indexes may help in screening paced pts potentially affected by sleep apnoeas. Long-term "smoothed" apnoea indexes could improve the accuracy of pacemaker screening capability, even though this hypothesis must be prospectively confirmed by larger studies. Copyright © 2014 Australian and New Zealand Society of Cardiac and Thoracic Surgeons (ANZSCTS) and the Cardiac Society of Australia and New Zealand (CSANZ). Published by Elsevier B.V. All rights reserved.

  9. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  10. Application of a robust and efficient Lagrangian particle scheme to soot transport in turbulent flames

    KAUST Repository

    Attili, Antonio

    2013-09-01

    A Lagrangian particle scheme is applied to the solution of soot dynamics in turbulent nonpremixed flames. Soot particulate is described using a method of moments and the resulting set of continuum advection-reaction equations is solved using the Lagrangian particle scheme. The key property of the approach is the independence between advection, described by the movement of Lagrangian notional particles along pathlines, and internal aerosol processes, evolving on each notional particle via source terms. Consequently, the method overcomes the issues in Eulerian grid-based schemes for the advection of moments: errors in the advective fluxes pollute the moments compromising their realizability and the stiffness of source terms weakens the stability of the method. The proposed scheme exhibits superior properties with respect to conventional Eulerian schemes in terms of stability, accuracy, and grid convergence. Taking into account the quality of the solution, the Lagrangian approach can be computationally more economical than commonly used Eulerian schemes as it allows the resolution requirements dictated by the different physical phenomena to be independently optimized. Finally, the scheme posseses excellent scalability on massively parallel computers. © 2013 Elsevier Ltd.

  11. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  12. Shortened version of the work ability index to identify workers at risk of long-term sickness absence

    NARCIS (Netherlands)

    Schouten, Lianne S.; Bultmann, Ute; Heymans, Martijn W.; Joling, Catelijne I.; Twisk, Jos W. R.; Roelen, Corne A. M.

    2016-01-01

    Background: The Work Ability Index (WAI) identifies non-sicklisted workers at risk of future long-term sickness absence (LTSA). The WAI is a complicated instrument and inconvenient for use in large-scale surveys. We investigated whether shortened versions of the WAI identify non-sicklisted workers

  13. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  14. Experimental comparison between speech transmission index, rapid speech transmission index, and speech intelligibility index.

    Science.gov (United States)

    Larm, Petra; Hongisto, Valtteri

    2006-02-01

    During the acoustical design of, e.g., auditoria or open-plan offices, it is important to know how speech can be perceived in various parts of the room. Different objective methods have been developed to measure and predict speech intelligibility, and these have been extensively used in various spaces. In this study, two such methods were compared, the speech transmission index (STI) and the speech intelligibility index (SII). Also the simplification of the STI, the room acoustics speech transmission index (RASTI), was considered. These quantities are all based on determining an apparent speech-to-noise ratio on selected frequency bands and summing them using a specific weighting. For comparison, some data were needed on the possible differences of these methods resulting from the calculation scheme and also measuring equipment. Their prediction accuracy was also of interest. Measurements were made in a laboratory having adjustable noise level and absorption, and in a real auditorium. It was found that the measurement equipment, especially the selection of the loudspeaker, can greatly affect the accuracy of the results. The prediction accuracy of the RASTI was found acceptable, if the input values for the prediction are accurately known, even though the studied space was not ideally diffuse.

  15. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  16. Spectral Index Changes with Brightness for γ-Ray Loud Blazars J. H. ...

    Indian Academy of Sciences (India)

    spectral index changes depending on γ-ray brightness is obtained. ... the γ-ray band. Key words. Active galactic nuclei (AGN): blazars: γ-ray emission: spectral index. 1. Introduction. Generally, the spectrum of one source changes with its .... Pearl River Scholar Funded Scheme (GDUPS) (2009), Yangcheng Scholar Funded.

  17. Long-term stable time integration scheme for dynamic analysis of planar geometrically exact Timoshenko beams

    Science.gov (United States)

    Nguyen, Tien Long; Sansour, Carlo; Hjiaj, Mohammed

    2017-05-01

    In this paper, an energy-momentum method for geometrically exact Timoshenko-type beam is proposed. The classical time integration schemes in dynamics are known to exhibit instability in the non-linear regime. The so-called Timoshenko-type beam with the use of rotational degree of freedom leads to simpler strain relations and simpler expressions of the inertial terms as compared to the well known Bernoulli-type model. The treatment of the Bernoulli-model has been recently addressed by the authors. In this present work, we extend our approach of using the strain rates to define the strain fields to in-plane geometrically exact Timoshenko-type beams. The large rotational degrees of freedom are exactly computed. The well-known enhanced strain method is used to avoid locking phenomena. Conservation of energy, momentum and angular momentum is proved formally and numerically. The excellent performance of the formulation will be demonstrated through a range of examples.

  18. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  19. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  20. A Part-Of-Speech term weighting scheme for biomedical information retrieval.

    Science.gov (United States)

    Wang, Yanshan; Wu, Stephen; Li, Dingcheng; Mehrabi, Saeed; Liu, Hongfang

    2016-10-01

    In the era of digitalization, information retrieval (IR), which retrieves and ranks documents from large collections according to users' search queries, has been popularly applied in the biomedical domain. Building patient cohorts using electronic health records (EHRs) and searching literature for topics of interest are some IR use cases. Meanwhile, natural language processing (NLP), such as tokenization or Part-Of-Speech (POS) tagging, has been developed for processing clinical documents or biomedical literature. We hypothesize that NLP can be incorporated into IR to strengthen the conventional IR models. In this study, we propose two NLP-empowered IR models, POS-BoW and POS-MRF, which incorporate automatic POS-based term weighting schemes into bag-of-word (BoW) and Markov Random Field (MRF) IR models, respectively. In the proposed models, the POS-based term weights are iteratively calculated by utilizing a cyclic coordinate method where golden section line search algorithm is applied along each coordinate to optimize the objective function defined by mean average precision (MAP). In the empirical experiments, we used the data sets from the Medical Records track in Text REtrieval Conference (TREC) 2011 and 2012 and the Genomics track in TREC 2004. The evaluation on TREC 2011 and 2012 Medical Records tracks shows that, for the POS-BoW models, the mean improvement rates for IR evaluation metrics, MAP, bpref, and P@10, are 10.88%, 4.54%, and 3.82%, compared to the BoW models; and for the POS-MRF models, these rates are 13.59%, 8.20%, and 8.78%, compared to the MRF models. Additionally, we experimentally verify that the proposed weighting approach is superior to the simple heuristic and frequency based weighting approaches, and validate our POS category selection. Using the optimal weights calculated in this experiment, we tested the proposed models on the TREC 2004 Genomics track and obtained average of 8.63% and 10.04% improvement rates for POS-BoW and POS

  1. Development scheme of the public power transportation network

    International Nuclear Information System (INIS)

    2005-01-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  2. An integrated scheme to improve pan-sharpening visual quality of satellite images

    Directory of Open Access Journals (Sweden)

    A.K. Helmy

    2015-03-01

    In experiments with IKONOS, Quick Bird and GeoEye satellite data, we demonstrated that our scheme has good spectral quality and efficiency. Spectral and spatial quality metrics in terms of SAM, RASE, RMSE, CC, ERGAS and QNR are used in our experiments. We compared our scheme with the state-of-the-art pan-sharpening techniques and found that our new scheme improved quantitative and qualitative results.

  3. QIM blind video watermarking scheme based on Wavelet transform and principal component analysis

    Directory of Open Access Journals (Sweden)

    Nisreen I. Yassin

    2014-12-01

    Full Text Available In this paper, a blind scheme for digital video watermarking is proposed. The security of the scheme is established by using one secret key in the retrieval of the watermark. Discrete Wavelet Transform (DWT is applied on each video frame decomposing it into a number of sub-bands. Maximum entropy blocks are selected and transformed using Principal Component Analysis (PCA. Quantization Index Modulation (QIM is used to quantize the maximum coefficient of the PCA blocks of each sub-band. Then, the watermark is embedded into the selected suitable quantizer values. The proposed scheme is tested using a number of video sequences. Experimental results show high imperceptibility. The computed average PSNR exceeds 45 dB. Finally, the scheme is applied on two medical videos. The proposed scheme shows high robustness against several attacks such as JPEG coding, Gaussian noise addition, histogram equalization, gamma correction, and contrast adjustment in both cases of regular videos and medical videos.

  4. Wind power and market integration, comparative study of financing schemes

    International Nuclear Information System (INIS)

    2013-10-01

    The financing scheme of renewable energies is a key factor for their development pace and cost. As some countries like France, Germany or Spain have chosen a Feed-in Tariff (FiT) scheme, there are in fact four possible financing schemes: FiT, ex-post prime, ex-ante prime, and quotas (green certificates). A market convergence is then supposed to meet two main objectives: the control of market distortions related to wind energy development, and the optimization of wind energy production with respect to market signals. The authors analyse the underlying economic challenges and the ability of financing schemes to meet these objectives within a short term horizon (2015). They present the different financing schemes, analyse the impact of three key economic factors (market distortion, production optimization, financing costs)

  5. Bursty data traffic via satellite: performance comparison between two TDMA access schemes

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Potort?, Francesco; Maral, Gerard

    1997-01-01

    This paper reports the simulation results of a performance comparison between two centralised thin route TDrvlA satellite access schemes, in terms of bursty data transmission delay in the context of LAN interconnection traffic. The schemes compared are CFRA' I, and FODA/IBEA'

  6. Flash Flood Hazard Susceptibility Mapping Using Frequency Ratio and Statistical Index Methods in Coalmine Subsidence Areas

    Directory of Open Access Journals (Sweden)

    Chen Cao

    2016-09-01

    Full Text Available This study focused on producing flash flood hazard susceptibility maps (FFHSM using frequency ratio (FR and statistical index (SI models in the Xiqu Gully (XQG of Beijing, China. First, a total of 85 flash flood hazard locations (n = 85 were surveyed in the field and plotted using geographic information system (GIS software. Based on the flash flood hazard locations, a flood hazard inventory map was built. Seventy percent (n = 60 of the flooding hazard locations were randomly selected for building the models. The remaining 30% (n = 25 of the flooded hazard locations were used for validation. Considering that the XQG used to be a coal mining area, coalmine caves and subsidence caused by coal mining exist in this catchment, as well as many ground fissures. Thus, this study took the subsidence risk level into consideration for FFHSM. The ten conditioning parameters were elevation, slope, curvature, land use, geology, soil texture, subsidence risk area, stream power index (SPI, topographic wetness index (TWI, and short-term heavy rain. This study also tested different classification schemes for the values for each conditional parameter and checked their impacts on the results. The accuracy of the FFHSM was validated using area under the curve (AUC analysis. Classification accuracies were 86.61%, 83.35%, and 78.52% using frequency ratio (FR-natural breaks, statistical index (SI-natural breaks and FR-manual classification schemes, respectively. Associated prediction accuracies were 83.69%, 81.22%, and 74.23%, respectively. It was found that FR modeling using a natural breaks classification method was more appropriate for generating FFHSM for the Xiqu Gully.

  7. Predicting Soil Strength in Terms of Cone Index and California Bearing Ratio for Trafficability

    Science.gov (United States)

    2016-03-01

    in Equation 4 (Anderson 1983). One can see the variation to Equation 1 (McDaniel and Smith 1971). Collins and Molthan suggested the lower and upper...and the amount of drainage, as defined by a wetness index term ( Collins 1971; Molthan 1967). ERDC/GSL TN-16-1 March 2016 4 2 123 0 008 0 693 4...since its development in the 1940s. It was devised by Jim Porter ( 1 9 5 0 ) of the California Division of Highways. Porter developed curves showing the

  8. A Classification Scheme for Glaciological AVA Responses

    Science.gov (United States)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  9. Multi-criteria decision-making on assessment of proposed tidal barrage schemes in terms of environmental impacts.

    Science.gov (United States)

    Wu, Yunna; Xu, Chuanbo; Ke, Yiming; Chen, Kaifeng; Xu, Hu

    2017-12-15

    For tidal range power plants to be sustainable, the environmental impacts caused by the implement of various tidal barrage schemes must be assessed before construction. However, several problems exist in the current researches: firstly, evaluation criteria of the tidal barrage schemes environmental impact assessment (EIA) are not adequate; secondly, uncertainty of criteria information fails to be processed properly; thirdly, correlation among criteria is unreasonably measured. Hence the contributions of this paper are as follows: firstly, an evaluation criteria system is established from three dimensions of hydrodynamic, biological and morphological aspects. Secondly, cloud model is applied to describe the uncertainty of criteria information. Thirdly, Choquet integral with respect to λ-fuzzy measure is introduced to measure the correlation among criteria. On the above bases, a multi-criteria decision-making decision framework for tidal barrage scheme EIA is established to select the optimal scheme. Finally, a case study demonstrates the effectiveness of the proposed framework. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Setting aside Transactions from Pyramid Schemes as Impeachable Dispositions under South African Insolvency Legislation

    Directory of Open Access Journals (Sweden)

    Zingapi Mabe

    2016-10-01

    Full Text Available South African courts have experienced a rise in the number of cases involving schemes that promise a return on investment with interest rates which are considerably above the maximum amount allowed by law, or schemes which promise compensation from the active recruitment of participants. These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme’s eventual collapse and insolvency. Investors who received pay-outs from the scheme find themselves in the defence against the trustee’s claims for the return of the pay-outs to the insolvent estate. As the schemes are illegal and the pay-outs are often in terms of void agreements, the question arises whether they can be returned to the insolvent estate. A similar situation arose in Griffiths v Janse van Rensburg 2015 ZASCA 158 (26 October 2015. The point of contention in this case was whether the illegality of the business of the scheme was a relevant consideration in determining whether the pay-outs were made in the ordinary course of business of the scheme. This paper discusses pyramid schemes in the context of impeachable dispositions in terms of the Insolvency Act 24 of 1936.

  11. Optimization of a middle atmosphere diagnostic scheme

    Science.gov (United States)

    Akmaev, Rashid A.

    1997-06-01

    A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.

  12. Performance of the Goddard multiscale modeling framework with Goddard ice microphysical schemes

    Science.gov (United States)

    Chern, Jiun-Dar; Tao, Wei-Kuo; Lang, Stephen E.; Matsui, Toshihisa; Li, J.-L. F.; Mohr, Karen I.; Skofronick-Jackson, Gail M.; Peters-Lidard, Christa D.

    2016-03-01

    The multiscale modeling framework (MMF), which replaces traditional cloud parameterizations with cloud-resolving models (CRMs) within a host atmospheric general circulation model (GCM), has become a new approach for climate modeling. The embedded CRMs make it possible to apply CRM-based cloud microphysics directly within a GCM. However, most such schemes have never been tested in a global environment for long-term climate simulation. The benefits of using an MMF to evaluate rigorously and improve microphysics schemes are here demonstrated. Four one-moment microphysical schemes are implemented into the Goddard MMF and their results validated against three CloudSat/CALIPSO cloud ice products and other satellite data. The new four-class (cloud ice, snow, graupel, and frozen drops/hail) ice scheme produces a better overall spatial distribution of cloud ice amount, total cloud fractions, net radiation, and total cloud radiative forcing than earlier three-class ice schemes, with biases within the observational uncertainties. Sensitivity experiments are conducted to examine the impact of recently upgraded microphysical processes on global hydrometeor distributions. Five processes dominate the global distributions of cloud ice and snow amount in long-term simulations: (1) allowing for ice supersaturation in the saturation adjustment, (2) three additional correction terms in the depositional growth of cloud ice to snow, (3) accounting for cloud ice fall speeds, (4) limiting cloud ice particle size, and (5) new size-mapping schemes for snow and graupel. Despite the cloud microphysics improvements, systematic errors associated with subgrid processes, cyclic lateral boundaries in the embedded CRMs, and momentum transport remain and will require future improvement.

  13. Nonstandard approximation schemes for lower dimensional quantum field theories

    International Nuclear Information System (INIS)

    Fitzpatrick, D.A.

    1981-01-01

    The purpose of this thesis has been to apply two different nonstandard approximation schemes to a variety of lower-dimensional schemes. In doing this, we show their applicability where (e.g., Feynman or Rayleigh-Schroedinger) approximation schemes are inapplicable. We have applied the well-known mean-field approximation scheme by Guralnik et al. to general lower dimensional theories - the phi 4 field theory in one dimension, and the massive and massless Thirring models in two dimensions. In each case, we derive a bound-state propagator and then expand the theory in terms of the original and bound-state propagators. The results obtained can be compared with previously known results thereby show, in general, reasonably good convergence. In the second half of the thesis, we develop a self-consistent quantum mechanical approximation scheme. This can be applied to any monotonic polynomial potential. It has been applied in detail to the anharmonic oscillator, and the results in several analytical domains are very good, including extensive tables of numerical results

  14. Application of the symplectic finite-difference time-domain scheme to electromagnetic simulation

    International Nuclear Information System (INIS)

    Sha, Wei; Huang, Zhixiang; Wu, Xianliang; Chen, Mingsheng

    2007-01-01

    An explicit fourth-order finite-difference time-domain (FDTD) scheme using the symplectic integrator is applied to electromagnetic simulation. A feasible numerical implementation of the symplectic FDTD (SFDTD) scheme is specified. In particular, new strategies for the air-dielectric interface treatment and the near-to-far-field (NFF) transformation are presented. By using the SFDTD scheme, both the radiation and the scattering of three-dimensional objects are computed. Furthermore, the energy-conserving characteristic hold for the SFDTD scheme is verified under long-term simulation. Numerical results suggest that the SFDTD scheme is more efficient than the traditional FDTD method and other high-order methods, and can save computational resources

  15. Barriers to Co-Contribution in Superannuation: a Comparative Assessment of the Financial Benefits of Scheme Participation

    Directory of Open Access Journals (Sweden)

    Aaron Bruhn

    2013-09-01

    Full Text Available Voluntary superannuation contributions provide a means for individuals to top-up their savings in a tax advantaged environment. In order to encourage voluntary contributions the government instituted the cocontribution scheme in 2003. Under the existing scheme, within a given financial year the government contributes up to a maximum of $500 when an individual on a low income makes a voluntary contribution of up to $1,000. Despite the apparent financial attractiveness of the scheme, participation among eligible persons is low. Reasons may include competing expenditure needs leading to a lack of sufficient funds for contribution, lack of trust in the system given regular changes to superannuation policy, and behavioural reasons including a short-term rather than long-term focus, procrastination from uncertainty and fear of regret, and loss aversion. In this paper we investigate another possible reason for low participation, namely poor financial opportunity cost. While an immediate 50% investment return may appear to be a ‘no-brainer’, for eligible individuals or families with mortgages, scheme participation may in fact not be optimal. We investigate the relative benefit of scheme participation versus reducing a mortgage, and conclude that while participation is sensible for those with short remaining mortgage terms, for those with longer mortgage terms the decision to participate may not be preferred unless one assumes generous long-term superannuation investment returns, or unless scheme participation is intended year on year for long durations.

  16. Numerical Schemes for Rough Parabolic Equations

    Energy Technology Data Exchange (ETDEWEB)

    Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  17. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  18. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  19. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  20. Performance analysis of joint diversity combining, adaptive modulation, and power control schemes

    KAUST Repository

    Qaraqe, Khalid A.

    2011-01-01

    Adaptive modulation and diversity combining represent very important adaptive solutions for future generations of wireless communication systems. Indeed, in order to improve the performance and the efficiency of these systems, these two techniques have been recently used jointly in new schemes named joint adaptive modulation and diversity combining (JAMDC) schemes. Considering the problem of finding low hardware complexity, bandwidth-efficient, and processing-power efficient transmission schemes for a downlink scenario and capitalizing on some of these recently proposed JAMDC schemes, we propose and analyze in this paper three joint adaptive modulation, diversity combining, and power control (JAMDCPC) schemes where a constant-power variable-rate adaptive modulation technique is used with an adaptive diversity combining scheme and a common power control process. More specifically, the modulation constellation size, the number of combined diversity paths, and the needed power level are jointly determined to achieve the highest spectral efficiency with the lowest possible processing power consumption quantified in terms of the average number of combined paths, given the fading channel conditions and the required bit error rate (BER) performance. In this paper, the performance of these three JAMDCPC schemes is analyzed in terms of their spectral efficiency, processing power consumption, and error-rate performance. Selected numerical examples show that these schemes considerably increase the spectral efficiency of the existing JAMDC schemes with a slight increase in the average number of combined paths for the low signal-to-noise ratio range while maintaining compliance with the BER performance and a low radiated power which yields to a substantial decrease in interference to co-existing users and systems. © 2011 IEEE.

  1. Analysis of load balance in hybrid partitioning | Talib | Botswana ...

    African Journals Online (AJOL)

    In information retrieval systems, there are three types of index partitioning schemes - term partitioning, document partitioning, and hybrid partitioning. The hybrid-partitioning scheme combines both term and document partitioning schemes. Term partitioning provides high concurrency, which means that queries can be ...

  2. A Novel Congestion Detection Scheme in TCP Over OBS Networks

    KAUST Repository

    Shihada, Basem

    2009-02-01

    This paper introduces a novel congestion detection scheme for high-bandwidth TCP flows over optical burst switching (OBS) networks, called statistical additive increase multiplicative decrease (SAIMD). SAIMD maintains and analyzes a number of previous round-trip time (RTTs) at the TCP senders in order to identify the confidence with which a packet loss event is due to network congestion. The confidence is derived by positioning short-term RTT in the spectrum of long-term historical RTTs. The derived confidence corresponding to the packet loss is then taken in the developed policy for TCP congestion window adjustment. We will show through extensive simulation that the proposed scheme can effectively solve the false congestion detection problem and significantly outperform the conventional TCP counterparts without losing fairness. The advantages gained in our scheme are at the expense of introducing more overhead in the SAIMD TCP senders. Based on the proposed congestion control algorithm, a throughput model is formulated, and is further verified by simulation results.

  3. Arbitrary Dimension Convection-Diffusion Schemes for Space-Time Discretizations

    Energy Technology Data Exchange (ETDEWEB)

    Bank, Randolph E. [Univ. of California, San Diego, CA (United States); Vassilevski, Panayot S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zikatanov, Ludmil T. [Bulgarian Academy of Sciences, Sofia (Bulgaria)

    2016-01-20

    This note proposes embedding a time dependent PDE into a convection-diffusion type PDE (in one space dimension higher) with singularity, for which two discretization schemes, the classical streamline-diffusion and the EAFE (edge average finite element) one, are investigated in terms of stability and error analysis. The EAFE scheme, in particular, is extended to be arbitrary order which is of interest on its own. Numerical results, in combined space-time domain demonstrate the feasibility of the proposed approach.

  4. An evaluation of a working memory training scheme in older adults

    Directory of Open Access Journals (Sweden)

    Laura Patricia McAvinue

    2013-05-01

    Full Text Available Working memory is a cognitive process that is particularly vulnerable to decline with age. The current study sought to evaluate the efficacy of a working memory training scheme in improving memory in a group of older adults. A 5-week online training scheme was designed to provide training in the main components of Baddeley’s (2000 working memory model, namely auditory and visuospatial short-term and working memory. A group of older adults aged between 64 and 79 were randomly assigned to a trainee (n = 19 or control (n = 17 group, with trainees engaging in the adaptive training scheme and controls engaging in a non-adaptive version of the programme. Before and after training and at 3- and 6-month follow-up sessions, trainees and controls were asked to complete measures of short-term and working memory, long-term episodic memory, subjective ratings of memory and attention and achievement of goals set at the beginning of training. The results provided evidence of an expansion of auditory short-term memory span, which was maintained 6 months later, and transfer to long-term episodic memory but no evidence of improvement in working memory capacity per se. A serendipitous and intriguing finding of a relationship between time spent training, psychological stress and training gains provided further insight into individual differences in training gains in older adults.

  5. Analytical expression of giant Goos-Hänchen shift in terms of proper and improper modes in waveguide structures with arbitrary refractive index profile.

    Science.gov (United States)

    Alishahi, Fatemeh; Mehrany, Khashayar

    2010-06-01

    We analytically relate the giant Goos-Hänchen shift, observed at the interface of a high refractive index prism and a waveguide structure with an arbitrary refractive index profile, to the spatial resonance phenomenon. The proximity effect of the high refractive index prism on modal properties of the waveguide is discussed, and the observed shift is expressed in terms of proper and improper electromagnetic modes supported by the waveguide with no prism. The transversely increasing improper modes are shown playing an increasingly important role as the high refractive index prism comes closer to the waveguide.

  6. KWIC Index to Government Publications

    OpenAIRE

    Norden, Margaret

    2013-01-01

    United States and United Nations publications were not efficiently proc- essed nor readily available to the reader at Brandeis University Library. Data processing equipment was used to make a list of this material which could be referred to by a computer produced KWIC index. Currency and availability to the user, and time and cost efficiencies for the library were given precedence over detailed subject access. United States and United Nations classification schemes> and existing bibliograp...

  7. Adaptive Watermarking Scheme Using Biased Shift of Quantization Index

    Directory of Open Access Journals (Sweden)

    Young-Ho Seo

    2010-01-01

    Full Text Available We propose a watermark embedding and extracting method for blind watermarking. It uses the characteristics of a scalar quantizer to comply with the recommendation in JPEG, MPEG series, or JPEG2000. Our method performs embedding of a watermark bit by shifting the corresponding frequency transform coefficient (the watermark position to a quantization index according to the value of the watermark bit, which prevents from losing the watermark information during the data compression process. The watermark can be embedded simultaneously to the quantization process without an additional process for watermarking, which means it can be performed at the same speed to the compression process. In the embedding process, a Linear Feedback Shift Register (LFSR is used to hide the watermark informations and the watermark positions. The experimental results showed that the proposed method satisfies enough robustness and imperceptibility that are the major requirements for watermarking.

  8. A reduced feedback proportional fair multiuser scheduling scheme

    KAUST Repository

    Shaqfeh, Mohammad

    2011-12-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed and ordered scheduling mechanism. A slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we propose a novel proportional fair multiuser switched-diversity scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the per-user feedback thresholds. We demonstrate by numerical examples that our reduced feedback proportional fair scheduler operates within 0.3 bits/sec/Hz from the achievable rates by the conventional full feedback proportional fair scheduler in Rayleigh fading conditions. © 2011 IEEE.

  9. Hygienic evaluation of repurification schemes for waste waters containing complexes for organic substances

    Energy Technology Data Exchange (ETDEWEB)

    Bulgakov, R G

    1983-01-01

    Sanitary-chemical and sanitary-toxicological methods were used to study two repurification schemes for biologically purified waste waters from a petrochemical industrial complex. These repurification schemes were, (1) filtration through quartz sand, adsorption to activated charcoal, chlorination; (2) coagulation, filtration through quartz sand, adsorption to activated charcoal, chlorination. Both repurification schemes considerably improved the composition and properties of the waste waters in terms of organoleptic and sanitary-chemical indices. Scheme 1 also considerably lowered the toxic properties of the waste waters and Scheme 2 abolished them completely. Provided that the corresponding sanitary norms are observed, the use of repurification Scheme 1 would be economically reasonable where repurified waste water is recirculated in the industrial plant. Repurification Scheme 2 is recommended where purified waste water is disposed into low-capacity reservoirs.

  10. A Suboptimal Scheme for Multi-User Scheduling in Gaussian Broadcast Channels

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Shaqfeh, Mohammad

    2014-01-01

    This work proposes a suboptimal multi-user scheduling scheme for Gaussian broadcast channels which improves upon the classical single user selection, while considerably reducing complexity as compared to the optimal superposition coding with successful interference cancellation. The proposed scheme combines the two users with the maximum weighted instantaneous rate using superposition coding. The instantaneous rate and power allocation are derived in closed-form, while the long term rate of each user is derived in integral form for all channel distributions. Numerical results are then provided to characterize the prospected gains of the proposed scheme.

  11. A Suboptimal Scheme for Multi-User Scheduling in Gaussian Broadcast Channels

    KAUST Repository

    Zafar, Ammar

    2014-05-28

    This work proposes a suboptimal multi-user scheduling scheme for Gaussian broadcast channels which improves upon the classical single user selection, while considerably reducing complexity as compared to the optimal superposition coding with successful interference cancellation. The proposed scheme combines the two users with the maximum weighted instantaneous rate using superposition coding. The instantaneous rate and power allocation are derived in closed-form, while the long term rate of each user is derived in integral form for all channel distributions. Numerical results are then provided to characterize the prospected gains of the proposed scheme.

  12. Meal box schemes as a convenient way to avoid convenience food?

    DEFF Research Database (Denmark)

    Hertz, Frej; Halkier, Bente

    2017-01-01

    to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical......The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological...

  13. Ulam's scheme revisited digital modeling of chaotic attractors via micro-perturbations

    CERN Document Server

    Domokos, Gabor K

    2002-01-01

    We consider discretizations $f_N$ of expanding maps $f:I \\to I$ in the strict sense: i.e. we assume that the only information available on the map is a finite set of integers. Using this definition for computability, we show that by adding a random perturbation of order $1/N$, the invariant measure corresponding to $f$ can be approximated and we can also give estimates of the error term. We prove that the randomized discrete scheme is equivalent to Ulam's scheme applied to the polygonal approximation of $f$, thus providing a new interpretation of Ulam's scheme. We also compare the efficiency of the randomized iterative scheme to the direct solution of the $N \\times N$ linear system.

  14. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha

    2010-05-01

    To improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels, we propose a cooperation scheme where the relay uses a modulation whose order is higher than the one at the source. In a new common framework, we show that the proposed scheme offers considerable gains - in terms of achievable information rates - compared to the conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay cooperation. This allows us to propose an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  15. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  16. Applying a new computer-aided detection scheme generated imaging marker to predict short-term breast cancer risk

    Science.gov (United States)

    Mirniaharikandehei, Seyedehnafiseh; Hollingsworth, Alan B.; Patel, Bhavika; Heidari, Morteza; Liu, Hong; Zheng, Bin

    2018-05-01

    This study aims to investigate the feasibility of identifying a new quantitative imaging marker based on false-positives generated by a computer-aided detection (CAD) scheme to help predict short-term breast cancer risk. An image dataset including four view mammograms acquired from 1044 women was retrospectively assembled. All mammograms were originally interpreted as negative by radiologists. In the next subsequent mammography screening, 402 women were diagnosed with breast cancer and 642 remained negative. An existing CAD scheme was applied ‘as is’ to process each image. From CAD-generated results, four detection features including the total number of (1) initial detection seeds and (2) the final detected false-positive regions, (3) average and (4) sum of detection scores, were computed from each image. Then, by combining the features computed from two bilateral images of left and right breasts from either craniocaudal or mediolateral oblique view, two logistic regression models were trained and tested using a leave-one-case-out cross-validation method to predict the likelihood of each testing case being positive in the next subsequent screening. The new prediction model yielded the maximum prediction accuracy with an area under a ROC curve of AUC  =  0.65  ±  0.017 and the maximum adjusted odds ratio of 4.49 with a 95% confidence interval of (2.95, 6.83). The results also showed an increasing trend in the adjusted odds ratio and risk prediction scores (p  breast cancer risk.

  17. Screening manual and office workers for risk of long-term sickness absence: cut-off points for the Work Ability Index

    NARCIS (Netherlands)

    Schouten, L.S.; Joling, C.I.; van der Gulden, J.W.J.; Heymans, M.W.; Bultmann, U.; Roelen, C.A.M.

    2015-01-01

    OBJECTIVES: The aim of this study was to investigate the Work Ability Index (WAI) as a tool to screen for risk of different durations of long-term sickness absence (LTSA) among manual and office workers.

  18. Efficient scheme for parametric fitting of data in arbitrary dimensions.

    Science.gov (United States)

    Pang, Ning-Ning; Tzeng, Wen-Jer; Kao, Hisen-Ching

    2008-07-01

    We propose an efficient scheme for parametric fitting expressed in terms of the Legendre polynomials. For continuous systems, our scheme is exact and the derived explicit expression is very helpful for further analytical studies. For discrete systems, our scheme is almost as accurate as the method of singular value decomposition. Through a few numerical examples, we show that our algorithm costs much less CPU time and memory space than the method of singular value decomposition. Thus, our algorithm is very suitable for a large amount of data fitting. In addition, the proposed scheme can also be used to extract the global structure of fluctuating systems. We then derive the exact relation between the correlation function and the detrended variance function of fluctuating systems in arbitrary dimensions and give a general scaling analysis.

  19. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Directory of Open Access Journals (Sweden)

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  20. Central upwind scheme for a compressible two-phase flow model.

    Science.gov (United States)

    Ahmed, Munshoor; Saleem, M Rehan; Zia, Saqib; Qamar, Shamsul

    2015-01-01

    In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS) and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.

  1. Central upwind scheme for a compressible two-phase flow model.

    Directory of Open Access Journals (Sweden)

    Munshoor Ahmed

    Full Text Available In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.

  2. Well-balanced schemes for the Euler equations with gravitation: Conservative formulation using global fluxes

    Science.gov (United States)

    Chertock, Alina; Cui, Shumo; Kurganov, Alexander; Özcan, Şeyma Nur; Tadmor, Eitan

    2018-04-01

    We develop a second-order well-balanced central-upwind scheme for the compressible Euler equations with gravitational source term. Here, we advocate a new paradigm based on a purely conservative reformulation of the equations using global fluxes. The proposed scheme is capable of exactly preserving steady-state solutions expressed in terms of a nonlocal equilibrium variable. A crucial step in the construction of the second-order scheme is a well-balanced piecewise linear reconstruction of equilibrium variables combined with a well-balanced central-upwind evolution in time, which is adapted to reduce the amount of numerical viscosity when the flow is at (near) steady-state regime. We show the performance of our newly developed central-upwind scheme and demonstrate importance of perfect balance between the fluxes and gravitational forces in a series of one- and two-dimensional examples.

  3. A Printer Indexing System for Color Calibration with Applications in Dietary Assessment.

    Science.gov (United States)

    Fang, Shaobo; Liu, Chang; Zhu, Fengqing; Boushey, Carol; Delp, Edward

    2015-09-01

    In image based dietary assessment, color is a very important feature in food identification. One issue with using color in image analysis in the calibration of the color imaging capture system. In this paper we propose an indexing system for color camera calibration using printed color checkerboards also known as fiducial markers (FMs). To use the FM for color calibration one must know which printer was used to print the FM so that the correct color calibration matrix can be used for calibration. We have designed a printer indexing scheme that allows one to determine which printer was used to print the FM based on a unique arrangement of color squares and binarized marks (used for error control) printed on the FM. Using normalized cross correlation and pattern detection, the index corresponding to the printer for a particular FM can be determined. Our experimental results show this scheme is robust against most types of lighting conditions.

  4. Intramyocellular lipid content and insulin sensitivity are increased following a short-term low-glycemic index diet and exercise intervention

    DEFF Research Database (Denmark)

    Haus, Jacob M; Solomon, Thomas; Lu, Lan

    2011-01-01

    The relationship between intramyocellular (IMCL) and extramyocellular lipid (EMCL) accumulation and skeletal muscle insulin resistance is complex and dynamic. We examined the effect of a short-term (7-day) low-glycemic index (LGI) diet and aerobic exercise training intervention (EX) on IMCL and i...

  5. Second-order splitting schemes for a class of reactive systems

    International Nuclear Information System (INIS)

    Ren Zhuyin; Pope, Stephen B.

    2008-01-01

    We consider the numerical time integration of a class of reaction-transport systems that are described by a set of ordinary differential equations for primary variables. In the governing equations, the terms involved may require the knowledge of secondary variables, which are functions of the primary variables. Specifically, we consider the case where, given the primary variables, the evaluation of the secondary variables is computationally expensive. To solve this class of reaction-transport equations, we develop and demonstrate several computationally efficient splitting schemes, wherein the portions of the governing equations containing chemical reaction terms are separated from those parts containing the transport terms. A computationally efficient solution to the transport sub-step is achieved through the use of linearization or predictor-corrector methods. The splitting schemes are applied to the reactive flow in a continuously stirred tank reactor (CSTR) with the Davis-Skodjie reaction model, to the CO+H 2 oxidation in a CSTR with detailed chemical kinetics, and to a reaction-diffusion system with an extension of the Oregonator model of the Belousov-Zhabotinsky reaction. As demonstrated in the test problems, the proposed splitting schemes, which yield efficient solutions to the transport sub-step, achieve second-order accuracy in time

  6. Galilean invariant lattice Boltzmann scheme for natural convection on square and rectangular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In this paper we present lattice Boltzmann (LB) schemes for convection diffusion coupled to fluid flow on two-dimensional rectangular lattices. Via inverse Chapman-Enskog analysis of LB schemes including source terms, we show that for consistency with physics it is required that the moments of the

  7. Utilization of health-care schemes: A ground reality of Indian scenario

    Directory of Open Access Journals (Sweden)

    Aditi Sharma

    2018-01-01

    Full Text Available Health-care system in a society must be built around the term of equity so that each individual should have equal opportunities for maintaining good health, but human societies are characterized by unevenness at every aspect, and it has even not spared the health-care system. Despite great improvements in the oral health status of population across the world, health problems continue to be a major public health concern. India's health system faces the ongoing challenge of responding to the needs of the most disadvantaged groups of the society. Thus, to reduce inequalities in health and ensuring equity in oral health care, India as one of the developing countries in the world have taken steps at center as well as state level to bridge the gap between poor and rich in terms of health care. These schemes are built to touch the lives of the remotest people in the country. The government is boosting its strategies and augmenting its reach mechanisms to ensure that not a soul is dispossessed of any benefits, which arise from the virtue of this scheme. The present review concludes that though these schemes appear to be pro-poor and are inclusive of disadvantaged minorities, the scheme suffers from adverse selection. These schemes have the potential to play an important role in India's move toward universal health coverage.

  8. Green frame aggregation scheme for Wi-Fi networks

    KAUST Repository

    Alaslani, Maha S.

    2015-07-01

    Frame aggregation is a major enhancement in the IEEE 802.11 family to boost the network performance. The increasing awareness about energy efficiency motivates the re-think of frame aggregation design. In this paper, we propose a novel Green Frame Aggregation (GFA) scheduling scheme that optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects an optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel. This scheme is implemented and evaluated using a testbed deployment. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy efficiency by about 6x in the presence of severe interference conditions. Moreover, GFA outperforms the static frame sizing method in terms of network goodput while maintaining the same end-to-end latency.

  9. Prospective and retrospective spatial sampling scheme to characterize geochemicals in a mine tailings area

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2009-07-01

    Full Text Available This study demonstrates that designing sampling schemes using simulated annealing results in much better selection of samples from an existing scheme in terms of prediction accuracy. The presentation to the SASA Eastern Cape Chapter as an invited...

  10. The complete flux scheme in cylindrical coordinates

    NARCIS (Netherlands)

    Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.

    2014-01-01

    We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection

  11. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  12. Meal box schemes a convenient way to avoid convenience food? Uses and understandings of meal box schemes among Danish consumers.

    Science.gov (United States)

    Hertz, Frej Daniel; Halkier, Bente

    2017-07-01

    The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Index files for Belle II - very small skim containers

    Science.gov (United States)

    Sevior, Martin; Bloomfield, Tristan; Kuhr, Thomas; Ueda, I.; Miyake, H.; Hara, T.

    2017-10-01

    The Belle II experiment[1] employs the root file format[2] for recording data and is investigating the use of “index-files” to reduce the size of data skims. These files contain pointers to the location of interesting events within the total Belle II data set and reduce the size of data skims by 2 orders of magnitude. We implement this scheme on the Belle II grid by recording the parent file metadata and the event location within the parent file. While the scheme works, it is substantially slower than a normal sequential read of standard skim files using default root file parameters. We investigate the performance of the scheme by adjusting the “splitLevel” and “autoflushsize” parameters of the root files in the parent data files.

  14. 32 CFR 701.39 - Vaughn index.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Vaughn index. 701.39 Section 701.39 National... DOCUMENTS AFFECTING THE PUBLIC FOIA Definitions and Terms § 701.39 Vaughn index. Itemized index, correlating... agency's nondisclosure justification. The index may contain such information as: date of document...

  15. Note of the 20 December 2016 on the elaboration of regional biomass schemes

    International Nuclear Information System (INIS)

    Michel, Laurent; GESLAIN-LANEELLE, Catherine

    2016-01-01

    This official note informs Region prefects on modalities of elaboration of regional biomass schemes, and provides them with data on mobilizable biomass resources at the regional level. It briefly presents the legal framework of the scheme elaboration, the elaboration agenda, and the scope of usages of biomass to be considered within the scheme. It discusses the articulation between regional and national schemes, from a global point of view as well as in terms works of elaboration. It briefly describes how the regional scheme is to be assessed. Appendices present planning and programming elements to be taken into account, elements of explanation for the regional biomass table, institutions represented in the information and orientation committee of the national scheme, and regional biomass tables which contain detailed assessments of the various biomass resources for each French region

  16. NSVZ scheme with the higher derivative regularization for N=1 SQED

    International Nuclear Information System (INIS)

    Kataev, A.L.; Stepanyantz, K.V.

    2013-01-01

    The exact NSVZ relation between a β-function of N=1 SQED and an anomalous dimension of the matter superfields is studied within the Slavnov higher derivative regularization approach. It is shown that if the renormalization group functions are defined in terms of the bare coupling constant, this relation is always valid. In the renormalized theory the NSVZ relation is obtained in the momentum subtraction scheme supplemented by a special finite renormalization. Unlike the dimensional reduction, the higher derivative regularization allows to fix this finite renormalization. This is made by imposing the conditions Z 3 (α,μ=Λ)=1 and Z(α,μ=Λ)=1 on the renormalization constants of N=1 SQED, where Λ is a parameter in the higher derivative term. The results are verified by the explicit three-loop calculation. In this approximation we relate the DR ¯ scheme and the NSVZ scheme defined within the higher derivative approach by the finite renormalization

  17. Structural and parameteric uncertainty quantification in cloud microphysics parameterization schemes

    Science.gov (United States)

    van Lier-Walqui, M.; Morrison, H.; Kumjian, M. R.; Prat, O. P.; Martinkus, C.

    2017-12-01

    Atmospheric model parameterization schemes employ approximations to represent the effects of unresolved processes. These approximations are a source of error in forecasts, caused in part by considerable uncertainty about the optimal value of parameters within each scheme -- parameteric uncertainty. Furthermore, there is uncertainty regarding the best choice of the overarching structure of the parameterization scheme -- structrual uncertainty. Parameter estimation can constrain the first, but may struggle with the second because structural choices are typically discrete. We address this problem in the context of cloud microphysics parameterization schemes by creating a flexible framework wherein structural and parametric uncertainties can be simultaneously constrained. Our scheme makes no assuptions about drop size distribution shape or the functional form of parametrized process rate terms. Instead, these uncertainties are constrained by observations using a Markov Chain Monte Carlo sampler within a Bayesian inference framework. Our scheme, the Bayesian Observationally-constrained Statistical-physical Scheme (BOSS), has flexibility to predict various sets of prognostic drop size distribution moments as well as varying complexity of process rate formulations. We compare idealized probabilistic forecasts from versions of BOSS with varying levels of structural complexity. This work has applications in ensemble forecasts with model physics uncertainty, data assimilation, and cloud microphysics process studies.

  18. Enhanced subcarrier-index modulation-based asymmetrically clipped optical OFDM using even subcarriers

    Science.gov (United States)

    Guan, Rui; Xu, Wei; Yang, Zhaohui; Huang, Nuo; Wang, Jin-Yuan; Chen, Ming

    2017-11-01

    In this paper, we propose a subcarrier-index modulation-based asymmetrically clipped optical orthogonal frequency division multiplexing (SACO-OFDM) scheme for optical wireless communication (OWC) systems, which benefits from the subcarrier-index modulation (SIM) and asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) techniques. SACO-OFDM conveys additional information via the subcarrier indexing, and the error rate of the bit transmitted by the subcarrier indexing is much lower than that of the conventional M-ary modulation scheme. On the other hand, as the signal constellation in M-ary modulation is relieved, SACO-OFDM has simple transceiver structure and low detection complexity. Moreover, considering the spectral, an enhanced SACO-OFDM (ESACO-OFDM) using even subcarriers is proposed. In this technique, the odd subcarriers are activated for SACO-OFDM, and the imaginary part of even subcarriers are activated for pulse-amplitude-modulated discrete multitone (PAM-DMT). Clearly, ESACO-OFDM achieves better spectral efficiency than the conventional optical OFDM, since all subcarriers are used for data transmission. Simulation results verify the significant bit error rate (BER) and peak-to-average power ratio (PAPR) improvement by the proposed ESACO-OFDM, especially for the medium-to-high signal-to-noise ratio (SNR) regime.

  19. Application of a robust and efficient Lagrangian particle scheme to soot transport in turbulent flames

    KAUST Repository

    Attili, Antonio; Bisetti, Fabrizio

    2013-01-01

    . The proposed scheme exhibits superior properties with respect to conventional Eulerian schemes in terms of stability, accuracy, and grid convergence. Taking into account the quality of the solution, the Lagrangian approach can be computationally more economical

  20. Comprehensive Evaluation of Car-Body Light-Weighting Scheme Based on LCC Theory

    Directory of Open Access Journals (Sweden)

    Han Qing-lan

    2016-01-01

    Full Text Available In this paper, a comprehensive evaluation model of light-weighting scheme is established, which is based on three dimensions, including the life cycle costs of the resource consumed by the designed objects (LCC, willingness to pay for the environmental effect of resource consumption (WTP and performance (P. Firstly, cost of each stage is determined. Then, based on the resource classification, which is based on cost elements, determine the material list needed, and apply WTP weight coefficient to monetize life cycle environmental impact and obtain the life cycle comprehensive cost of designed scheme (TCC. In the next step Performance (P index is calculated to measure the value of the life cycle costs by applying AHP and SAW method, integrated (TCC and (P to achieve comprehensive evaluation of light-weighting scheme. Finally, the effectiveness of the evaluation model is verified by the example of car engine hood.

  1. An index of harm for comparing occupational risks

    International Nuclear Information System (INIS)

    Schaaf, E.; Hennig, J.; Schnadt, H.; Becker, G.

    1986-03-01

    An index of harm is presented describing the health hazards of persons occupationally exposed to ionizing radiation, for comparison with occupational risks in conventional working areas. The criterion for evaluating injuries is the remaining lifetime affected by chronic damage. The affected years of life themselves are evaluated in a scheme considering the degree of reduced ability to work. The index of harm is based on an evaluation of a data pool collected by all F.R.G. associations for social insurance against occupational accidents, which recorded all data of first compensation for accidents. The index can be taken into consideration for assessment of risks emanating from ionizing radiation, and for evaluating the radiation protection currently provided by maximum permissible limits, etc. (DG) [de

  2. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  3. Long Term Incentives for Residential Customers Using Dynamic Tariff

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei; Nielsen, Arne Hejde

    2015-01-01

    This paper reviews several grid tariff schemes, including flat tariff, time-of-use, time-varying tariff, demand charge and dynamic tariff (DT), from the perspective of the long term incentives. The long term incentives can motivate the owners of flexible demands to change their energy consumption...... behavior in such a way that the power system operation issues, such as system balance and congestion, can be alleviated. From the comparison study, including analysis and case study, the DT scheme outperforms the other tariff schemes in terms of cost saving and network operation condition improving....

  4. Inverse scattering scheme for the Dirac equation at fixed energy

    International Nuclear Information System (INIS)

    Leeb, H.; Lehninger, H.; Schilder, C.

    2001-01-01

    Full text: Based on the concept of generalized transformation operators a new hierarchy of Dirac equations with spherical symmetric scalar and fourth component vector potentials is presented. Within this hierarchy closed form expressions for the solutions, the potentials and the S-matrix can be given in terms of solutions of the original Dirac equation. Using these transformations an inverse scattering scheme has been constructed for the Dirac equation which is the analog to the rational scheme in the non-relativistic case. The given method provides for the first time an inversion scheme with closed form expressions for the S-matrix for non-relativistic scattering problems with central and spin-orbit potentials. (author)

  5. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  6. The effects of China's urban basic medical insurance schemes on the equity of health service utilisation: evidence from Shaanxi Province.

    Science.gov (United States)

    Zhou, Zhongliang; Zhu, Liang; Zhou, Zhiying; Li, Zhengya; Gao, Jianmin; Chen, Gang

    2014-03-09

    In order to alleviate the problem of "Kan Bing Nan, Kan Bing Gui" (medical treatment is difficult to access and expensive) and improve the equity of health service utilisation for urban residents in China, the Urban Employee Basic Medical Insurance scheme (UEBMI) and Urban Resident Basic Medical Insurance scheme (URBMI) were established in 1999 and 2007, respectively. This study aims to analyse the effects of UEBMI and URBMI on the equity of outpatient and inpatient utilisation in Shaanxi Province, China. Using the data from the fourth National Health Services Survey in Shaanxi Province, the method of Propensity Score Matching was employed to generate comparable samples between the insured and uninsured residents, through a one-to-one match algorithm. Next, based on the matched data, the method of decomposition of the concentration index was employed to compare the horizontal inequity indexes of health service utilisation between the UEBMI/URBMI insured and the matched uninsured residents. For the UEBMI insured and matched uninsured residents, the horizontal inequity indexes of outpatient visits are 0.1256 and -0.0511 respectively, and the horizontal inequity indexes of inpatient visits are 0.1222 and 0.2746 respectively. Meanwhile, the horizontal inequity indexes of outpatient visits are -0.1593 and 0.0967 for the URBMI insured and matched uninsured residents, and the horizontal inequity indexes of inpatient visits are 0.1931 and 0.3199 respectively. The implementation of UEBMI increased the pro-rich inequity of outpatient utilisation (rich people utilise outpatient facilities more than the poor people) and the implementation of URBMI increased the pro-poor inequity of outpatient utilisation. Both of these two health insurance schemes reduced the pro-rich inequity of inpatient utilisation.

  7. Longitudinal versus transversal excitation in doped graded-index polymer optical fibers

    Science.gov (United States)

    Illarramendi, M. A.; Arrue, J.; Ayesta, I.; Jiménez, F.; Zubia, J.; Bikandi, I.; Tagaya, A.; Koike, Y.

    2014-03-01

    In this work we perform a detailed experimental and theoretical analysis of the properties of amplified spontaneous emission (ASE) in a rhodamine-6G-doped graded-index polymer optical fiber when the fiber is pumped either longitudinally or transversally with respect to the fiber axis. The dependence of the ASE threshold and efficiency on fiber length has been compared for both schemes of excitation. A theoretical model for longitudinal excitation has been carried out by means of the laser rate equations as functions of time, distance traveled by light and wavelength. The analysis takes into account that the fiber is a typical graded-index POF in which the radial distributions of light power density and dye concentration are not uniform. The theoretical calculations agree satisfactorily with the experimental results. The photodegradation of the ASE intensity has also been measured for both pumping schemes.

  8. Photonuclear data index 1986-1990

    Energy Technology Data Exchange (ETDEWEB)

    Varlamov, V A; Stepanov, M E; Sapunenko, V V [Moscow State University, Institute of Nuclear Physics, Centre for Photonuclear Experimental Data, Moscow (Russian Federation)

    1992-07-01

    This issue presents a bibliographic index to experimental photonuclear data published in periodical scientific literature during the years 1986-1990. The main tabulation is sorted by nucleus and reaction. It is supplemented by a reference index, an author index, explanatory tables of terms and abbreviations used, and a table of isotopic abundances and nucleon separation energies. The index is in English with an introduction in Russian and English. (author)

  9. Some problems in the categorization of source terms

    International Nuclear Information System (INIS)

    Abbey, F.; Dunbar, I.H.; Hayns, M.R.; Nixon, W.

    1985-01-01

    In recent years techniques for calculating source terms have been considerably improved. It would be unfortunate if the new information were to be blurred by the use of old schemes for the categorization of source terms. In the past categorization schemes have been devised without the question of the general principles of categorization and the available options being addressed explicitly. In this paper these principles are set out, providing a framework within which categorization schemes used in past probabilistic risk assessments and possible future improvements are discussed. In particular the use of input from scoping consequence calculations in deciding how to group source terms, and the question of how modelling uncertainties may be expressed as uncertainties in a final category source terms are considered

  10. A plausible congestion management scheme for the internal electricity market of the European Union

    International Nuclear Information System (INIS)

    Perez-Arriaga, I.J.; Olmos, L.

    2005-01-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  11. A plausible congestion management scheme for the internal electricity market of the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Perez-Arriaga, I.J.; Olmos, L. [Universidad Pontificia Comillas, Madrid (Spain). Instituto de Investigacion Tecnologica

    2005-06-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  12. Early warnings of extreme winds using the ECMWF Extreme Forecast Index

    DEFF Research Database (Denmark)

    Petroliagis, Thomas I.; Pinson, Pierre

    2014-01-01

    The European FP7 SafeWind Project aims at developing research towards a European vision of wind power forecasting, which requires advanced meteorological support concerning extreme wind events. This study is focused mainly on early warnings of extreme winds in the early medium-range. Three synoptic...... regimes. Overall, it becomes clear that the first indications of an extreme wind event might come from the ECMWF deterministic and/or probabilistic components capturing very intense weather systems (possible windstorms) in the medium term. For early warnings, all available EPS Extreme Forecast Index (EFI......) formulations were used, by linking daily maximum wind speeds to EFI values for different forecast horizons. From all possible EFI schemes deployed for issuing early warnings, the highest skill was found for the Gust Factor formulation (EFI-10FGI). Using EFI-10FGI, the corresponding 99% threshold could provide...

  13. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  14. Comparison and Analysis of the Control Power Between Two Different Perfect Controlled Teleportation Schemes Using Four-particle Cluster State

    Science.gov (United States)

    Jiang, Yu-ting; Mo, Zhi-wen

    2017-10-01

    Control power is used to discuss about the controller's measurable authority. It's a new index to describe the controlled teleportation schemes from the point of view of the controller. In this paper, we introduce two perfect controlled teleportation schemes and calculate the control power under different control particles. In scheme 1, the controller just controls one particle, which is particle 2. And in scheme 2, the controller controls the particles 2 and 3. They both use the cluster state |ψ > _{1234}={1/2}(|0000> +|0011> +|1100> -|1111> )_{1234} as communication channel. By calculating the control power between two schemes, the control power of scheme 1 is 1/3, which is the minimal value of control power. On the contrary, the control power of scheme 2 is maximal, 1/2. Scheme 2 which controls two particles successfully promotes the control power comparing with scheme 1. It's evidently that controlling particle 2 is a necessary condition. And controlling particle 3 can gain the control power but the controller cannot control it solely.

  15. Indian Kisan Credit Card Scheme: An Analytical Study

    Directory of Open Access Journals (Sweden)

    Dharmendra Mehta

    2016-03-01

    Full Text Available Kisan Credit Card (KCC has now been regarded as the only medium of short-term credit for agriculture. The Kisan Credit Card (KCC scheme was introduced by the Finance Minister in his budget speech in the year 1998-99. From the year 1998-99, the scheme was implemented by public sector commercial banks, RRBs (Regional Rural Banks and cooperative banks in the country. It has emerged as an innovative credit distribution system to meet the production credit requirements of the farmers in a timely and easy manner. The present paper is aimed to study role of Kisan Credit Card in the rural credit facilitation in India.

  16. Sparse grid techniques for particle-in-cell schemes

    Science.gov (United States)

    Ricketson, L. F.; Cerfon, A. J.

    2017-02-01

    We propose the use of sparse grids to accelerate particle-in-cell (PIC) schemes. By using the so-called ‘combination technique’ from the sparse grids literature, we are able to dramatically increase the size of the spatial cells in multi-dimensional PIC schemes while paying only a slight penalty in grid-based error. The resulting increase in cell size allows us to reduce the statistical noise in the simulation without increasing total particle number. We present initial proof-of-principle results from test cases in two and three dimensions that demonstrate the new scheme’s efficiency, both in terms of computation time and memory usage.

  17. Experimental generation of two-index Bessel-Gauss beams by engineering their angular spectrum functions

    Science.gov (United States)

    Yao, Hainan; Wang, Fei; Cai, Yangjian

    2018-01-01

    Two-index Bessel beams (TIBBs) was introduced by Ornigotti and Aiello (2014) theoretically. In this paper, we propose a simple experimental scheme for generation of two-index Bessel-Gauss beams (TIBGBs), as an extension of the TIBBs. The scheme is based on manipulating the amplitude and phase in the Fourier plane with the use of a spatial light modulator and a spiral phase plate. Furthermore, we experimentally report the generation of the several examples of the TIBGBs based on the proposed optical system. The focusing properties of the TIBGB with indices p = 1 and l = 2 passing through a single lens are investigated both theoretically and experimentally. The experimental results agree well with theoretical predictions.

  18. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  19. Fast and efficient indexing approach for object recognition

    Science.gov (United States)

    Hefnawy, Alaa; Mashali, Samia A.; Rashwan, Mohsen; Fikri, Magdi

    1999-08-01

    This paper introduces a fast and efficient indexing approach for both 2D and 3D model-based object recognition in the presence of rotation, translation, and scale variations of objects. The indexing entries are computed after preprocessing the data by Haar wavelet decomposition. The scheme is based on a unified image feature detection approach based on Zernike moments. A set of low level features, e.g. high precision edges, gray level corners, are estimated by a set of orthogonal Zernike moments, calculated locally around every image point. A high dimensional, highly descriptive indexing entries are then calculated based on the correlation of these local features and employed for fast access to the model database to generate hypotheses. A list of the most candidate models is then presented by evaluating the hypotheses. Experimental results are included to demonstrate the effectiveness of the proposed indexing approach.

  20. A perturbational h4 exponential finite difference scheme for the convective diffusion equation

    International Nuclear Information System (INIS)

    Chen, G.Q.; Gao, Z.; Yang, Z.F.

    1993-01-01

    A perturbational h 4 compact exponential finite difference scheme with diagonally dominant coefficient matrix and upwind effect is developed for the convective diffusion equation. Perturbations of second order are exerted on the convective coefficients and source term of an h 2 exponential finite difference scheme proposed in this paper based on a transformation to eliminate the upwind effect of the convective diffusion equation. Four numerical examples including one- to three-dimensional model equations of fluid flow and a problem of natural convective heat transfer are given to illustrate the excellent behavior of the present exponential schemes. Besides, the h 4 accuracy of the perturbational scheme is verified using double precision arithmetic

  1. Static and dynamic efficiency of white certificate schemes

    International Nuclear Information System (INIS)

    Giraudet, L.G.; Finon, D.

    2011-01-01

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  2. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  3. Long term test-retest reliability of Oswestry Disability Index in male office workers.

    Science.gov (United States)

    Irmak, Rafet; Baltaci, Gul; Ergun, Nevin

    2015-01-01

    The Oswestry Disability Index (ODI) is one of the most common condition specific outcome measures used in the management of spinal disorders. But there is insufficient study on healthy populations and long term test-retest reliability. This is important because healthy populations are often used for control groups in low back pain interventions, and knowing the reliability of the controls affects the interpretation of the findings of these studies. The purpose of this study is to determine the long term test-retest reliability of ODI in office workers. Participants who have no chronic low back pain history were included in study. Subjects were assessed by the Turkish-ODI 2.0 (e-forms) on 1st, 2nd, 4th, 8th, 15th, 30th days to determine the stability of ODI scores over time. The study began with 58 (12 female, 46 male) participants. 36 (3 female, 33 male) participated for the full 30 days. Kolmogorov-Smirnov and Friedman tests were used. Test-retest reliability was evaluated by using nonparametric statistics. All tests were done by using SPSS-11. There was no statistically significant difference among the median scores of each day. (χ= 6.482, p >  0.05). The difference between median score of the days with 1st day was neither statistically nor clinically significant. ODI has long term test re-test reliability in healthy subjects over a 1 month time interval.

  4. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  5. Financial fairness and conditional indexation

    NARCIS (Netherlands)

    Kleinow, T.; Schumacher, J.M.

    2017-01-01

    Collective pension contracts can generate advantages for their participants by implementing forms of risk sharing. To ensure the continuity of a collective scheme, it has to be monitored whether the contracts offered to participants are financially fair in terms of their market value. When risk

  6. Financial Fairness and Conditional Indexation

    NARCIS (Netherlands)

    Kleinow, Torsten; Schumacher, Hans

    2015-01-01

    Collective pension contracts can generate advantages for their participants by implementing forms of risk sharing. To ensure the continuity of a collective scheme, it has to be monitored whether the contracts offered to participants are financially fair in terms of their market value. When risk

  7. Author's capabilities in author indexing

    International Nuclear Information System (INIS)

    Ooi, Shoichi

    1988-01-01

    The purpose of this paper is to provide a author capability of current author indexing practices in journal literature indexing practices in 'Journal of Nuclear Science and Technology of Japan'. This Journal employed keywords freely assigned by author and not taken from INIS Thesaurus or other vocabulary list. Author examined 413 literatures, comparing keywords assigned by the literatures' authors with descriptor's (ATOMINDEX) assigned by an experienced professional indexer. The results of the comparisons showed that the average set of terms assigned by author included about 70% of all the terms assigned to the same literature by the professional indexer. Authors eventually would contribute, for the most effective point to create reference to information is at the time of its generation. Consequently, it may be possible to transfer them easily to descriptors in every secondary information system. (author)

  8. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  9. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    KAUST Repository

    Benjillali, Mustapha

    2011-09-01

    We propose a simple relay-based adaptive cooperation scheme to improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels. In a new common framework, we show that the proposed scheme offers considerable gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization of information rates at the destination which needs to observe only the average signal-to-noise ratios of the links. © 2006 IEEE.

  10. Constructing an Urban Population Model for Medical Insurance Scheme Using Microsimulation Techniques

    Directory of Open Access Journals (Sweden)

    Linping Xiong

    2012-01-01

    Full Text Available China launched a pilot project of medical insurance reform in 79 cities in 2007 to cover urban nonworking residents. An urban population model was created in this paper for China’s medical insurance scheme using microsimulation model techniques. The model made it clear for the policy makers the population distributions of different groups of people, the potential urban residents entering the medical insurance scheme. The income trends of units of individuals and families were also obtained. These factors are essential in making the challenging policy decisions when considering to balance the long-term financial sustainability of the medical insurance scheme.

  11. Creating Materials with Negative Refraction Index using Topology Optimization

    DEFF Research Database (Denmark)

    Christiansen, Rasmus Ellebæk; Sigmund, Ole

    is used for regularizationand a projection step applied to obtain clean 0/1 designs. A continuation scheme is used to avoidstagnation in the optimization. Metamaterials with negative refraction index designed using this method are presented. The angular dependence of the refraction index......We apply topology optimization along with full modeling of the electromagnetic (acoustic) field to create metamaterials with negative refraction index. We believe that our approach can be used in the design of metamaterials with specific effective permittivity and permeability e.g. by adapting....... The direction of propagation for the prescribed wave is chosen to match the angle of incidence of the incoming plane wave and its position isused to select the refraction index for the slab. We introducing a continuous design field and apply The Method of Moving Asymptotes to perform the optimization. A filter...

  12. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the doubly unresolved subtraction terms

    CERN Document Server

    Somogyi, Gabor

    2013-01-01

    We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of the regularised doubly virtual contribution to the NNLO cross section becomes feasible.

  13. Basic Principles of Financial Planning in Ex-ante Deposit Insurance Schemes

    Directory of Open Access Journals (Sweden)

    Đurđica Ognjenović

    2006-12-01

    Full Text Available The paper explores main principles of financial planning in ex-ante deposit insurance schemes from a theoretical perspective and in terms of the EU Directive on deposit- guarantee schemes. Further on, the paper assesses how these principles and standards are used in financial planning in deposit insurance schemes around the world for annual budgeting, strategic planning and optimalization of available financial resources. After reviewing available references and different practices, the conclusion is that there are no clear internationally accepted principles for deposit insurers’ financial planning, except some broad and general guidelines. Practices in the industry differ significantly. Given the fact that deposit insurance is in fact a monopolistic business, lack of clear principles and lack of proper financial planning may lead to inadequacy of ex-ante funds and negligence on the side of the management of deposit insurance schemes.

  14. An axiomatic characterization of the Hirsch-index

    NARCIS (Netherlands)

    Woeginger, G.J.

    2008-01-01

    The Hirsch-index is a well-known index for measuring and comparing the output of scientific researchers. The main contribution of this article is an axiomatic characterization of the Hirsch-index in terms of three natural axioms. Furthermore, two other scientific impact indices (called the w-index

  15. A New time Integration Scheme for Cahn-hilliard Equations

    KAUST Repository

    Schaefer, R.

    2015-06-01

    In this paper we present a new integration scheme that can be applied to solving difficult non-stationary non-linear problems. It is obtained by a successive linearization of the Crank- Nicolson scheme, that is unconditionally stable, but requires solving non-linear equation at each time step. We applied our linearized scheme for the time integration of the challenging Cahn-Hilliard equation, modeling the phase separation in fluids. At each time step the resulting variational equation is solved using higher-order isogeometric finite element method, with B- spline basis functions. The method was implemented in the PETIGA framework interfaced via the PETSc toolkit. The GMRES iterative solver was utilized for the solution of a resulting linear system at every time step. We also apply a simple adaptivity rule, which increases the time step size when the number of GMRES iterations is lower than 30. We compared our method with a non-linear, two stage predictor-multicorrector scheme, utilizing a sophisticated step length adaptivity. We controlled the stability of our simulations by monitoring the Ginzburg-Landau free energy functional. The proposed integration scheme outperforms the two-stage competitor in terms of the execution time, at the same time having a similar evolution of the free energy functional.

  16. A New time Integration Scheme for Cahn-hilliard Equations

    KAUST Repository

    Schaefer, R.; Smol-ka, M.; Dalcin, L; Paszyn'ski, M.

    2015-01-01

    In this paper we present a new integration scheme that can be applied to solving difficult non-stationary non-linear problems. It is obtained by a successive linearization of the Crank- Nicolson scheme, that is unconditionally stable, but requires solving non-linear equation at each time step. We applied our linearized scheme for the time integration of the challenging Cahn-Hilliard equation, modeling the phase separation in fluids. At each time step the resulting variational equation is solved using higher-order isogeometric finite element method, with B- spline basis functions. The method was implemented in the PETIGA framework interfaced via the PETSc toolkit. The GMRES iterative solver was utilized for the solution of a resulting linear system at every time step. We also apply a simple adaptivity rule, which increases the time step size when the number of GMRES iterations is lower than 30. We compared our method with a non-linear, two stage predictor-multicorrector scheme, utilizing a sophisticated step length adaptivity. We controlled the stability of our simulations by monitoring the Ginzburg-Landau free energy functional. The proposed integration scheme outperforms the two-stage competitor in terms of the execution time, at the same time having a similar evolution of the free energy functional.

  17. Development of a water quality index based on a European ...

    African Journals Online (AJOL)

    This index has advantages over pre-existing indices by reflecting the appropriateness of water for specific use, e.g. drinking water supply rather than general supply, and has been developed by studying the supranational standard, i.e. the European Community Standard. Three classification schemes for water quality are ...

  18. Maslov index for Hamiltonian systems

    Directory of Open Access Journals (Sweden)

    Alessandro Portaluri

    2008-01-01

    Full Text Available The aim of this article is to give an explicit formula for computing the Maslov index of the fundamental solutions of linear autonomous Hamiltonian systems in terms of the Conley-Zehnder index and the map time one flow.

  19. Numerical scheme of WAHA code for simulation of fast transients in piping systems

    International Nuclear Information System (INIS)

    Iztok Tiselj

    2005-01-01

    Full text of publication follows: A research project of the 5. EU program entitled 'Two-phase flow water hammer transients and induced loads on materials and structures of nuclear power plants' (WAHA loads) has been initiated in Fall 2000 and ended in Spring 2004. Numerical scheme used in WAHA code is responsibility of 'Jozef Stefan Institute and is briefly described in the present work. Mathematical model is based on a 6-equation two-fluid model for inhomogeneous non-equilibrium two-phase flow, which can be written in vectorial form as: A δΨ-vector/δt + B δΨ-vector/δx = S-vector. Hyperbolicity of the equations is a prerequisite and is ensured with virtual mass term and interfacial pressure term, however, equations are not unconditionally hyperbolic. Flow-regime map used in WAHA code consists of dispersed, and horizontally stratified flow correlations. The closure laws describe interface heat and mass transfer (condensation model, flashing...), the inter-phase friction, and wall friction. For the modeling of water hammer additional terms due to the pipe elasticity are considered. For the calculation of the thermodynamic state a new set of water properties subroutines was created. Numerical scheme of the WAHA code is based on Godunov characteristic upwind methods. Advanced numerical methods based on high-resolution shock-capturing schemes, which were originally developed for high-speed gas dynamics are used. These schemes produce solutions with a substantially reduced numerical diffusion and allow the accurate modeling of flow discontinuities. Code is using non-conservative variables Ψ-vector = (p, α, ν f , ν g , u f , u g ), however, according to current experience, the non-conservation is not a major problem for the fast transients like water hammers. The following operator splitting is used in the code: 1) Convection and non-relaxation source terms: A δΨ-vector/δt + B δΨ-vector/δx S-vector non relaxation 2) Relaxation (inter-phase exchange) source

  20. Improved predictability of droughts over southern Africa using the standardized precipitation evapotranspiration index and ENSO

    Science.gov (United States)

    Manatsa, Desmond; Mushore, Terrence; Lenouo, Andre

    2017-01-01

    The provision of timely and reliable climate information on which to base management decisions remains a critical component in drought planning for southern Africa. In this observational study, we have not only proposed a forecasting scheme which caters for timeliness and reliability but improved relevance of the climate information by using a novel drought index called the standardised precipitation evapotranspiration index (SPEI), instead of the traditional precipitation only based index, the standardised precipitation index (SPI). The SPEI which includes temperature and other climatic factors in its construction has a more robust connection to ENSO than the SPI. Consequently, the developed ENSO-SPEI prediction scheme can provide quantitative information about the spatial extent and severity of predicted drought conditions in a way that reflects more closely the level of risk in the global warming context of the sub region. However, it is established that the ENSO significant regional impact is restricted only to the period December-March, implying a revisit to the traditional ENSO-based forecast scheme which essentially divides the rainfall season into the two periods, October to December and January to March. Although the prediction of ENSO events has increased with the refinement of numerical models, this work has demonstrated that the prediction of drought impacts related to ENSO is also a reality based only on observations. A large temporal lag is observed between the development of ENSO phenomena (typically in May of the previous year) and the identification of regional SPEI defined drought conditions. It has been shown that using the Southern Africa Regional Climate Outlook Forum's (SARCOF) traditional 3-month averaged Nino 3.4 SST index (June to August) as a predictor does not have an added advantage over using only the May SST index values. In this regard, the extended lead time and improved skill demonstrated in this study could immensely benefit

  1. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  2. Multiple Depth DB Tables Indexing on the Sphere

    Directory of Open Access Journals (Sweden)

    Luciano Nicastro

    2010-01-01

    Full Text Available Any project dealing with large astronomical datasets should consider the use of a relational database server (RDBS. Queries requiring quick selections on sky regions, objects cross-matching and other high-level data investigations involving sky coordinates could be unfeasible if tables are missing an effective indexing scheme. In this paper we present the Dynamic Index Facility (DIF software package. By using the HTM and HEALPix sky pixelization schema, it allows a very efficient indexing and management of spherical data stored into MySQL tables. Any table hosting spherical coordinates can be automatically managed by DIF using any number of sky resolutions at the same time. DIF comprises a set of facilities among which SQL callable functions to perform queries on circular and rectangular regions. Moreover, by removing the limitations and difficulties of 2-d data indexing, DIF allows the full exploitation of the RDBS capabilities. Performance tests on Giga-entries tables are reported together with some practical usage of the package.

  3. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the doubly unresolved subtraction terms

    Science.gov (United States)

    Somogyi, Gábor

    2013-04-01

    We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.

  4. A subtraction scheme for computing QCD jet cross sections at NNLO: integrating the doubly unresolved subtraction terms

    OpenAIRE

    Somogyi, Gabor

    2013-01-01

    We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.

  5. Taylor-Lagrange regularization scheme and light-front dynamics

    International Nuclear Information System (INIS)

    Grange, P.; Mathiot, J.-F.; Mutet, B.; Werner, E.

    2010-01-01

    The recently proposed renormalization scheme based on the definition of field operators as operator valued distributions acting on specific test functions is shown to be very convenient in explicit calculations of physical observables within the framework of light-front dynamics. We first recall the main properties of this procedure based on identities relating the test functions to their Taylor remainder of any order expressed in terms of Lagrange's formulae, hence the name given to this scheme. We thus show how it naturally applies to the calculation of state vectors of physical systems in the covariant formulation of light-front dynamics. As an example, we consider the case of the Yukawa model in the simple two-body Fock state truncation.

  6. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    OpenAIRE

    Jin, Zhe; Lai, Yen-Lung; Hwang, Jung-Yeon; Kim, Soohyung; Teoh, Andrew Beng Jin

    2017-01-01

    In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. The disc...

  7. Analysis of a fourth-order compact scheme for convection-diffusion

    International Nuclear Information System (INIS)

    Yavneh, I.

    1997-01-01

    In, 1984 Gupta et al. introduced a compact fourth-order finite-difference convection-diffusion operator with some very favorable properties. In particular, this scheme does not seem to suffer excessively from spurious oscillatory behavior, and it converges with standard methods such as Gauss Seidel or SOR (hence, multigrid) regardless of the diffusion. This scheme has been rederived, developed (including some variations), and applied in both convection-diffusion and Navier-Stokes equations by several authors. Accurate solutions to high Reynolds-number flow problems at relatively coarse resolutions have been reported. These solutions were often compared to those obtained by lower order discretizations, such as second-order central differences and first-order upstream discretizations. The latter, it was stated, achieved far less accurate results due to the artificial viscosity, which the compact scheme did not include. We show here that, while the compact scheme indeed does not suffer from a cross-stream artificial viscosity (as does the first-order upstream scheme when the characteristic direction is not aligned with the grid), it does include a streamwise artificial viscosity that is inversely proportional to the natural viscosity. This term is not always benign. 7 refs., 1 fig., 1 tab

  8. Properties of the Narrative Scoring Scheme Using Narrative Retells in Young School-Age Children

    Science.gov (United States)

    Heilmann, John; Miller, Jon F.; Nockerts, Ann; Dunaway, Claudia

    2010-01-01

    Purpose: To evaluate the clinical utility of the narrative scoring scheme (NSS) as an index of narrative macrostructure for young school-age children. Method: Oral retells of a wordless picture book were elicited from 129 typically developing children, ages 5-7. A series of correlations and hierarchical regression equations were completed using…

  9. Content-based video indexing and searching with wavelet transformation

    Science.gov (United States)

    Stumpf, Florian; Al-Jawad, Naseer; Du, Hongbo; Jassim, Sabah

    2006-05-01

    Biometric databases form an essential tool in the fight against international terrorism, organised crime and fraud. Various government and law enforcement agencies have their own biometric databases consisting of combination of fingerprints, Iris codes, face images/videos and speech records for an increasing number of persons. In many cases personal data linked to biometric records are incomplete and/or inaccurate. Besides, biometric data in different databases for the same individual may be recorded with different personal details. Following the recent terrorist atrocities, law enforcing agencies collaborate more than before and have greater reliance on database sharing. In such an environment, reliable biometric-based identification must not only determine who you are but also who else you are. In this paper we propose a compact content-based video signature and indexing scheme that can facilitate retrieval of multiple records in face biometric databases that belong to the same person even if their associated personal data are inconsistent. We shall assess the performance of our system using a benchmark audio visual face biometric database that has multiple videos for each subject but with different identity claims. We shall demonstrate that retrieval of relatively small number of videos that are nearest, in terms of the proposed index, to any video in the database results in significant proportion of that individual biometric data.

  10. Screening manual and office workers for risk of long-term sickness absence : cut-off points for the Work Ability Index

    NARCIS (Netherlands)

    Schouten, Lianne S.; Joling, Catelijne I.; van der Gulden, Joost W. J.; Heymans, Martijn W.; Bultmann, Ute; Roelen, Corne A. M.

    Objectives The aim of this study was to investigate the Work Ability Index (WAI) as a tool to screen for risk of different durations of long-term sickness absence (LTSA) among manual and office workers. Methods The prospective study comprised a cohort of 3049 (1710 manual and 1339 office) workers

  11. Determination of minimum impact parameter by modified touching spheres schemes for intermediate energy Coulomb excitation experiments

    International Nuclear Information System (INIS)

    Kumar, Rajiv; Sharma, Shagun; Singh, Pradeep; Kharab, Rajesh

    2016-01-01

    The energy-independent touching spheres schemes commonly used for the determination of the safe minimum value of the impact parameter for Coulomb excitation experiments are modified through the inclusion of an energy-dependent term. The touching spheres+3fm scheme after modification emerges out to be the best one while touching spheres+4fm scheme is found to be better in its unmodified form. (orig.)

  12. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  13. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  14. A comparison of the recording of comorbidity in primary and secondary care by using the Charlson Index to predict short-term and long-term survival in a routine linked data cohort.

    Science.gov (United States)

    Crooks, C J; West, J; Card, T R

    2015-06-05

    Hospital admission records provide snapshots of clinical histories for a subset of the population admitted to hospital. In contrast, primary care records provide continuous clinical histories for complete populations, but might lack detail about inpatient stays. Therefore, combining primary and secondary care records should improve the ability of comorbidity scores to predict survival in population-based studies, and provide better adjustment for case-mix differences when assessing mortality outcomes. Cohort study. English primary and secondary care 1 January 2005 to 1 January 2010. All patients 20 years and older registered to a primary care practice contributing to the linked Clinical Practice Research Datalink from England. The performance of the Charlson index with mortality was compared when derived from either primary or secondary care data or both. This was assessed in relation to short-term and long-term survival, age, consultation rate, and specific acute and chronic diseases. 657,264 people were followed up from 1 January 2005. Although primary care recorded more comorbidity than secondary care, the resulting C statistics for the Charlson index remained similar: 0.86 and 0.87, respectively. Higher consultation rates and restricted age bands reduced the performance of the Charlson index, but the index's excellent performance persisted over longer follow-up; the C statistic was 0.87 over 1 year, and 0.85 over all 5 years of follow-up. The Charlson index derived from secondary care comorbidity had a greater effect than primary care comorbidity in reducing the association of upper gastrointestinal bleeding with mortality. However, they had a similar effect in reducing the association of diabetes with mortality. These findings support the use of the Charlson index from linked data and show that secondary care comorbidity coding performed at least as well as that derived from primary care in predicting survival. Published by the BMJ Publishing Group Limited

  15. Scheme dependence of quantum gravity on de Sitter background

    Energy Technology Data Exchange (ETDEWEB)

    Kitamoto, Hiroyuki, E-mail: kitamoto@post.kek.jp [KEK Theory Center, Tsukuba, Ibaraki 305-0801 (Japan); Kitazawa, Yoshihisa, E-mail: kitazawa@post.kek.jp [KEK Theory Center, Tsukuba, Ibaraki 305-0801 (Japan); The Graduate University for Advanced Studies (Sokendai), Department of Particle and Nuclear Physics, Tsukuba, Ibaraki 305-0801 (Japan)

    2013-08-11

    We extend our investigation of the IR effects on the local dynamics of matter fields in quantum gravity. Specifically we clarify how the IR effects depend on the change of the quantization scheme: different parametrization of the metric and the matter field redefinition. Conformal invariance implies effective Lorentz invariance of the matter system in de Sitter space. An arbitrary choice of the parametrization of the metric and the matter field redefinition does not preserve the effective Lorentz invariance of the local dynamics. As for the effect of different parametrization of the metric alone, the effective Lorentz symmetry breaking term can be eliminated by shifting the background metric. In contrast, we cannot compensate the matter field redefinition dependence by such a way. The effective Lorentz invariance can be retained only when we adopt the specific matter field redefinitions where all dimensionless couplings become scale invariant at the classical level. This scheme is also singled out by unitarity as the kinetic terms are canonically normalized.

  16. Relaxation approximations to second-order traffic flow models by high-resolution schemes

    International Nuclear Information System (INIS)

    Nikolos, I.K.; Delis, A.I.; Papageorgiou, M.

    2015-01-01

    A relaxation-type approximation of second-order non-equilibrium traffic models, written in conservation or balance law form, is considered. Using the relaxation approximation, the nonlinear equations are transformed to a semi-linear diagonilizable problem with linear characteristic variables and stiff source terms with the attractive feature that neither Riemann solvers nor characteristic decompositions are in need. In particular, it is only necessary to provide the flux and source term functions and an estimate of the characteristic speeds. To discretize the resulting relaxation system, high-resolution reconstructions in space are considered. Emphasis is given on a fifth-order WENO scheme and its performance. The computations reported demonstrate the simplicity and versatility of relaxation schemes as numerical solvers

  17. A new scheme for biomonitoring heavy metal concentrations in semi-natural wetlands.

    Science.gov (United States)

    Batzias, A F; Siontorou, C G

    2008-10-30

    This work introduces a semi-natural wetland biomonitoring framework for heavy metal concentrations based on a robust dynamic integration between biological assemblages and relevant biosensors. The cooperative/synergistic scheme developed minimizes uncertainty and monitoring costs and increases reliability of pollution control and abatement. Attention is given to establishing a fully functioning and reliable network approach for monitoring inflows and achieving dose-response relations and calibration of biomonitoring species. The biomonitoring network initially consists of both, biosensors and species, as a validation phase in each wetland of the surveillance area; once the species monitoring efficiency is verified by the biosensors, the biosensor network moves to the next wetland and so on, following a circular pattern until all area wetlands have a fully functional natural monitoring scheme. By means of species recalibration with periodic revisiting of the biosensors, the scheme progressively reaches a quasi steady-state (including seasonality), thus ensuring reliability and robustness. This framework, currently pilot-tested in Voiotia, Greece, for assessing chromium levels, has been built to cover short-, medium- and long-term monitoring requirements. The results gathered so far, support the employment of the proposed scheme in heavy metal monitoring, and, further, arise the need for volunteer involvement to achieve long-term viability.

  18. New hybrid reverse differential pulse position width modulation scheme for wireless optical communication

    Science.gov (United States)

    Liao, Renbo; Liu, Hongzhan; Qiao, Yaojun

    2014-05-01

    In order to improve the power efficiency and reduce the packet error rate of reverse differential pulse position modulation (RDPPM) for wireless optical communication (WOC), a hybrid reverse differential pulse position width modulation (RDPPWM) scheme is proposed, based on RDPPM and reverse pulse width modulation. Subsequently, the symbol structure of RDPPWM is briefly analyzed, and its performance is compared with that of other modulation schemes in terms of average transmitted power, bandwidth requirement, and packet error rate over ideal additive white Gaussian noise (AWGN) channels. Based on the given model, the simulation results show that the proposed modulation scheme has the advantages of improving the power efficiency and reducing the bandwidth requirement. Moreover, in terms of error probability performance, RDPPWM can achieve a much lower packet error rate than that of RDPPM. For example, at the same received signal power of -28 dBm, the packet error rate of RDPPWM can decrease to 2.6×10-12, while that of RDPPM is 2.2×10. Furthermore, RDPPWM does not need symbol synchronization at the receiving end. These considerations make RDPPWM a favorable candidate to select as the modulation scheme in the WOC systems.

  19. MEDRank: using graph-based concept ranking to index biomedical texts.

    Science.gov (United States)

    Herskovic, Jorge R; Cohen, Trevor; Subramanian, Devika; Iyengar, M Sriram; Smith, Jack W; Bernstam, Elmer V

    2011-06-01

    As the volume of biomedical text increases exponentially, automatic indexing becomes increasingly important. However, existing approaches do not distinguish central (or core) concepts from concepts that were mentioned in passing. We focus on the problem of indexing MEDLINE records, a process that is currently performed by highly trained humans at the National Library of Medicine (NLM). NLM indexers are assisted by a system called the Medical Text Indexer (MTI) that suggests candidate indexing terms. To improve the ability of MTI to select the core terms in MEDLINE abstracts. These core concepts are deemed to be most important and are designated as "major headings" by MEDLINE indexers. We introduce and evaluate a graph-based indexing methodology called MEDRank that generates concept graphs from biomedical text and then ranks the concepts within these graphs to identify the most important ones. We insert a MEDRank step into the MTI and compare MTI's output with and without MEDRank to the MEDLINE indexers' selected terms for a sample of 11,803 PubMed Central articles. We also tested whether human raters prefer terms generated by the MEDLINE indexers, MTI without MEDRank, and MTI with MEDRank for a sample of 36 PubMed Central articles. MEDRank improved recall of major headings designated by 30% over MTI without MEDRank (0.489 vs. 0.376). Overall recall was only slightly (6.5%) higher (0.490 vs. 0.460) as was F(2) (3%, 0.408 vs. 0.396). However, overall precision was 3.9% lower (0.268 vs. 0.279). Human raters preferred terms generated by MTI with MEDRank over terms generated by MTI without MEDRank (by an average of 1.00 more term per article), and preferred terms generated by MTI with MEDRank and the MEDLINE indexers at the same rate. The addition of MEDRank to MTI significantly improved the retrieval of core concepts in MEDLINE abstracts and more closely matched human expectations compared to MTI without MEDRank. In addition, MEDRank slightly improved overall recall

  20. Waveguide-loaded silica fibers for coupling to high-index micro-resonators

    Science.gov (United States)

    Latawiec, P.; Burek, M. J.; Venkataraman, V.; Lončar, M.

    2016-01-01

    Tapered silica fibers are often used to rapidly probe the optical properties of micro-resonators. However, their low refractive index precludes phase-matching when coupling to high-index micro-resonators, reducing efficiency. Here, we demonstrate efficient optical coupling from tapered fibers to high-index micro-resonators by loading the fibers with an ancillary adiabatic waveguide-coupler fabricated via angled-etching. We demonstrate greatly enhanced coupling to a silicon multimode micro-resonator when compared to coupling via the bare fiber only. Signatures of resonator optical bistability are observed at high powers. This scheme can be applied to resonators of any size and material, increasing the functional scope of fiber coupling.

  1. Equivalence between the Energy Stable Flux Reconstruction and Filtered Discontinuous Galerkin Schemes

    Science.gov (United States)

    Zwanenburg, Philip; Nadarajah, Siva

    2016-02-01

    The aim of this paper is to demonstrate the equivalence between filtered Discontinuous Galerkin (DG) schemes and the Energy Stable Flux Reconstruction (ESFR) schemes, expanding on previous demonstrations in 1D [1] and for straight-sided elements in 3D [2]. We first derive the DG and ESFR schemes in strong form and compare the respective flux penalization terms while highlighting the implications of the fundamental assumptions for stability in the ESFR formulations, notably that all ESFR scheme correction fields can be interpreted as modally filtered DG correction fields. We present the result in the general context of all higher dimensional curvilinear element formulations. Through a demonstration that there exists a weak form of the ESFR schemes which is both discretely and analytically equivalent to the strong form, we then extend the results obtained for the strong formulations to demonstrate that ESFR schemes can be interpreted as a DG scheme in weak form where discontinuous edge flux is substituted for numerical edge flux correction. Theoretical derivations are then verified with numerical results obtained from a 2D Euler testcase with curved boundaries. Given the current choice of high-order DG-type schemes and the question as to which might be best to use for a specific application, the main significance of this work is the bridge that it provides between them. Clearly outlining the similarities between the schemes results in the important conclusion that it is always less efficient to use ESFR schemes, as opposed to the weak DG scheme, when solving problems implicitly.

  2. CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sharma Abhijit

    2016-11-01

    Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.

  3. The effects of China’s urban basic medical insurance schemes on the equity of health service utilisation: evidence from Shaanxi Province

    Science.gov (United States)

    2014-01-01

    Introduction In order to alleviate the problem of “Kan Bing Nan, Kan Bing Gui” (medical treatment is difficult to access and expensive) and improve the equity of health service utilisation for urban residents in China, the Urban Employee Basic Medical Insurance scheme (UEBMI) and Urban Resident Basic Medical Insurance scheme (URBMI) were established in 1999 and 2007, respectively. This study aims to analyse the effects of UEBMI and URBMI on the equity of outpatient and inpatient utilisation in Shaanxi Province, China. Methods Using the data from the fourth National Health Services Survey in Shaanxi Province, the method of Propensity Score Matching was employed to generate comparable samples between the insured and uninsured residents, through a one-to-one match algorithm. Next, based on the matched data, the method of decomposition of the concentration index was employed to compare the horizontal inequity indexes of health service utilisation between the UEBMI/URBMI insured and the matched uninsured residents. Results For the UEBMI insured and matched uninsured residents, the horizontal inequity indexes of outpatient visits are 0.1256 and -0.0511 respectively, and the horizontal inequity indexes of inpatient visits are 0.1222 and 0.2746 respectively. Meanwhile, the horizontal inequity indexes of outpatient visits are -0.1593 and 0.0967 for the URBMI insured and matched uninsured residents, and the horizontal inequity indexes of inpatient visits are 0.1931 and 0.3199 respectively. Conclusions The implementation of UEBMI increased the pro-rich inequity of outpatient utilisation (rich people utilise outpatient facilities more than the poor people) and the implementation of URBMI increased the pro-poor inequity of outpatient utilisation. Both of these two health insurance schemes reduced the pro-rich inequity of inpatient utilisation. PMID:24606592

  4. A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs

    Directory of Open Access Journals (Sweden)

    Md. Amirul Islam

    2018-01-01

    Full Text Available This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time slot reassignment” mechanism. The scheme has been simulated in VEINS framework of OMNET++ network simulator and its performance has been compared with other conventional protocols. Experimental results show that our scheme performs better than existing schemes in terms of successfully transmitted data packets.

  5. Indexing of Popular Periodicals: The State of the Art

    Science.gov (United States)

    Aveney, Brian; Slade, Rod

    1978-01-01

    Nine indexing services of popular periodicals are discussed in terms of content, coverage, and characteristics: Access, Consumers Index, Index to Free Periodicals, New York Times Information Bank, Magazine Index, Monthly Periodicals Index, New Periodicals Index, Popular Periodical Index, and Readers Guide. A table indicates coverage for each index…

  6. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  7. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  8. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  9. Mammography image assessment; validity and reliability of current scheme

    International Nuclear Information System (INIS)

    Hill, C.; Robinson, L.

    2015-01-01

    Mammographers currently score their own images according to criteria set out by Regional Quality Assurance. The criteria used are based on the ‘Perfect, Good, Moderate, Inadequate’ (PGMI) marking criteria established by the National Health Service Breast Screening Programme (NHSBSP) in their Quality Assurance Guidelines of 2006 1 . This document discusses the validity and reliability of the current mammography image assessment scheme. Commencing with a critical review of the literature this document sets out to highlight problems with the national approach to the use of marking schemes. The findings suggest that ‘PGMI’ scheme is flawed in terms of reliability and validity and is not universally applied across the UK. There also appear to be differences in schemes used by trainees and qualified mammographers. Initial recommendations are to be made in collaboration with colleagues within the National Health Service Breast Screening Programme (NHSBSP), Higher Education Centres, College of Radiographers and the Royal College of Radiologists in order to identify a mammography image appraisal scheme that is fit for purpose. - Highlights: • Currently no robust evidence based marking tools in use for the assessment of images in mammography. • Is current system valid, reliable and robust? • How can the current image assessment tool be improved? • Should students and qualified mammographers use the same tool? • What marking criteria are available for image assessment?

  10. Exergame Grading Scheme: Concept Development and Preliminary Psychometric Evaluations in Cancer Survivors

    Directory of Open Access Journals (Sweden)

    Hsiao-Lan Wang

    2017-01-01

    Full Text Available The challenge of using exergames to promote physical activity among cancer survivors lies in the selection of the exergames that match their fitness level. There is a need for a standardized grading scheme by which to judge an exergame’s capacity to address specific physical fitness attributes with different levels of physical engagement. The study aimed to develop an Exergame Grading Scheme and preliminarily evaluate its psychometric properties. Fourteen (14 items were created from the human movement and exergame literature. The content validity index (CVI was rated by content experts with two consecutive rounds (N=5 and N=3 independently. The interrater reliability (IRR was determined by two raters who used the Exergame Grading Scheme to determine the grading score of the five exergames performed by two cancer survivors (N=10. Each item had a score of 1 for item-level CVI and 1 for k. For IRR, 9 items had rho values of 1, 1 item had 0.93, and 4 items had between 0.80 and 0.89. This valid and reliable Exergame Grading Scheme makes it possible to develop a personalized physical activity program using any type of exergame or fitness mobile application in rehabilitation practice to meet the needs of cancer survivors.

  11. Advanced lattice Boltzmann scheme for high-Reynolds-number magneto-hydrodynamic flows

    Science.gov (United States)

    De Rosis, Alessandro; Lévêque, Emmanuel; Chahine, Robert

    2018-06-01

    Is the lattice Boltzmann method suitable to investigate numerically high-Reynolds-number magneto-hydrodynamic (MHD) flows? It is shown that a standard approach based on the Bhatnagar-Gross-Krook (BGK) collision operator rapidly yields unstable simulations as the Reynolds number increases. In order to circumvent this limitation, it is here suggested to address the collision procedure in the space of central moments for the fluid dynamics. Therefore, an hybrid lattice Boltzmann scheme is introduced, which couples a central-moment scheme for the velocity with a BGK scheme for the space-and-time evolution of the magnetic field. This method outperforms the standard approach in terms of stability, allowing us to simulate high-Reynolds-number MHD flows with non-unitary Prandtl number while maintaining accuracy and physical consistency.

  12. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  13. Analysis of reaction schemes using maximum rates of constituent steps

    Science.gov (United States)

    Motagamwala, Ali Hussain; Dumesic, James A.

    2016-01-01

    We show that the steady-state kinetics of a chemical reaction can be analyzed analytically in terms of proposed reaction schemes composed of series of steps with stoichiometric numbers equal to unity by calculating the maximum rates of the constituent steps, rmax,i, assuming that all of the remaining steps are quasi-equilibrated. Analytical expressions can be derived in terms of rmax,i to calculate degrees of rate control for each step to determine the extent to which each step controls the rate of the overall stoichiometric reaction. The values of rmax,i can be used to predict the rate of the overall stoichiometric reaction, making it possible to estimate the observed reaction kinetics. This approach can be used for catalytic reactions to identify transition states and adsorbed species that are important in controlling catalyst performance, such that detailed calculations using electronic structure calculations (e.g., density functional theory) can be carried out for these species, whereas more approximate methods (e.g., scaling relations) are used for the remaining species. This approach to assess the feasibility of proposed reaction schemes is exact for reaction schemes where the stoichiometric coefficients of the constituent steps are equal to unity and the most abundant adsorbed species are in quasi-equilibrium with the gas phase and can be used in an approximate manner to probe the performance of more general reaction schemes, followed by more detailed analyses using full microkinetic models to determine the surface coverages by adsorbed species and the degrees of rate control of the elementary steps. PMID:27162366

  14. Decoupled Scheme for Time-Dependent Natural Convection Problem II: Time Semidiscreteness

    Directory of Open Access Journals (Sweden)

    Tong Zhang

    2014-01-01

    stability and the corresponding optimal error estimates are presented. Furthermore, a decoupled numerical scheme is proposed by decoupling the nonlinear terms via temporal extrapolation; optimal error estimates are established. Finally, some numerical results are provided to verify the performances of the developed algorithms. Compared with the coupled numerical scheme, the decoupled algorithm not only keeps good accuracy but also saves a lot of computational cost. Both theoretical analysis and numerical experiments show the efficiency and effectiveness of the decoupled method for time-dependent natural convection problem.

  15. Numerical study of read scheme in one-selector one-resistor crossbar array

    Science.gov (United States)

    Kim, Sungho; Kim, Hee-Dong; Choi, Sung-Jin

    2015-12-01

    A comprehensive numerical circuit analysis of read schemes of a one selector-one resistance change memory (1S1R) crossbar array is carried out. Three schemes-the ground, V/2, and V/3 schemes-are compared with each other in terms of sensing margin and power consumption. Without the aid of a complex analytical approach or SPICE-based simulation, a simple numerical iteration method is developed to simulate entire current flows and node voltages within a crossbar array. Understanding such phenomena is essential in successfully evaluating the electrical specifications of selectors for suppressing intrinsic drawbacks of crossbar arrays, such as sneaky current paths and series line resistance problems. This method provides a quantitative tool for the accurate analysis of crossbar arrays and provides guidelines for developing an optimal read scheme, array configuration, and selector device specifications.

  16. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  17. Adapting the Elder Abuse Suspicion Index© for Use in Long-Term Care: A Mixed-Methods Approach.

    Science.gov (United States)

    Ballard, Stephanie A; Yaffe, Mark J; August, Linda; Cetin-Sahin, Deniz; Wilchesky, Machelle

    2017-09-01

    Currently available elder abuse screening and identification tools have limitations for use in long-term care (LTC). This mixed-methods study sought to explore the appropriateness of using the Elder Abuse Suspicion Index© (a suspicion tool originally created for use with older adults in the ambulatory setting with Mini-Mental State Examination scores ≥ 24) with similarly cognitively functioning persons residing in LTC. Results were informed by a literature review, Internet-based consultations with elder abuse experts across Canada ( n = 19), and data obtained from two purposively selected focus groups ( n = 7 local elder abuse experts; n = 7 experienced front-line LTC clinicians). Analyses resulted in the development of a nine-question tool, the EASI-ltc, designed to raise suspicion of EA in cognitively intact older adults residing in LTC (with little or no cognitive impairment). Notable modifications to the original Elder Abuse Suspicion Index © (EASI) included three new questions to further address neglect and psychological abuse, and a context-specific preamble to orient responders.

  18. A Deployment Scheme Based Upon Virtual Force for Directional Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo Liang

    2015-11-01

    Full Text Available A directional sensor network is composed of many directional sensor nodes. Unlike conventional omni-directional sensors that always have an omni-angle of sensing range; directional sensors may have a limited angle of sensing range due to technical constraints or cost considerations. Area coverage is still an essential issue in a directional sensor network. In this paper, we study the area coverage problem in directional sensor networks with mobile sensors, which can move to the correct places to get high coverage. We present distributed self-deployment schemes of mobile sensors. After sensors are randomly deployed, each sensor calculates its next new location to move in order to obtain a better coverage than previous one. The locations of sensors are adjusted round by round so that the coverage is gradually improved. Based on the virtual force of the directional sensors, we design a scheme, namely Virtual force scheme. Simulation results show the effectiveness of our scheme in term of the coverage improvement.

  19. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  20. Diversity-Multiplexing Trade-off for Coordinated Direct and Relay Schemes

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    The recent years have brought a significant body of research on wireless Two-Way Relaying (TWR), where the use of network coding brings an evident advantage in terms of data rates. Yet, TWR scenarios represent only a special case and it is of interest to devise similar techniques in more general...... Direct/Relay (CDR) schemes, which involve two flows, of a direct and a relayed user. In this paper we characterize a CDR scheme by deriving/bounding the Diversity-Multiplexing Trade-off (DMT) function. Two cases are considered. In the first case a transmitter knows the Channel State Information (CSI...

  1. Scheme-scale ambiguity in analysis of QCD observable

    International Nuclear Information System (INIS)

    Mirjalili, A.; Kniehl, B.A.

    2010-01-01

    The scheme-scale ambiguity that has plagued perturbative analysis in QCD remains on obstacle to making precise tests of the theory. Many attempts have been done to resolve the scale ambiguity. In this regard the BLM, EC, PMS and CORGI approaches are more distinct. We try to employ these methods to fix the scale ambiguity at NLO, NNLO and even in more higher order approximations. By optimizing the renormalization scale, there will be a possibility to predicate higher order terms. We present general results for predicted terms at any order, using different optimization methods. Some observable as specific examples will be used to indicate the validity of scale fixing to predicate the higher order terms. (authors)

  2. Cabauw Experimental Results from the Project for Intercomparison of Land-Surface Parameterization Schemes.

    Science.gov (United States)

    Chen, T. H.; Henderson-Sellers, A.; Milly, P. C. D.; Pitman, A. J.; Beljaars, A. C. M.; Polcher, J.; Abramopoulos, F.; Boone, A.; Chang, S.; Chen, F.; Dai, Y.; Desborough, C. E.; Dickinson, R. E.; Dümenil, L.; Ek, M.; Garratt, J. R.; Gedney, N.; Gusev, Y. M.;  Kim, J.;  Koster, R.;  Kowalczyk, E. A.;  Laval, K.;  Lean, J.;  Lettenmaier, D.;  Liang, X.;  Mahfouf, J.-F.;  Mengelkamp, H.-T.;  Mitchell, K.;  Nasonova, O. N.;  Noilhan, J.;  Robock, A.;  Rosenzweig, C.;  Schaake, J.;  Schlosser, C. A.;  Schulz, J.-P.;  Shao, Y.;  Shmakin, A. B.;  Verseghy, D. L.;  Wetzel, P.;  Wood, E. F.;  Xue, Y.;  Yang, Z.-L.;  Zeng, Q.

    1997-06-01

    In the Project for Intercomparison of Land-Surface Parameterization Schemes phase 2a experiment, meteorological data for the year 1987 from Cabauw, the Netherlands, were used as inputs to 23 land-surface flux schemes designed for use in climate and weather models. Schemes were evaluated by comparing their outputs with long-term measurements of surface sensible heat fluxes into the atmosphere and the ground, and of upward longwave radiation and total net radiative fluxes, and also comparing them with latent heat fluxes derived from a surface energy balance. Tuning of schemes by use of the observed flux data was not permitted. On an annual basis, the predicted surface radiative temperature exhibits a range of 2 K across schemes, consistent with the range of about 10 W m2 in predicted surface net radiation. Most modeled values of monthly net radiation differ from the observations by less than the estimated maximum monthly observational error (±10 W m2). However, modeled radiative surface temperature appears to have a systematic positive bias in most schemes; this might be explained by an error in assumed emissivity and by models' neglect of canopy thermal heterogeneity. Annual means of sensible and latent heat fluxes, into which net radiation is partitioned, have ranges across schemes of30 W m2 and 25 W m2, respectively. Annual totals of evapotranspiration and runoff, into which the precipitation is partitioned, both have ranges of 315 mm. These ranges in annual heat and water fluxes were approximately halved upon exclusion of the three schemes that have no stomatal resistance under non-water-stressed conditions. Many schemes tend to underestimate latent heat flux and overestimate sensible heat flux in summer, with a reverse tendency in winter. For six schemes, root-mean-square deviations of predictions from monthly observations are less than the estimated upper bounds on observation errors (5 W m2 for sensible heat flux and 10 W m2 for latent heat flux). Actual

  3. AN ADVANCED LEAKAGE SCHEME FOR NEUTRINO TREATMENT IN ASTROPHYSICAL SIMULATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Perego, A. [Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstraße 2, D-64289 Darmstadt (Germany); Cabezón, R. M. [Physics Department, University of Basel, Klingelbergstrasse 82, CH-4056 Basel (Switzerland); Käppeli, R., E-mail: albino.perego@physik.tu-darmstadt.de [Seminar for Applied Mathematics, ETH Zürich, Rämistrasse 101, 8092 Zürich (Switzerland)

    2016-04-15

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  4. Numerical solution of special ultra-relativistic Euler equations using central upwind scheme

    Science.gov (United States)

    Ghaffar, Tayabia; Yousaf, Muhammad; Qamar, Shamsul

    2018-06-01

    This article is concerned with the numerical approximation of one and two-dimensional special ultra-relativistic Euler equations. The governing equations are coupled first-order nonlinear hyperbolic partial differential equations. These equations describe perfect fluid flow in terms of the particle density, the four-velocity and the pressure. A high-resolution shock-capturing central upwind scheme is employed to solve the model equations. To avoid excessive numerical diffusion, the considered scheme avails the specific information of local propagation speeds. By using Runge-Kutta time stepping method and MUSCL-type initial reconstruction, we have obtained 2nd order accuracy of the proposed scheme. After discussing the model equations and the numerical technique, several 1D and 2D test problems are investigated. For all the numerical test cases, our proposed scheme demonstrates very good agreement with the results obtained by well-established algorithms, even in the case of highly relativistic 2D test problems. For validation and comparison, the staggered central scheme and the kinetic flux-vector splitting (KFVS) method are also implemented to the same model. The robustness and efficiency of central upwind scheme is demonstrated by the numerical results.

  5. Dictionary Indexing of Electron Channeling Patterns.

    Science.gov (United States)

    Singh, Saransh; De Graef, Marc

    2017-02-01

    The dictionary-based approach to the indexing of diffraction patterns is applied to electron channeling patterns (ECPs). The main ingredients of the dictionary method are introduced, including the generalized forward projector (GFP), the relevant detector model, and a scheme to uniformly sample orientation space using the "cubochoric" representation. The GFP is used to compute an ECP "master" pattern. Derivative free optimization algorithms, including the Nelder-Mead simplex and the bound optimization by quadratic approximation are used to determine the correct detector parameters and to refine the orientation obtained from the dictionary approach. The indexing method is applied to poly-silicon and shows excellent agreement with the calibrated values. Finally, it is shown that the method results in a mean disorientation error of 1.0° with 0.5° SD for a range of detector parameters.

  6. Impacts of Rotation Schemes on Ground-Dwelling Beneficial Arthropods.

    Science.gov (United States)

    Dunbar, Mike W; Gassmann, Aaron J; O'Neal, Matthew E

    2016-10-01

    Crop rotation alters agroecosystem diversity temporally, and increasing the number of crops in rotation schemes can increase crop yields and reduce reliance on pesticides. We hypothesized that increasing the number of crops in annual rotation schemes would positively affect ground-dwelling beneficial arthropod communities. During 2012 and 2013, pitfall traps were used to measure activity-density and diversity of ground-dwelling communities within three previously established, long-term crop rotation studies located in Wisconsin and Illinois. Rotation schemes sampled included continuous corn, a 2-yr annual rotation of corn and soybean, and a 3-yr annual rotation of corn, soybean, and wheat. Insects captured were identified to family, and non-insect arthropods were identified to class, order, or family, depending upon the taxa. Beneficial arthropods captured included natural enemies, granivores, and detritivores. The beneficial community from continuous corn plots was significantly more diverse compared with the community in the 2-yr rotation, whereas the community in the 3-yr rotation did not differ from either rotation scheme. The activity-density of the total community and any individual taxa did not differ among rotation schemes in either corn or soybean. Crop species within all three rotation schemes were annual crops, and are associated with agricultural practices that make infield habitat subject to anthropogenic disturbances and temporally unstable. Habitat instability and disturbance can limit the effectiveness and retention of beneficial arthropods, including natural enemies, granivores, and detritivores. Increasing non-crop and perennial species within landscapes in conjunction with more diverse rotation schemes may increase the effect of biological control of pests by natural enemies. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Accounting for early action in the European Union Emission Trading Scheme

    International Nuclear Information System (INIS)

    Arto, Inaki; Gallastegui, Carmen; Ansuategi, Alberto

    2009-01-01

    In the context of emission markets, failure to include early action (EA) as a criterion when sharing out the reduction effort may be unfair. This paper presents (1) a method based on index decomposition that seeks to quantify EA and (2) a method for determining effort sharing considering EA. It is shown that, in the case of European industry (EU-15) and for the period 1995-2005, EA accounted for a reduction of 21% in energy-related CO 2 emissions. Considering two alternative schemes for sharing out the reduction effort in European industry, equal shares (all industries in all countries reduce their emissions by the same percentage) and taking EA into account, we find that Spain, Austria, Italy, the United Kingdom and Sweden would be better off under an equal shares scheme as opposed to one that takes EA into account. The efforts of the remaining countries would be greater than if EA was taken into account. An equal shares scheme would also greatly benefit the textile, non-metallic mineral, paper and 'other' industries, and would be particularly detrimental to the chemical, non-ferrous and other metal, and engineering industries.

  8. Accounting for early action in the European Union Emission Trading Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Arto, Inaki [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Gallastegui, Carmen [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Ansuategi, Alberto [Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain)

    2009-10-15

    In the context of emission markets, failure to include early action (EA) as a criterion when sharing out the reduction effort may be unfair. This paper presents (1) a method based on index decomposition that seeks to quantify EA and (2) a method for determining effort sharing considering EA. It is shown that, in the case of European industry (EU-15) and for the period 1995-2005, EA accounted for a reduction of 21% in energy-related CO{sub 2} emissions. Considering two alternative schemes for sharing out the reduction effort in European industry, equal shares (all industries in all countries reduce their emissions by the same percentage) and taking EA into account, we find that Spain, Austria, Italy, the United Kingdom and Sweden would be better off under an equal shares scheme as opposed to one that takes EA into account. The efforts of the remaining countries would be greater than if EA was taken into account. An equal shares scheme would also greatly benefit the textile, non-metallic mineral, paper and 'other' industries, and would be particularly detrimental to the chemical, non-ferrous and other metal, and engineering industries. (author)

  9. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  10. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  11. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2017-05-01

    Full Text Available Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015 and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  12. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  13. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  14. Convergence Analysis of a FV-FE Scheme for Partially Miscible Two-Phase Flow in Anisotropic Porous Media

    KAUST Repository

    Saad, Bilal Mohammed; Saad, Mazen

    2014-01-01

    We study the convergence of a combined finite volume nonconforming finite element scheme on general meshes for a partially miscible two-phase flow model in anisotropic porous media. This model includes capillary effects and exchange between the phase. The diffusion term,which can be anisotropic and heterogeneous, is discretized by piecewise linear nonconforming triangular finite elements. The other terms are discretized by means of a cell-centered finite volume scheme on a dual mesh. The relative permeability of each phase is decentred according the sign of the velocity at the dual interface. The convergence of the scheme is proved thanks to an estimate on the two pressures which allows to show estimates on the discrete time and compactness results in the case of degenerate relative permeabilities. A key point in the scheme is to use particular averaging formula for the dissolution function arising in the diffusion term. We show also a simulation of CO2 injection in a water saturated reservoir and nuclear waste management. Numerical results are obtained by in-house numerical code. © Springer International Publishing Switzerland 2014.

  15. Breakdown of NpNn scheme in very heavy nuclei

    International Nuclear Information System (INIS)

    Varshney, A.K.; Singh, M.; Kumar, Rajesh; Gupta, K.K.; Gupta, D.K.

    2016-01-01

    The proton neutron interaction has been considered the key ingredient in the development of configuration mixing, collectivity and ultimately deformation in atomic nuclei for over five decades. Phenomenologically, the correlation of the integrated valance p - n interaction with the onset of collectivity and deformation has been described in terms of NpNn scheme

  16. Scheme (in?) dependence in perturbative Lagrangian quantum field theory

    International Nuclear Information System (INIS)

    Slavnov, D.A.

    1995-01-01

    A problem of renormalization - scheme ambiguity in perturbation quantum field theory is investigated. A procedure is described that makes it possible to express uniquely all observable quantities in terms of a set base observables. Renormalization group equations for the base observable are constructed. The case of mass theory is treated. 9 refs

  17. Enhancing of chemical compound and drug name recognition using representative tag scheme and fine-grained tokenization.

    Science.gov (United States)

    Dai, Hong-Jie; Lai, Po-Ting; Chang, Yung-Chun; Tsai, Richard Tzong-Han

    2015-01-01

    The functions of chemical compounds and drugs that affect biological processes and their particular effect on the onset and treatment of diseases have attracted increasing interest with the advancement of research in the life sciences. To extract knowledge from the extensive literatures on such compounds and drugs, the organizers of BioCreative IV administered the CHEMical Compound and Drug Named Entity Recognition (CHEMDNER) task to establish a standard dataset for evaluating state-of-the-art chemical entity recognition methods. This study introduces the approach of our CHEMDNER system. Instead of emphasizing the development of novel feature sets for machine learning, this study investigates the effect of various tag schemes on the recognition of the names of chemicals and drugs by using conditional random fields. Experiments were conducted using combinations of different tokenization strategies and tag schemes to investigate the effects of tag set selection and tokenization method on the CHEMDNER task. This study presents the performance of CHEMDNER of three more representative tag schemes-IOBE, IOBES, and IOB12E-when applied to a widely utilized IOB tag set and combined with the coarse-/fine-grained tokenization methods. The experimental results thus reveal that the fine-grained tokenization strategy performance best in terms of precision, recall and F-scores when the IOBES tag set was utilized. The IOBES model with fine-grained tokenization yielded the best-F-scores in the six chemical entity categories other than the "Multiple" entity category. Nonetheless, no significant improvement was observed when a more representative tag schemes was used with the coarse or fine-grained tokenization rules. The best F-scores that were achieved using the developed system on the test dataset of the CHEMDNER task were 0.833 and 0.815 for the chemical documents indexing and the chemical entity mention recognition tasks, respectively. The results herein highlight the importance

  18. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    Science.gov (United States)

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  19. Sign language indexation within the MPEG-7 framework

    Science.gov (United States)

    Zaharia, Titus; Preda, Marius; Preteux, Francoise J.

    1999-06-01

    In this paper, we address the issue of sign language indexation/recognition. The existing tools, like on-like Web dictionaries or other educational-oriented applications, are making exclusive use of textural annotations. However, keyword indexing schemes have strong limitations due to the ambiguity of the natural language and to the huge effort needed to manually annotate a large amount of data. In order to overcome these drawbacks, we tackle sign language indexation issue within the MPEG-7 framework and propose an approach based on linguistic properties and characteristics of sing language. The method developed introduces the concept of over time stable hand configuration instanciated on natural or synthetic prototypes. The prototypes are indexed by means of a shape descriptor which is defined as a translation, rotation and scale invariant Hough transform. A very compact representation is available by considering the Fourier transform of the Hough coefficients. Such an approach has been applied to two data sets consisting of 'Letters' and 'Words' respectively. The accuracy and robustness of the result are discussed and a compete sign language description schema is proposed.

  20. Impact of Vegetation Cover Fraction Parameterization schemes on Land Surface Temperature Simulation in the Tibetan Plateau

    Science.gov (United States)

    Lv, M.; Li, C.; Lu, H.; Yang, K.; Chen, Y.

    2017-12-01

    The parameterization of vegetation cover fraction (VCF) is an important component of land surface models. This paper investigates the impacts of three VCF parameterization schemes on land surface temperature (LST) simulation by the Common Land Model (CoLM) in the Tibetan Plateau (TP). The first scheme is a simple land cover (LC) based method; the second one is based on remote sensing observation (hereafter named as RNVCF) , in which multi-year climatology VCFs is derived from Moderate-resolution Imaging Spectroradiometer (MODIS) NDVI (Normalized Difference Vegetation Index); the third VCF parameterization scheme derives VCF from the LAI simulated by LSM and clump index at every model time step (hereafter named as SMVCF). Simulated land surface temperature(LST) and soil temperature by CoLM with three VCF parameterization schemes were evaluated by using satellite LST observation and in situ soil temperature observation, respectively, during the period of 2010 to 2013. The comparison against MODIS Aqua LST indicates that (1) CTL produces large biases for both four seasons in early afternoon (about 13:30, local solar time), while the mean bias in spring reach to 12.14K; (2) RNVCF and SMVCF reduce the mean bias significantly, especially in spring as such reduce is about 6.5K. Surface soil temperature observed at 5 cm depth from three soil moisture and temperature monitoring networks is also employed to assess the skill of three VCF schemes. The three networks, crossing TP from West to East, have different climate and vegetation conditions. In the Ngari network, located in the Western TP with an arid climate, there are not obvious differences among three schemes. In Naqu network, located in central TP with a semi-arid climate condition, CTL shows a severe overestimates (12.1 K), but such overestimations can be reduced by 79% by RNVCF and 87% by SMVCF. In the third humid network (Maqu in eastern TP), CoLM performs similar to Naqu. However, at both Naqu and Maqu networks

  1. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  2. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    Science.gov (United States)

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  3. Prediction-based association control scheme in dense femtocell networks

    Science.gov (United States)

    Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond

    2017-01-01

    The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system’s effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective. PMID:28328992

  4. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    Science.gov (United States)

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  5. The generalized scheme-independent Crewther relation in QCD

    Science.gov (United States)

    Shen, Jian-Ming; Wu, Xing-Gang; Ma, Yang; Brodsky, Stanley J.

    2017-07-01

    The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton-nucleon scattering times the Adler function, defined from the cross section for electron-positron annihilation into hadrons, has no pQCD radiative corrections. The ;Generalized Crewther Relation; relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp) at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp-1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd (Q) =∑i≥1 αˆg1 i (Qi), at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is negligible. Similar

  6. Reducing the spectral index in supernatural inflation

    International Nuclear Information System (INIS)

    Lin, C.-M.; Cheung, Kingman

    2009-01-01

    Supernatural inflation is an attractive model based on just a flat direction with soft supersymmetry breaking mass terms in the framework of supersymmetry. The beauty of the model is that it needs no fine-tuning. However, the prediction of the spectral index is n s > or approx. 1, in contrast to experimental data. In this paper, we discuss supernatural inflation with the spectral index reduced to n s =0.96 without any fine-tuning, considering the general feature that a flat direction is lifted by a nonrenormalizable term with an A-term.

  7. Reducing the spectral index in supernatural inflation

    Science.gov (United States)

    Lin, Chia-Min; Cheung, Kingman

    2009-04-01

    Supernatural inflation is an attractive model based on just a flat direction with soft supersymmetry breaking mass terms in the framework of supersymmetry. The beauty of the model is that it needs no fine-tuning. However, the prediction of the spectral index is ns≳1, in contrast to experimental data. In this paper, we discuss supernatural inflation with the spectral index reduced to ns=0.96 without any fine-tuning, considering the general feature that a flat direction is lifted by a nonrenormalizable term with an A-term.

  8. Low-complexity full-rate transmission scheme with full diversity for two-path relay networks

    KAUST Repository

    Fareed, Muhammad Mehboob; Yang, Hongchuan; Alouini, Mohamed-Slim

    2015-01-01

    Existing full-rate transmission schemes for two-path relay networks typically cannot achieve full diversity while demanding high decoding complexity. In this paper, we present a novel low-complexity full-rate transmission scheme for two-path relay networks to harvest maximum achievable diversity. The proposed scheme adopts block transmission with small block size of four symbols, which greatly reduces the decoding complexity at the receiver. Through the performance analysis of the resulting two-path relay network in terms of the symbol error rate (SER) and diversity order, we show the proposed scheme can achieve full diversity order of four and mimic a 2 \\times 2 multiple-input multiple-output system. Simulations results are provided to validate the mathematical formulation. © 1967-2012 IEEE.

  9. Low-complexity full-rate transmission scheme with full diversity for two-path relay networks

    KAUST Repository

    Fareed, Muhammad Mehboob

    2015-04-01

    Existing full-rate transmission schemes for two-path relay networks typically cannot achieve full diversity while demanding high decoding complexity. In this paper, we present a novel low-complexity full-rate transmission scheme for two-path relay networks to harvest maximum achievable diversity. The proposed scheme adopts block transmission with small block size of four symbols, which greatly reduces the decoding complexity at the receiver. Through the performance analysis of the resulting two-path relay network in terms of the symbol error rate (SER) and diversity order, we show the proposed scheme can achieve full diversity order of four and mimic a 2 \\\\times 2 multiple-input multiple-output system. Simulations results are provided to validate the mathematical formulation. © 1967-2012 IEEE.

  10. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  11. The effect of discounting, different mortality reduction schemes and predictive cohort life tables on risk acceptability criteria

    International Nuclear Information System (INIS)

    Rackwitz, Ruediger

    2006-01-01

    Technical facilities should be optimal with respect to benefits and cost. Optimization of technical facilities involving risks for human life and limb require an acceptability criterion and suitable discount rates both for the public and the operator depending on for whom the optimization is carried out. The life quality index is presented and embedded into modem socio-economic concepts. A general risk acceptability criterion is derived. The societal life saving cost to be used in optimization as life saving or compensation cost and the societal willingness-to-pay based on the societal value of a statistical life or on the societal life quality index are developed. Different mortality reduction schemes are studied. Also, predictive cohort life tables are derived and applied. Discount rates γ must be long-term averages in view of the time horizon of some 20 to more than 100 years for the facilities of interest and net of inflation and taxes. While the operator may use long-term averages from the financial market for his cost-benefit analysis the assessment of interest rates for investments of the public into risk reduction is more difficult. The classical Ramsey model decomposes the real interest rate (=output growth rate) into the rate of time preference of consumption and the rate of economical growth multiplied by the elasticity of marginal utility of consumption. It is proposed to use a relatively small interest rate of 3% implying a rate of time preference of consumption of about 1%. This appears intergenerationally acceptable from an ethical point of view. Risk-consequence curves are derived for an example

  12. Energy Stability Analysis of Some Fully Discrete Numerical Schemes for Incompressible Navier–Stokes Equations on Staggered Grids

    KAUST Repository

    Chen, Huangxin

    2017-09-01

    In this paper we consider the energy stability estimates for some fully discrete schemes which both consider time and spatial discretizations for the incompressible Navier–Stokes equations. We focus on three kinds of fully discrete schemes, i.e., the linear implicit scheme for time discretization with the finite difference method (FDM) on staggered grids for spatial discretization, pressure-correction schemes for time discretization with the FDM on staggered grids for the solutions of the decoupled velocity and pressure equations, and pressure-stabilization schemes for time discretization with the FDM on staggered grids for the solutions of the decoupled velocity and pressure equations. The energy stability estimates are obtained for the above each fully discrete scheme. The upwind scheme is used in the discretization of the convection term which plays an important role in the design of unconditionally stable discrete schemes. Numerical results are given to verify the theoretical analysis.

  13. Body mass index, initial neurological severity and long-term mortality in ischemic stroke.

    Science.gov (United States)

    Ryu, Wi-Sun; Lee, Seung-Hoon; Kim, Chi Kyung; Kim, Beom Joon; Yoon, Byung-Woo

    2011-01-01

    Obesity is believed to increase the risks of ischemic stroke or coronary heart disease; however, regarding outcome after established vascular diseases, recent unexpected evidence has suggested that an increased body mass index (BMI) might have beneficial effects (obesity paradox). The aim of this study was to evaluate the independent association between BMI and long-term mortality after ischemic stroke. A total of 1,592 consecutive patients with ischemic stroke were prospectively included through our stroke cohort. In this study, the levels of BMI were classified based on guidelines for the Asian-Pacific population. Initial neurological severity was estimated by the National Institutes of Health Stroke Scale (NIHSS) score. Information on mortality was collected until the end of 2009, and the median follow-up period was 4 years. To examine the association between BMI and long-term mortality, we used Cox's proportional regression analysis. During follow-up, 23% of patients died. Linear regression analysis showed that the level of BMI was inversely related to initial neurological severity (p = 0.002). In the model of adjustment of age and gender using Cox's proportional regression analysis, this inverse trend was also significant (reference, normal weight; hazard ratio of underweight, 2.45; overweight, 0.77; obesity, 0.60). However, after adjustment of all covariates, including initial neurological severity, only the harmful effect of underweight remained significant (2.79; 95% CI, 1.92-4.05); however, beneficial effects of overweight and obesity did not. Our study showed that an independent association between BMI and long-term mortality after ischemic stroke was found only in underweight patients. The obesity paradox phenomenon seems to be limited, and might not be interpreted as a direct causal relationship due to a strong association with initial neurological severity. Copyright © 2011 S. Karger AG, Basel.

  14. Beam Dynamics Requirements for the Powering Scheme of the HL-LHC Triplet

    CERN Document Server

    AUTHOR|(CDS)2075212; Fartoukh, Stephane; Giovannozzi, Massimo

    2015-01-01

    For the HL-LHC, β ∗ values as small as 15 cm are envisaged as baseline scenario for the high luminosity insertions IR1 and IR5, thus leading to an increase of the maximum β- functions in the inner triplet (IT). The larger beta-functions in the IT result in a higher sensitivity of the beam to any linear or non-linear, static or dynamic, field imperfections in the IT region. In this paper, we summarize accordingly the tolerances of the triplet power supplies in terms of current ripple, stability and reproducibility. Both the baseline IT powering scheme and other alternative schemes will be presented, the later reducing the tune shift caused by a current modulation and thus weakening its possible impact on the long term stability.

  15. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  16. Supervising PTCA treatment with a scheme of steps combination SPECT 99Tcm-MIBI myocardial imaging

    International Nuclear Information System (INIS)

    Luan Zhaosheng; Tian Jiahe; Peng Yong; Zhou Wen; Gai Luyue; Sun Zhijun; Su Yuwen; Liu Xiaohu

    2001-01-01

    Objective: To set up a useful supervising method around PTCA treatment. Methods: A scheme of steps combination SPECT 99 Tc m -MIBI myocardial imaging was devised. 87 patients with coronary artery disease were selected into the study. 3-step imaging, exercise, rest and intravenous infusion of nitroglycerine (NTG) imaging, was performed at 1 week before PTCA. 2-step imaging, exercise and rest imaging, was performed 1-2 weeks after PTCA. All of the indexes obtained from steps combination imaging before and after PTCA were contrasted with each other in pairs. Results: 1) Compared with outcome of clinical assessing, the imaging after PTCA could correctly assess PTCA outcome. 2) The myocardial defects showed in 3-step imaging before PTCA appeared to be ameliorated after PTCA and the amelioration showed in exercise imaging was more evident than that in rest imaging. The myocardial perfusion state revealed by NTG imaging was similar to that revealed by rest imaging after PTCA. 3) The 3-step imaging findings correlated with PTCA outcome, the best correlation was found between indexes of myocardial defect changes showed by NTG and exercise imaging and indexes of PTCA outcome (r = 0.9470, P 99 Tc m -MIBI myocardial SPECT imaging scheme is a very useful supervising method around PTCA. 2-step imaging after PTCA could assess outcome correctly, and 3-step imaging before it could predict outcome correctly, too

  17. Generalized Roe's numerical scheme for a two-fluid model

    International Nuclear Information System (INIS)

    Toumi, I.; Raymond, P.

    1993-01-01

    This paper is devoted to a mathematical and numerical study of a six equation two-fluid model. We will prove that the model is strictly hyperbolic due to the inclusion of the virtual mass force term in the phasic momentum equations. The two-fluid model is naturally written under a nonconservative form. To solve the nonlinear Riemann problem for this nonconservative hyperbolic system, a generalized Roe's approximate Riemann solver, is used, based on a linearization of the nonconservative terms. A Godunov type numerical scheme is built, using this approximate Riemann solver. 10 refs., 5 figs,

  18. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  19. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism

    Science.gov (United States)

    Ye, Ruisong

    2011-10-01

    This paper proposes a novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the gray values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a generalized Arnold map is utilized to generate one chaotic orbit used to get two index order sequences for the permutation of image pixel positions; in the diffusion process, a generalized Arnold map and a generalized Bernoulli shift map are employed to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. The yielded gray value sequences are not only sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depend on the plain-image processed, therefore the proposed scheme can resist statistical attack, differential attack, known-plaintext as well as chosen-plaintext attack. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to resist brute-force attack as well.

  20. Comparison among Magnus/Floquet/Fer expansion schemes in solid-state NMR

    Science.gov (United States)

    Takegoshi, K.; Miyazawa, Norihiro; Sharma, Kshama; Madhu, P. K.

    2015-04-01

    We here revisit expansion schemes used in nuclear magnetic resonance (NMR) for the calculation of effective Hamiltonians and propagators, namely, Magnus, Floquet, and Fer expansions. While all the expansion schemes are powerful methods there are subtle differences among them. To understand the differences, we performed explicit calculation for heteronuclear dipolar decoupling, cross-polarization, and rotary-resonance experiments in solid-state NMR. As the propagator from the Fer expansion takes the form of a product of sub-propagators, it enables us to appreciate effects of time-evolution under Hamiltonians with different orders separately. While 0th-order average Hamiltonian is the same for the three expansion schemes with the three cases examined, there is a case that the 2nd-order term for the Magnus/Floquet expansion is different from that obtained with the Fer expansion. The difference arises due to the separation of the 0th-order term in the Fer expansion. The separation enables us to appreciate time-evolution under the 0th-order average Hamiltonian, however, for that purpose, we use a so-called left-running Fer expansion. Comparison between the left-running Fer expansion and the Magnus expansion indicates that the sign of the odd orders in Magnus may better be reversed if one would like to consider its effect in order.

  1. Comparison among Magnus/Floquet/Fer expansion schemes in solid-state NMR

    International Nuclear Information System (INIS)

    Takegoshi, K.; Miyazawa, Norihiro; Sharma, Kshama; Madhu, P. K.

    2015-01-01

    We here revisit expansion schemes used in nuclear magnetic resonance (NMR) for the calculation of effective Hamiltonians and propagators, namely, Magnus, Floquet, and Fer expansions. While all the expansion schemes are powerful methods there are subtle differences among them. To understand the differences, we performed explicit calculation for heteronuclear dipolar decoupling, cross-polarization, and rotary-resonance experiments in solid-state NMR. As the propagator from the Fer expansion takes the form of a product of sub-propagators, it enables us to appreciate effects of time-evolution under Hamiltonians with different orders separately. While 0th-order average Hamiltonian is the same for the three expansion schemes with the three cases examined, there is a case that the 2nd-order term for the Magnus/Floquet expansion is different from that obtained with the Fer expansion. The difference arises due to the separation of the 0th-order term in the Fer expansion. The separation enables us to appreciate time-evolution under the 0th-order average Hamiltonian, however, for that purpose, we use a so-called left-running Fer expansion. Comparison between the left-running Fer expansion and the Magnus expansion indicates that the sign of the odd orders in Magnus may better be reversed if one would like to consider its effect in order

  2. Comparison among Magnus/Floquet/Fer expansion schemes in solid-state NMR

    Energy Technology Data Exchange (ETDEWEB)

    Takegoshi, K., E-mail: takeyan@kuchem.kyoto-u.ac.jp; Miyazawa, Norihiro [Division of Chemistry, Graduate School of Science, Kyoto University, 606-8502 Kyoto (Japan); Sharma, Kshama [TIFR Centre for Interdisciplinary Sciences, 21 Brundavan Colony, Narsingi, Hyderabad 500 075 (India); Madhu, P. K. [TIFR Centre for Interdisciplinary Sciences, 21 Brundavan Colony, Narsingi, Hyderabad 500 075 (India); Department of Chemical Sciences, Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400 005 (India)

    2015-04-07

    We here revisit expansion schemes used in nuclear magnetic resonance (NMR) for the calculation of effective Hamiltonians and propagators, namely, Magnus, Floquet, and Fer expansions. While all the expansion schemes are powerful methods there are subtle differences among them. To understand the differences, we performed explicit calculation for heteronuclear dipolar decoupling, cross-polarization, and rotary-resonance experiments in solid-state NMR. As the propagator from the Fer expansion takes the form of a product of sub-propagators, it enables us to appreciate effects of time-evolution under Hamiltonians with different orders separately. While 0th-order average Hamiltonian is the same for the three expansion schemes with the three cases examined, there is a case that the 2nd-order term for the Magnus/Floquet expansion is different from that obtained with the Fer expansion. The difference arises due to the separation of the 0th-order term in the Fer expansion. The separation enables us to appreciate time-evolution under the 0th-order average Hamiltonian, however, for that purpose, we use a so-called left-running Fer expansion. Comparison between the left-running Fer expansion and the Magnus expansion indicates that the sign of the odd orders in Magnus may better be reversed if one would like to consider its effect in order.

  3. 75 FR 64642 - Indexed Annuities

    Science.gov (United States)

    2010-10-20

    ... 3235-AK16 Indexed Annuities AGENCY: Securities and Exchange Commission. ACTION: Final rule; withdrawal... under the Securities Act of 1933, which defines the terms ``annuity contract'' and ``optional annuity... under the Securities Act of 1933.\\1\\ Rule 151A defines the terms ``annuity contract'' and ``optional...

  4. East Asian winter monsoon forecasting schemes based on the NCEP's climate forecast system

    Science.gov (United States)

    Tian, Baoqiang; Fan, Ke; Yang, Hongqing

    2017-12-01

    The East Asian winter monsoon (EAWM) is the major climate system in the Northern Hemisphere during boreal winter. In this study, we developed two schemes to improve the forecasting skill of the interannual variability of the EAWM index (EAWMI) using the interannual increment prediction method, also known as the DY method. First, we found that version 2 of the NCEP's Climate Forecast System (CFSv2) showed higher skill in predicting the EAWMI in DY form than not. So, based on the advantage of the DY method, Scheme-I was obtained by adding the EAWMI DY predicted by CFSv2 to the observed EAWMI in the previous year. This scheme showed higher forecasting skill than CFSv2. Specifically, during 1983-2016, the temporal correlation coefficient between the Scheme-I-predicted and observed EAWMI was 0.47, exceeding the 99% significance level, with the root-mean-square error (RMSE) decreased by 12%. The autumn Arctic sea ice and North Pacific sea surface temperature (SST) are two important external forcing factors for the interannual variability of the EAWM. Therefore, a second (hybrid) prediction scheme, Scheme-II, was also developed. This scheme not only involved the EAWMI DY of CFSv2, but also the sea-ice concentration (SIC) observed the previous autumn in the Laptev and East Siberian seas and the temporal coefficients of the third mode of the North Pacific SST in DY form. We found that a negative SIC anomaly in the preceding autumn over the Laptev and the East Siberian seas could lead to a significant enhancement of the Aleutian low and East Asian westerly jet in the following winter. However, the intensity of the winter Siberian high was mainly affected by the third mode of the North Pacific autumn SST. Scheme-I and Scheme-II also showed higher predictive ability for the EAWMI in negative anomaly years compared to CFSv2. More importantly, the improvement in the prediction skill of the EAWMI by the new schemes, especially for Scheme-II, could enhance the forecasting skill of

  5. Indexation and causation of financial markets

    CERN Document Server

    Tanokura, Yoko

    2015-01-01

    This book presents a new statistical method of constructing a price index of a financial asset where the price distributions are skewed and heavy-tailed and investigates the effectiveness of the method. In order to fully reflect the movements of prices or returns on a financial asset, the index should reflect their distributions. However, they are often heavy-tailed and possibly skewed, and identifying them directly is not easy. This book first develops an index construction method depending on the price distributions, by using nonstationary time series analysis. Firstly, the long-term trend of the distributions of the optimal Box–Cox transformed prices is estimated by fitting a trend model with time-varying observation noises. By applying state space modeling, the estimation is performed and missing observations are automatically interpolated. Finally, the index is defined by taking the inverse Box–Cox transformation of the optimal long-term trend. This book applies the method to various financial data. ...

  6. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    KAUST Repository

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2011-01-01

    gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization

  7. Building fast well-balanced two-stage numerical schemes for a model of two-phase flows

    Science.gov (United States)

    Thanh, Mai Duc

    2014-06-01

    We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.

  8. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  9. The development and evaluation of a community attachment scheme for first-year medical students.

    Science.gov (United States)

    Hannay, David; Mitchell, Caroline; Chung, Man Cheung

    2003-03-01

    This paper describes the development over 14 years of a Community Attachment Scheme for First Year Medical Students in Sheffield, together with feedback from tutors and students. The scheme involves pairs of students visiting families expecting a baby or experiencing an illness. The families are identified by general practitioners who act as tutors together with a behavioural scientist for groups of eight to 10 students. The scheme provides first-year students with practical experience of sociology and psychology in terms of family dynamics and illness behaviour. Assessment is part of the degree examination, and involves a written assignment on the family, together with tutors' assessments. The development of the attachment scheme took place in three phases, which are described together with feedback from tutors and students, as well as changes in methods of assessment. The basis of the Community Attachment Scheme has been self-directed problem-based learning in small groups with continuous assessment, and these principles have now extended to the rest of the medical curriculum in Sheffield, of which the Community Attachment Scheme is an integral part.

  10. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-09-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  11. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Tourki, Kamel; Ghrayeb, Ali A.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2012-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  12. Application of hexagonal element scheme in finite element method to three-dimensional diffusion problem of fast reactors

    International Nuclear Information System (INIS)

    Ishiguro, Misako; Higuchi, Kenji

    1983-01-01

    The finite element method is applied in Galerkin-type approximation to three-dimensional neutron diffusion equations of fast reactors. A hexagonal element scheme is adopted for treating the hexagonal lattice which is typical for fast reactors. The validity of the scheme is verified by applying the scheme as well as alternative schemes to the neutron diffusion calculation of a gas-cooled fast reactor of actual scale. The computed results are compared with corresponding values obtained using the currently applied triangular-element and also with conventional finite difference schemes. The hexagonal finite element scheme is found to yield a reasonable solution to the problem taken up here, with some merit in terms of saving in computing time, but the resulting multiplication factor differs by 1% and the flux by 9% compared with the triangular mesh finite difference scheme. The finite element method, even in triangular element scheme, would appear to incur error in inadmissible amount and which could not be easily eliminated by refining the nodes. (author)

  13. The effect of a dynamic background albedo scheme on Sahel/Sahara precipitation during the mid-Holocene

    Directory of Open Access Journals (Sweden)

    F. S. E. Vamborg

    2011-02-01

    Full Text Available We have implemented a new albedo scheme that takes the dynamic behaviour of the surface below the canopy into account, into the land-surface scheme of the MPI-ESM. The standard (static scheme calculates the seasonal canopy albedo as a function of leaf area index, whereas the background albedo is a gridbox constant derived from satellite measurements. The new (dynamic scheme additionally models the background albedo as a slowly changing function of organic matter in the ground and of litter and standing dead biomass covering the ground. We use the two schemes to investigate the interactions between vegetation, albedo and precipitation in the Sahel/Sahara for two time-slices: pre-industrial and mid-Holocene. The dynamic scheme represents the seasonal cycle of albedo and the correspondence between annual mean albedo and vegetation cover in a more consistent way than the static scheme. It thus gives a better estimate of albedo change between the two time periods. With the introduction of the dynamic scheme, precipitation is increased by 30 mm yr−1 for the pre-industrial simulation and by about 80 mm yr−1 for the mid-Holocene simulation. The present-day dry bias in the Sahel of standard ECHAM5 is thus reduced and the sensitivity of precipitation to mid-Holocene external forcing is increased by around one third. The locations of mid-Holocene lakes, as estimated from reconstructions, lie south of the modelled desert border in both mid-Holocene simulations. The magnitude of simulated rainfall in this area is too low to fully sustain lakes, however it is captured better with the dynamic scheme. The dynamic scheme leads to increased vegetation variability in the remaining desert region, indicating a higher frequency of green spells, thus reaching a better agreement with the vegetation distribution as derived from pollen records.

  14. A comparison between national scheme for the acoustic classification of dwellings in Europe and in the U.S

    DEFF Research Database (Denmark)

    Berardi, Umberto; Rasmussen, Birgit

    2015-01-01

    , focusing on sound insulation performance, national schemes for sound classification of dwellings have been developed in several European countries. These schemes define acoustic classes according to different levels of sound insulation. Due to the lack of coordination among countries, a significant...... scheme may facilitate exchanging experiences about constructions fulfilling different classes, reducing trade barriers, and finally increasing the sound insulation of dwellings....... diversity in terms of descriptors, number of classes, and class intervals occurred between national schemes. However, a proposal ”acoustic classification scheme for dwellings” has been developed recently in the European COST Action TU0901 with 32 member countries. This proposal has been accepted as an ISO...

  15. Multiple-Input Multiple-Output OFDM with Index Modulation

    OpenAIRE

    Basar, Ertugrul

    2015-01-01

    Orthogonal frequency division multiplexing with index modulation (OFDM-IM) is a novel multicarrier transmission technique which has been proposed as an alternative to classical OFDM. The main idea of OFDM-IM is the use of the indices of the active subcarriers in an OFDM system as an additional source of information. In this work, we propose multiple-input multiple-output OFDM-IM (MIMO-OFDM-IM) scheme by combining OFDM-IM and MIMO transmission techniques. The low complexity transceiver structu...

  16. Linking payment to health outcomes: a taxonomy and examination of performance-based reimbursement schemes between healthcare payers and manufacturers.

    Science.gov (United States)

    Carlson, Josh J; Sullivan, Sean D; Garrison, Louis P; Neumann, Peter J; Veenstra, David L

    2010-08-01

    To identify, categorize and examine performance-based health outcomes reimbursement schemes for medical technology. We performed a review of performance-based health outcomes reimbursement schemes over the past 10 years (7/98-010/09) using publicly available databases, web and grey literature searches, and input from healthcare reimbursement experts. We developed a taxonomy of scheme types by inductively organizing the schemes identified according to the timing, execution, and health outcomes measured in the schemes. Our search yielded 34 coverage with evidence development schemes, 10 conditional treatment continuation schemes, and 14 performance-linked reimbursement schemes. The majority of schemes are in Europe and Australia, with an increasing number in Canada and the U.S. These schemes have the potential to alter the reimbursement and pricing landscape for medical technology, but significant challenges, including high transaction costs and insufficient information systems, may limit their long-term impact. Future studies regarding experiences and outcomes of implemented schemes are necessary. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  17. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  18. A comparison study of convective and microphysical parameterization schemes associated with lightning occurrence in southeastern Brazil using the WRF model

    Science.gov (United States)

    Zepka, G. D.; Pinto, O.

    2010-12-01

    The intent of this study is to identify the combination of convective and microphysical WRF parameterizations that better adjusts to lightning occurrence over southeastern Brazil. Twelve thunderstorm days were simulated with WRF model using three different convective parameterizations (Kain-Fritsch, Betts-Miller-Janjic and Grell-Devenyi ensemble) and two different microphysical schemes (Purdue-Lin and WSM6). In order to test the combinations of parameterizations at the same time of lightning occurrence, a comparison was made between the WRF grid point values of surface-based Convective Available Potential Energy (CAPE), Lifted Index (LI), K-Index (KI) and equivalent potential temperature (theta-e), and the lightning locations nearby those grid points. Histograms were built up to show the ratio of the occurrence of different values of these variables for WRF grid points associated with lightning to all WRF grid points. The first conclusion from this analysis was that the choice of microphysics did not change appreciably the results as much as different convective schemes. The Betts-Miller-Janjic parameterization has generally worst skill to relate higher magnitudes for all four variables to lightning occurrence. The differences between the Kain-Fritsch and Grell-Devenyi ensemble schemes were not large. This fact can be attributed to the similar main assumptions used by these schemes that consider entrainment/detrainment processes along the cloud boundaries. After that, we examined three case studies using the combinations of convective and microphysical options without the Betts-Miller-Janjic scheme. Differently from the traditional verification procedures, fields of surface-based CAPE from WRF 10 km domain were compared to the Eta model, satellite images and lightning data. In general the more reliable convective scheme was Kain-Fritsch since it provided more consistent distribution of the CAPE fields with respect to satellite images and lightning data.

  19. Optimized helper data scheme for biometric verification under zero leakage constraint

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2012-01-01

    In biometric verication, special measures are needed to prevent that a dishon- est verier can steal privacy-sensitive information about the prover from the template database. We introduce an improved version of the zero leakage quan- tization scheme, which optimizes detection performance in terms of

  20. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  1. On Richardson extrapolation for low-dissipation low-dispersion diagonally implicit Runge-Kutta schemes

    Science.gov (United States)

    Havasi, Ágnes; Kazemi, Ehsan

    2018-04-01

    In the modeling of wave propagation phenomena it is necessary to use time integration methods which are not only sufficiently accurate, but also properly describe the amplitude and phase of the propagating waves. It is not clear if amending the developed schemes by extrapolation methods to obtain a high order of accuracy preserves the qualitative properties of these schemes in the perspective of dissipation, dispersion and stability analysis. It is illustrated that the combination of various optimized schemes with Richardson extrapolation is not optimal for minimal dissipation and dispersion errors. Optimized third-order and fourth-order methods are obtained, and it is shown that the proposed methods combined with Richardson extrapolation result in fourth and fifth orders of accuracy correspondingly, while preserving optimality and stability. The numerical applications include the linear wave equation, a stiff system of reaction-diffusion equations and the nonlinear Euler equations with oscillatory initial conditions. It is demonstrated that the extrapolated third-order scheme outperforms the recently developed fourth-order diagonally implicit Runge-Kutta scheme in terms of accuracy and stability.

  2. A new index of risks for lethal diseases by ionizing radiation

    International Nuclear Information System (INIS)

    Sato, Fumiaki; Higuti, Isao.

    1979-01-01

    Estimates of the somatic risk of radiation exposure have mainly been based on the incidence of fatal cancers. An improvement on the estimates of the risk will be made by taking mean ages at deaths into consideration in addition to the incidence of cancer. The authors report on an index of contribution of each cause of death to life shortening. The index is the sum of three terms. The first term indicates a contribution of change in incidence and the second term indicates that of changes in mean age at death from the cause of death in question. The last term is an interaction term of the two factors mentioned above. If a radiation exposure increases incidence of a cause of death and shortens the mean age at death from the cause of death, the index gives a large positive value. On the other hand, an increase in incidence of a late occurring cause of death will bring about a small positive or sometimes negative value for the index. The index proposed here will be promising in estimating risks by ionizing radiation. (author)

  3. Peripheral perfusion index-reference range in healthy Portuguese term newborns

    Directory of Open Access Journals (Sweden)

    Joana Jardim

    2014-01-01

    Full Text Available Introduction: Peripheral perfusion index (PPI is a non-invasive numerical value of peripheral perfusion derived from a pulse oximeter signal. It has been suggested that PPI may be a valuable adjunct diagnostic tool to detect early clinically significant hemodynamic embarrassment. The aim of this paper was to determine normal PPI in healthy newborns, in order to establish cut-off values that can be use in different pathologic settings. Material and Methods: Prospective observational study performed with term newborns, born in a tertiary level care hospital between January 1st to December 31st 2012. Demographic data such as gender, gestational age, birth weight and Apgar score were collected. PPI, heart rate (HR and arterial blood oxygen saturation (SpO2 were evaluated simultaneous on the right hand (preductal and on the left foot (postductal of the newborn, before discharge from the hospital. Results: 2,032 newborns, 52% male, with a mean birth weight of 3,237 ± 432 g and median gestational age of 39 weeks, were evaluated. PPI values obtained were: preductal median of 1.6 with interquartile range of 1.2-2.3, postductal median of 1.4 with interquartile range of 1-2 (p < 0.001. Conclusions: PPI is an easily applicable non invasive method to monitor peripheral perfusion changes. We established normal PPI values in healthy Portuguese newborns. PPI was higher on the upper limb (preductal when compared to the lower limb (postductal.This finding has important implications, in the time of choosing a single probe placement, and in the interpretation of the results.

  4. Stakeholders Perspectives on the Success Drivers in Ghana's National Health Insurance Scheme - Identifying Policy Translation Issues.

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2016-10-01

    Ghana's National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Based on an empirical qualitative case study of stakeholders' views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. In the study, interviewees referred to both 'hard and soft' elements as driving the "success" of the Ghana scheme. The main 'hard elements' include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The 'soft' elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years, amounting to a process best conceived as germination as opposed

  5. A continuous and prognostic convection scheme based on buoyancy, PCMT

    Science.gov (United States)

    Guérémy, Jean-François; Piriou, Jean-Marcel

    2016-04-01

    A new and consistent convection scheme (PCMT: Prognostic Condensates Microphysics and Transport), providing a continuous and prognostic treatment of this atmospheric process, is described. The main concept ensuring the consistency of the whole system is the buoyancy, key element of any vertical motion. The buoyancy constitutes the forcing term of the convective vertical velocity, which is then used to define the triggering condition, the mass flux, and the rates of entrainment-detrainment. The buoyancy is also used in its vertically integrated form (CAPE) to determine the closure condition. The continuous treatment of convection, from dry thermals to deep precipitating convection, is achieved with the help of a continuous formulation of the entrainment-detrainment rates (depending on the convective vertical velocity) and of the CAPE relaxation time (depending on the convective over-turning time). The convective tendencies are directly expressed in terms of condensation and transport. Finally, the convective vertical velocity and condensates are fully prognostic, the latter being treated using the same microphysics scheme as for the resolved condensates but considering the convective environment. A Single Column Model (SCM) validation of this scheme is shown, allowing detailed comparisons with observed and explicitly simulated data. Four cases covering the convective spectrum are considered: over ocean, sensitivity to environmental moisture (S. Derbyshire) non precipitating shallow convection to deep precipitating convection, trade wind shallow convection (BOMEX) and strato-cumulus (FIRE), together with an entire continental diurnal cycle of convection (ARM). The emphasis is put on the characteristics of the scheme which enable a continuous treatment of convection. Then, a 3D LAM validation is presented considering an AMMA case with both observations and a CRM simulation using the same initial and lateral conditions as for the parameterized one. Finally, global

  6. Asymptotic diffusion limit of cell temperature discretisation schemes for thermal radiation transport

    Energy Technology Data Exchange (ETDEWEB)

    Smedley-Stevenson, Richard P., E-mail: richard.smedley-stevenson@awe.co.uk [AWE PLC, Aldermaston, Reading, Berkshire, RG7 4PR (United Kingdom); Department of Earth Science and Engineering, Imperial College London, SW7 2AZ (United Kingdom); McClarren, Ryan G., E-mail: rmcclarren@ne.tamu.edu [Department of Nuclear Engineering, Texas A & M University, College Station, TX 77843-3133 (United States)

    2015-04-01

    This paper attempts to unify the asymptotic diffusion limit analysis of thermal radiation transport schemes, for a linear-discontinuous representation of the material temperature reconstructed from cell centred temperature unknowns, in a process known as ‘source tilting’. The asymptotic limits of both Monte Carlo (continuous in space) and deterministic approaches (based on linear-discontinuous finite elements) for solving the transport equation are investigated in slab geometry. The resulting discrete diffusion equations are found to have nonphysical terms that are proportional to any cell-edge discontinuity in the temperature representation. Based on this analysis it is possible to design accurate schemes for representing the material temperature, for coupling thermal radiation transport codes to a cell centred representation of internal energy favoured by ALE (arbitrary Lagrange–Eulerian) hydrodynamics schemes.

  7. Asymptotic diffusion limit of cell temperature discretisation schemes for thermal radiation transport

    International Nuclear Information System (INIS)

    Smedley-Stevenson, Richard P.; McClarren, Ryan G.

    2015-01-01

    This paper attempts to unify the asymptotic diffusion limit analysis of thermal radiation transport schemes, for a linear-discontinuous representation of the material temperature reconstructed from cell centred temperature unknowns, in a process known as ‘source tilting’. The asymptotic limits of both Monte Carlo (continuous in space) and deterministic approaches (based on linear-discontinuous finite elements) for solving the transport equation are investigated in slab geometry. The resulting discrete diffusion equations are found to have nonphysical terms that are proportional to any cell-edge discontinuity in the temperature representation. Based on this analysis it is possible to design accurate schemes for representing the material temperature, for coupling thermal radiation transport codes to a cell centred representation of internal energy favoured by ALE (arbitrary Lagrange–Eulerian) hydrodynamics schemes

  8. Valuation of index-linked cash flows in a Heath-Jarrow-Morton framework

    OpenAIRE

    Alm, Jonas; Lindskog, Filip

    2015-01-01

    In this paper, we study the valuation of stochastic cash flows that exhibit dependence on interest rates. We focus on insurance liability cash flows linked to an index, such as a consumer price index or wage index, where changes in the index value can be partially understood in terms of changes in the term structure of interest rates. Insurance liability cash flows that are not explicitly linked to an index may still be valued in our framework by interpreting index returns as so-called claims...

  9. An autostratigraphic view of the long-term dynamics of delta distributary channels: A new step forward with the grade index model

    Science.gov (United States)

    Naruse, H.; Muto, T.

    2017-12-01

    Autostratigraphy is the stratigraphy that is generated by large-scale, deterministic autogenic processes of depositional systems, based on the full recognition of non-equilibrium behavior in response to steady external forcing. Recent experimental studies to explore the effects of basin water depth on the dynamics of distributary channels have brought a new geometrical scheme, here referred to as the grade index model, which is expected to make a significant step forward for development of the autostratigraphy of river deltas. Grade index (0 ≤ Gindex ≤1) is a dimensionless number that describes how close the alluvial river is to a graded state and is given as the ratio of subaerial allocation of the supplied sediment to both subaerial and subaqueous allocation of the sediment, in the form of a function of dimensionless basin water depth (h*). The grade index model for a particular geometrical setting suggests that as h* increase toward +∞, all of dimensionless magnitudes of delta progradation rate (Rpro*), alluvial aggradation rate (Ragg*), channel migration rate (Rmig*), avulsion frequency decrease toward 0, and all of dimensionless timescales of channel shifting (τs*), recurrence of channels (τr*), channel avulsion (τA*) increase toward +∞, and also that Rpro* = Ragg* = Rmig* = fA* = (τs*)-1 = (τr*)-1 = (τA* )-1 = Gindex. This grade index model, despite its simple structure, offers deep insight into the rationale of shoreline autoretreat, a typical large-scale, deterministic autogenic process that is realized by non-equilibrium response to steady base level rise. A simple geometrical modeling leads to a finding that Ppro* = (1 - Ab*) Gindex, where Ab* is a dimensionless form of the bottom surface of the deltaic deposit (Ab) given by dividing Ab with the square of autostratigraphic length scale (Λ). As the delta grows with base level rise, Ab progressively increases and then inevitably meets an event that Ab* exceeds 1 (i.e. Ab exceeds Λ2). We also

  10. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  11. Adaptive nonseparable vector lifting scheme for digital holographic data compression.

    Science.gov (United States)

    Xing, Yafei; Kaaniche, Mounir; Pesquet-Popescu, Béatrice; Dufaux, Frédéric

    2015-01-01

    Holographic data play a crucial role in recent three-dimensional imaging as well as microscopic applications. As a result, huge amounts of storage capacity will be involved for this kind of data. Therefore, it becomes necessary to develop efficient hologram compression schemes for storage and transmission purposes. In this paper, we focus on the shifted distance information, obtained by the phase-shifting algorithm, where two sets of difference data need to be encoded. More precisely, a nonseparable vector lifting scheme is investigated in order to exploit the two-dimensional characteristics of the holographic contents. Simulations performed on different digital holograms have shown the effectiveness of the proposed method in terms of bitrate saving and quality of object reconstruction.

  12. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  13. A modified non-binary LDPC scheme based on watermark symbols in high speed optical transmission systems

    Science.gov (United States)

    Wang, Liming; Qiao, Yaojun; Yu, Qian; Zhang, Wenbo

    2016-04-01

    We introduce a watermark non-binary low-density parity check code (NB-LDPC) scheme, which can estimate the time-varying noise variance by using prior information of watermark symbols, to improve the performance of NB-LDPC codes. And compared with the prior-art counterpart, the watermark scheme can bring about 0.25 dB improvement in net coding gain (NCG) at bit error rate (BER) of 1e-6 and 36.8-81% reduction of the iteration numbers. Obviously, the proposed scheme shows great potential in terms of error correction performance and decoding efficiency.

  14. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  15. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  16. The design of renewable support schemes and CO_2 emissions in China

    International Nuclear Information System (INIS)

    Wu, Jie; Albrecht, Johan; Fan, Ying; Xia, Yan

    2016-01-01

    The renewable energy targets put forward by the Chinese government need comprehensive incentive schemes. This paper uses a multi-regional CGE model to evaluate two types of renewable support schemes; a subsidy scheme like a feed-in tariff (FIT) with a direct price impact for final consumers and a subsidy scheme without any price impact. We assess the CO_2 consequences of both approaches, as well as their impact on economic activity in terms of GDP, industrial structure, electricity generation structure, and regional final demand elasticities of electricity. We find that a support scheme with price impact is much more effective in reducing CO_2 emissions while the difference in GDP between the two policies is small. We estimate that the price implications of the support scheme allow for an additional emissions reduction of 113 Mt CO_2—or 0.07% of total emissions—in China during 2020–2035. The support scheme with a price impact does not lead to a negative impact on the Chinese economy although there are significant differences among regions. In addition, while the whole country faces an approximately unitary electricity elasticity demand, we find significant differences in electricity demand elasticities among Chinese regions. - Highlights: • Two types of FIT policies—with and without a price impact—are evaluated. • We assess the CO_2 emissions of both schemes and their impact on economic activity. • A support scheme with price impact is more effective in reducing CO_2 emissions. • The price impact allows for an additional reduction of 113 Mt CO_2 in China during 2020–2035. • Both of the FIT types have a very similar impact on coal consumption.

  17. Computational electrodynamics in material media with constraint-preservation, multidimensional Riemann solvers and sub-cell resolution - Part II, higher order FVTD schemes

    Science.gov (United States)

    Balsara, Dinshaw S.; Garain, Sudip; Taflove, Allen; Montecinos, Gino

    2018-02-01

    The Finite Difference Time Domain (FDTD) scheme has served the computational electrodynamics community very well and part of its success stems from its ability to satisfy the constraints in Maxwell's equations. Even so, in the previous paper of this series we were able to present a second order accurate Godunov scheme for computational electrodynamics (CED) which satisfied all the same constraints and simultaneously retained all the traditional advantages of Godunov schemes. In this paper we extend the Finite Volume Time Domain (FVTD) schemes for CED in material media to better than second order of accuracy. From the FDTD method, we retain a somewhat modified staggering strategy of primal variables which enables a very beneficial constraint-preservation for the electric displacement and magnetic induction vector fields. This is accomplished with constraint-preserving reconstruction methods which are extended in this paper to third and fourth orders of accuracy. The idea of one-dimensional upwinding from Godunov schemes has to be significantly modified to use the multidimensionally upwinded Riemann solvers developed by the first author. In this paper, we show how they can be used within the context of a higher order scheme for CED. We also report on advances in timestepping. We show how Runge-Kutta IMEX schemes can be adapted to CED even in the presence of stiff source terms brought on by large conductivities as well as strong spatial variations in permittivity and permeability. We also formulate very efficient ADER timestepping strategies to endow our method with sub-cell resolving capabilities. As a result, our method can be stiffly-stable and resolve significant sub-cell variation in the material properties within a zone. Moreover, we present ADER schemes that are applicable to all hyperbolic PDEs with stiff source terms and at all orders of accuracy. Our new ADER formulation offers a treatment of stiff source terms that is much more efficient than previous ADER

  18. Inflation and the Indexation of Personal Income Taxes in Theory and Practice

    Directory of Open Access Journals (Sweden)

    Vito Tanzi

    1976-09-01

    Full Text Available The impact of inflation on taxpayers’ liabilities can be measured in at least two different and often contrasting ways. On the one hand, it can be measured by the percentage increases in the average tax rates. On the other hand, it can be measured by the percentage points, that is the absolute increases in those rates. Although the former has attracted more attention, it is the latter that is more significant in regards to the effects on disposable incomes and after-tax income distribution. Much of the controversy regarding indexation has revolved around the issue of stabilization. Some have argued that indexation poses real dangers to stability while others have pointed to its positive potential. The author looks at analytical adjustment schemes and analyses practical applications of indexation, arguing that the case for or against indexation of the personal income tax cannot be made in abstract as the consequences of indexing differ among countries.

  19. Exponentiation of the Drell-Yan an cross section near partonic threshold in the DIS and MS-bar schemes

    International Nuclear Information System (INIS)

    Eynck, Tim Oliver; Laenen, Eric; Magnea, Lorenzo

    2003-01-01

    It has been observed that in the DIS scheme the refactorization of the Drell-Yan cross section leading to exponentiation of threshold logarithms can also be used to organize a class of constant terms, most of which arise from the ratio of the timelike Sudakov form factor to its spacelike counterpart. We extend this exponentiation to include all constant terms, and demonstrate how a similar organization may be achieved in the MS-bar scheme. We study the relevance of these exponentiations in a two-loop analysis. (author)

  20. The pulsatility index and the resistive index in renal arteries. Associations with long-term progression in chronic renal failure

    DEFF Research Database (Denmark)

    Petersen, L J; Petersen, J R; Talleruphuus, U

    1997-01-01

    The pulsatility index (PI) and the resistive index (RI) are used as pulsed-wave Doppler measurements of downstream renal artery resistance. PI and RI have been found to correlate with renal vascular resistance, filtration fraction and effective renal plasma flow in chronic renal failure. The aim...... of the present study was to evaluate the potential relationship between these indices and the rate of decline in renal function, as reflected by changes in different parameters of renal function in patients with chronic renal failure....

  1. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  2. Low-storage implicit/explicit Runge-Kutta schemes for the simulation of stiff high-dimensional ODE systems

    Science.gov (United States)

    Cavaglieri, Daniele; Bewley, Thomas

    2015-04-01

    Implicit/explicit (IMEX) Runge-Kutta (RK) schemes are effective for time-marching ODE systems with both stiff and nonstiff terms on the RHS; such schemes implement an (often A-stable or better) implicit RK scheme for the stiff part of the ODE, which is often linear, and, simultaneously, a (more convenient) explicit RK scheme for the nonstiff part of the ODE, which is often nonlinear. Low-storage RK schemes are especially effective for time-marching high-dimensional ODE discretizations of PDE systems on modern (cache-based) computational hardware, in which memory management is often the most significant computational bottleneck. In this paper, we develop and characterize eight new low-storage implicit/explicit RK schemes which have higher accuracy and better stability properties than the only low-storage implicit/explicit RK scheme available previously, the venerable second-order Crank-Nicolson/Runge-Kutta-Wray (CN/RKW3) algorithm that has dominated the DNS/LES literature for the last 25 years, while requiring similar storage (two, three, or four registers of length N) and comparable floating-point operations per timestep.

  3. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  4. On the feedback error compensation for adaptive modulation and coding scheme

    KAUST Repository

    Choi, Seyeong

    2011-11-25

    In this paper, we consider the effect of feedback error on the performance of the joint adaptive modulation and diversity combining (AMDC) scheme which was previously studied with an assumption of perfect feedback channels. We quantify the performance of two joint AMDC schemes in the presence of feedback error, in terms of the average spectral efficiency, the average number of combined paths, and the average bit error rate. The benefit of feedback error compensation with adaptive combining is also quantified. Selected numerical examples are presented and discussed to illustrate the effectiveness of the proposed feedback error compensation strategy with adaptive combining. Copyright (c) 2011 John Wiley & Sons, Ltd.

  5. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  6. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  7. An efficient numerical progressive diagonalization scheme for the quantum Rabi model revisited

    International Nuclear Information System (INIS)

    Pan, Feng; Bao, Lina; Dai, Lianrong; Draayer, Jerry P

    2017-01-01

    An efficient numerical progressive diagonalization scheme for the quantum Rabi model is revisited. The advantage of the scheme lies in the fact that the quantum Rabi model can be solved almost exactly by using the scheme that only involves a finite set of one variable polynomial equations. The scheme is especially efficient for a specified eigenstate of the model, for example, the ground state. Some low-lying level energies of the model for several sets of parameters are calculated, of which one set of the results is compared to that obtained from the Braak’s exact solution proposed recently. It is shown that the derivative of the entanglement measure defined in terms of the reduced von Neumann entropy with respect to the coupling parameter does reach the maximum near the critical point deduced from the classical limit of the Dicke model, which may provide a probe of the critical point of the crossover in finite quantum many-body systems, such as that in the quantum Rabi model. (paper)

  8. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Salim, Shelly; Moh, Sangman

    2016-06-30

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  9. Investigation into Text Classification With Kernel Based Schemes

    Science.gov (United States)

    2010-03-01

    Document Matrix TDMs Term-Document Matrices TMG Text to Matrix Generator TN True Negative TP True Positive VSM Vector Space Model xxii THIS PAGE...are represented as a term-document matrix, common evaluation metrics, and the software package Text to Matrix Generator ( TMG ). The classifier...AND METRICS This chapter introduces the indexing capabilities of the Text to Matrix Generator ( TMG ) Toolbox. Specific attention is placed on the

  10. Comparison of actinides and fission products recycling scheme with the normal plutonium recycling scheme in fast reactors

    Directory of Open Access Journals (Sweden)

    Salahuddin Asif

    2013-01-01

    Full Text Available Multiple recycling of actinides and non-volatile fission products in fast reactors through the dry re-fabrication/reprocessing atomics international reduction oxidation process has been studied as a possible way to reduce the long-term potential hazard of nuclear waste compared to that resulting from reprocessing in a wet PUREX process. Calculations have been made to compare the actinides and fission products recycling scheme with the normal plutonium recycling scheme in a fast reactor. For this purpose, the Karlsruhe version of isotope generation and depletion code, KORIGEN, has been modified accordingly. An entirely novel fission product yields library for fast reactors has been created which has replaced the old KORIGEN fission products library. For the purposes of this study, the standard 26 groups data set, KFKINR, developed at Forschungszentrum Karlsruhe, Germany, has been extended by the addition of the cross-sections of 13 important actinides and 68 most important fission products. It has been confirmed that these 68 fission products constitute about 95% of the total fission products yield and about 99.5% of the total absorption due to fission products in fast reactors. The amount of fissile material required to guarantee the criticality of the reactor during recycling schemes has also been investigated. Cumulative high active waste per ton of initial heavy metal is also calculated. Results show that the recycling of actinides and fission products in fast reactors through the atomics international reduction oxidation process results in a reduction of the potential hazard of radioactive waste.

  11. Indexation of Consumer and Mortgage Credit in Iceland in 2014: A Critical Battle between Legality, Fairness and Legitimacy

    Directory of Open Access Journals (Sweden)

    Maria Elvira Mendez Pinedo

    2014-11-01

    Full Text Available Six years after the financial crisis that led to the collapse of the banking system in 2008, the over-indebtedness of households is one of the most important problems in Iceland. This study aims to cast light on a specific feature of the Icelandic credit system in connection with the problem of over-indebtedness. The main research question is whether the end of indexation of credit is close or not. The author argues, in the first place, that indexation of credit ex-post to the consumer price index (CPI in negative amortization schemes is responsible for over-indebtedness. In the second place, the author describes the challenges ahead in the field of consumer and mortgage credit in Iceland in the light of European law (European Union EU and European Economic Area EEA. The incorporation of Directive 2008/48 on credit agreement for consumers to the Icelandic domestic order through the EEA Agreement allowed a preliminary legal review of the practice in light of EU/EEA consumer credit law, both at national and European level without a final conclusion. It has nevertheless led to the judicial review on the legality of some indexation alleged malpractices before national courts and to the EFTA Court for interpretation (mostly on Directives 93/13/EEC on unfair terms 87/102/EEC on consumer credit. A ruling from the Supreme Court is expected on several cases. A critical battle between the legality, the fairness and the legitimacy of indexation of credit is taking place in Iceland under the influence of European law.

  12. Correlation Between Dermatology Life Quality Index and Psoriasis Area and Severity Index in Patients with Psoriasis Treated with Ustekinumab

    DEFF Research Database (Denmark)

    Hesselvig, Jeanette Halskou; Egeberg, Alexander; Loft, Nikolai Dyrberg

    2018-01-01

    Monitoring of biological treatment efficacy for psoriasis is based on clinical evaluation and patient's quality of life. However, long-term correlation between Psoriasis Area and Severity Index (PASI) and Dermatology Life Quality Index (DLQI) in real life has not been studied in patients treated...

  13. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  14. Comments on derivation of an index for evaluating economics of cogeneration systems and its applications

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, R [Indian Inst. of Tech., Bombay (India). Dept. of Mechanical Engineering

    1990-04-01

    Industrial cogeneration systems usually must satisfy a power load and heat loads at different temperatures. The limitations of the economic index proposed by Pak and Suzuki for such cogeneration systems is discussed in this paper. The importance of a rational exergetic basis for evaluation of different grades of energy is emphasised. Thermodynamic criteria, e.g. the exergetic efficiency, relative fuel savings and fuel chargeable to power, are shown to provide useful information regarding cogeneration options. Any assessment scheme for cogeneration schemes must incorporate thermodynamic criteria in addition to economic criteria. (author).

  15. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  16. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  17. Zero refractive index in time-Floquet acoustic metamaterials

    Science.gov (United States)

    Koutserimpas, Theodoros T.; Fleury, Romain

    2018-03-01

    New scientific investigations of artificially structured materials and experiments have exhibited wave manipulation to the extreme. In particular, zero refractive index metamaterials have been on the front line of wave physics research for their unique wave manipulation properties and application potentials. Remarkably, in such exotic materials, time-harmonic fields have an infinite wavelength and do not exhibit any spatial variations in their phase distribution. This unique feature can be achieved by forcing a Dirac cone to the center of the Brillouin zone ( Γ point), as previously predicted and experimentally demonstrated in time-invariant metamaterials by means of accidental degeneracy between three different modes. In this article, we propose a different approach that enables true conical dispersion at Γ with twofold degeneracy and generates zero index properties. We break time-reversal symmetry and exploit a time-Floquet modulation scheme to demonstrate a time-Floquet acoustic metamaterial with zero refractive index. This behavior, predicted using stroboscopic analysis, is confirmed by full-wave finite element simulations. Our results establish the relevance of time-Floquet metamaterials as a novel reconfigurable platform for wave control.

  18. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

    Directory of Open Access Journals (Sweden)

    Qingqing Xie

    2016-11-01

    Full Text Available With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP can provide location-based service (LBS for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman algorithm and ciphertext policy attribute-based encryption (CP-ABE scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA and efficient enough for practical applications in terms of user side computation overhead.

  19. Adaptive multi-objective Optimization scheme for cognitive radio resource management

    KAUST Repository

    Alqerm, Ismail

    2014-12-01

    Cognitive Radio is an intelligent Software Defined Radio that is capable to alter its transmission parameters according to predefined objectives and wireless environment conditions. Cognitive engine is the actuator that performs radio parameters configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance. The optimization relies on adapting radio transmission parameters to environment conditions using constrained optimization modeling called fitness functions in an iterative manner. These functions include minimizing power consumption, Bit Error Rate, delay and interference. On the other hand, maximizing throughput and spectral efficiency. Cross-layer optimization is exploited to access environmental parameters from all TCP/IP stack layers. AMOS uses adaptive Genetic Algorithm in terms of its parameters and objective weights as the vehicle of optimization. The proposed scheme has demonstrated quick response and efficiency in three different scenarios compared to other schemes. In addition, it shows its capability to optimize the performance of TCP/IP layers as whole not only the physical layer.

  20. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  1. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  2. Three-dimensional Gravity Inversion with a New Gradient Scheme on Unstructured Grids

    Science.gov (United States)

    Sun, S.; Yin, C.; Gao, X.; Liu, Y.; Zhang, B.

    2017-12-01

    Stabilized gradient-based methods have been proved to be efficient for inverse problems. Based on these methods, setting gradient close to zero can effectively minimize the objective function. Thus the gradient of objective function determines the inversion results. By analyzing the cause of poor resolution on depth in gradient-based gravity inversion methods, we find that imposing depth weighting functional in conventional gradient can improve the depth resolution to some extent. However, the improvement is affected by the regularization parameter and the effect of the regularization term becomes smaller with increasing depth (shown as Figure 1 (a)). In this paper, we propose a new gradient scheme for gravity inversion by introducing a weighted model vector. The new gradient can improve the depth resolution more efficiently, which is independent of the regularization parameter, and the effect of regularization term will not be weakened when depth increases. Besides, fuzzy c-means clustering method and smooth operator are both used as regularization terms to yield an internal consecutive inverse model with sharp boundaries (Sun and Li, 2015). We have tested our new gradient scheme with unstructured grids on synthetic data to illustrate the effectiveness of the algorithm. Gravity forward modeling with unstructured grids is based on the algorithm proposed by Okbe (1979). We use a linear conjugate gradient inversion scheme to solve the inversion problem. The numerical experiments show a great improvement in depth resolution compared with regular gradient scheme, and the inverse model is compact at all depths (shown as Figure 1 (b)). AcknowledgeThis research is supported by Key Program of National Natural Science Foundation of China (41530320), China Natural Science Foundation for Young Scientists (41404093), and Key National Research Project of China (2016YFC0303100, 2017YFC0601900). ReferencesSun J, Li Y. 2015. Multidomain petrophysically constrained inversion and

  3. Intercomparison of Martian Lower Atmosphere Simulated Using Different Planetary Boundary Layer Parameterization Schemes

    Science.gov (United States)

    Natarajan, Murali; Fairlie, T. Duncan; Dwyer Cianciolo, Alicia; Smith, Michael D.

    2015-01-01

    We use the mesoscale modeling capability of Mars Weather Research and Forecasting (MarsWRF) model to study the sensitivity of the simulated Martian lower atmosphere to differences in the parameterization of the planetary boundary layer (PBL). Characterization of the Martian atmosphere and realistic representation of processes such as mixing of tracers like dust depend on how well the model reproduces the evolution of the PBL structure. MarsWRF is based on the NCAR WRF model and it retains some of the PBL schemes available in the earth version. Published studies have examined the performance of different PBL schemes in NCAR WRF with the help of observations. Currently such assessments are not feasible for Martian atmospheric models due to lack of observations. It is of interest though to study the sensitivity of the model to PBL parameterization. Typically, for standard Martian atmospheric simulations, we have used the Medium Range Forecast (MRF) PBL scheme, which considers a correction term to the vertical gradients to incorporate nonlocal effects. For this study, we have also used two other parameterizations, a non-local closure scheme called Yonsei University (YSU) PBL scheme and a turbulent kinetic energy closure scheme called Mellor- Yamada-Janjic (MYJ) PBL scheme. We will present intercomparisons of the near surface temperature profiles, boundary layer heights, and wind obtained from the different simulations. We plan to use available temperature observations from Mini TES instrument onboard the rovers Spirit and Opportunity in evaluating the model results.

  4. Soil quality under two different management schemes in coffee plantations of southern Colombia.

    Directory of Open Access Journals (Sweden)

    Oscar Eduardo Valbuena-Calderón

    2016-12-01

    Full Text Available The aim of this work was to develop an additive soil quality index (ASQI in agrofostery managements of coffee (Coffea arabica L.. The study took place under two intense and traditional management schemes, in nine farms (32 lots in the south of Colombia, during 2013. A separation of means analysis was held through the LSD Fisher test (P<0,05 to each of the physical and chemical variables of the soil. The variables that showed differences between the schemes were submitted to a main components analysis to select the minimum data set (MDS of the components that explained the most variability and the redundancy was veri ed within the indicators, based on the correlation. The ASQI was obtained from the total sum of soil quality index (SQI of all the indicators, taking into account that the higher the score of the ASQI, the higher the quality of the soil within the study system. The selected physical variables were the content of sand and clay; while the chemical variables were: organic carbon (OC, P, CA, Mg, total bases (TB and Ca/Mg. The best ASQI was obtained from traditional management, because the value of the selected variables matched in a bigger proportion with the quality objective identi ed for the ASQI quanti cation; in this case the crop yield, based on limit values for coffee plantations.

  5. FIR: An Effective Scheme for Extracting Useful Metadata from Social Media.

    Science.gov (United States)

    Chen, Long-Sheng; Lin, Zue-Cheng; Chang, Jing-Rong

    2015-11-01

    Recently, the use of social media for health information exchange is expanding among patients, physicians, and other health care professionals. In medical areas, social media allows non-experts to access, interpret, and generate medical information for their own care and the care of others. Researchers paid much attention on social media in medical educations, patient-pharmacist communications, adverse drug reactions detection, impacts of social media on medicine and healthcare, and so on. However, relatively few papers discuss how to extract useful knowledge from a huge amount of textual comments in social media effectively. Therefore, this study aims to propose a Fuzzy adaptive resonance theory network based Information Retrieval (FIR) scheme by combining Fuzzy adaptive resonance theory (ART) network, Latent Semantic Indexing (LSI), and association rules (AR) discovery to extract knowledge from social media. In our FIR scheme, Fuzzy ART network firstly has been employed to segment comments. Next, for each customer segment, we use LSI technique to retrieve important keywords. Then, in order to make the extracted keywords understandable, association rules mining is presented to organize these extracted keywords to build metadata. These extracted useful voices of customers will be transformed into design needs by using Quality Function Deployment (QFD) for further decision making. Unlike conventional information retrieval techniques which acquire too many keywords to get key points, our FIR scheme can extract understandable metadata from social media.

  6. The administration of long-term high-fat diet in ovariectomized wistar rat (Study on Daily Food Intake, Lee Index, Abdominal Fat Mass and Leptin Serum Levels

    Directory of Open Access Journals (Sweden)

    Dita Fitriani

    2016-12-01

    Conclusion: Serum leptin levels positively correlated with Lee index and abdominal fat mass, but negatively correlated with daily food intake. Administration of long-term high-fat diet in this study cannot induce leptin resistance.

  7. Analysis of expansion phase experiments with improved approximation schemes

    International Nuclear Information System (INIS)

    Foit, J.J.

    1987-05-01

    A steady-state flow of a single-phase and incompressible fluid across a singularity is studied. Based on these theoretical considerations new approximation methods for the pressure gradient term in the SIMMER-II momentum equations are proposed which give a satisfactory pressure change in flows across singularities. The expansion phase experiments with a dipplate performed by SRI-International are evaluated to examine the quality of the proposed approximation schemes. (orig.) [de

  8. A key heterogeneous structure of fractal networks based on inverse renormalization scheme

    Science.gov (United States)

    Bai, Yanan; Huang, Ning; Sun, Lina

    2018-06-01

    Self-similarity property of complex networks was found by the application of renormalization group theory. Based on this theory, network topologies can be classified into universality classes in the space of configurations. In return, through inverse renormalization scheme, a given primitive structure can grow into a pure fractal network, then adding different types of shortcuts, it exhibits different characteristics of complex networks. However, the effect of primitive structure on networks structural property has received less attention. In this paper, we introduce a degree variance index to measure the dispersion of nodes degree in the primitive structure, and investigate the effect of the primitive structure on network structural property quantified by network efficiency. Numerical simulations and theoretical analysis show a primitive structure is a key heterogeneous structure of generated networks based on inverse renormalization scheme, whether or not adding shortcuts, and the network efficiency is positively correlated with degree variance of the primitive structure.

  9. Quasi-SU(3) truncation scheme for even-even sd-shell nuclei

    International Nuclear Information System (INIS)

    Vargas, C.E.; Hirsch, J.G.; Draayer, J.P.

    2001-01-01

    The quasi-SU(3) symmetry was uncovered in full pf and sdg shell-model calculations for both even-even and odd-even nuclei. It manifests itself through a dominance of single-particle and quadrupole-quadrupole terms in a Hamiltonian used to describe well-deformed nuclei. A practical consequence of the quasi-SU(3) symmetry is an efficient basis truncation scheme. In [C.E. Vargas et al., Phys. Rev. C 58 (1998) 1488] it is shown that when this type of Hamiltonian is diagonalized in an SU(3) basis, only a few irreducible representations (irreps) of SU(3) are needed to describe the yrast band, the leading S=0 irrep augmented with the leading S=1 irreps in the proton and neutron subspaces. In the present article the quasi-SU(3) truncation scheme is used, in conjunction with a 'realistic but schematic' Hamiltonian that includes the most important multipole terms, to describe the energy spectra and B(E2) transition strengths of 20,22 Ne, 24 Mg and 28 Si. The effect of the size of the Hilbert space on both sets of observables is discussed, as well as the structure of the yrast band and the importance of the various terms in the Hamiltonian. The limitations of the model are explicitly discussed

  10. Which factors engage women in deprived neighbourhoods to participate in exercise referral schemes?

    Directory of Open Access Journals (Sweden)

    Nierkens Vera

    2008-10-01

    Full Text Available Abstract Background Exercise referral schemes (ERS have become a popular way of promoting physical activity. The aim of these schemes is to encourage high risk patients to exercise. In evaluating these schemes, little attention has been paid to lower socio-economic groups in a multi-ethnic urban setting. This study aimed to explore the socio-demographic and psychosocial characteristics of female participants in ERS located in deprived neighbourhoods. The second aim was to determine which elements of the intervention make it appealing to participate in the scheme. Methods A mixed method approach was utilized, combining a cross-sectional descriptive study and a qualitative component. In the quantitative part of the study, all female participants (n = 523 filled out a registration form containing questions about socio-demographic and psychosocial characteristics. Height and weight were also measured. In the qualitative part of the study, 38 of these 523 participants were interviewed. Results The majority of the participants had a migrant background, a low level of education, no paid job and a high body mass index. Although most participants were living sedentary lives, at intake they were quite motivated to start exercising. The ERS appealed to them because of its specific elements: facilitating role of the health professional, supportive environment, financial incentive, supervision and neighbourhood setting. Conclusion This study supports the idea that ERS interventions appeal to women from lower socio-economic groups, including ethnic minorities. The ERS seems to meet their contextual, economic and cultural needs. Since the elements that enabled the women to start exercising are specific to this ERS, we should become aware of whether this population continues to exercise after the end of the scheme.

  11. Efficient coding schemes with power allocation using space-time-frequency spreading

    Institute of Scientific and Technical Information of China (English)

    Jiang Haining; Luo Hanwen; Tian Jifeng; Song Wentao; Liu Xingzhao

    2006-01-01

    An efficient space-time-frequency (STF) coding strategy for multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems is presented for high bit rate data transmission over frequency selective fading channels. The proposed scheme is a new approach to space-time-frequency coded OFDM (COFDM) that combines OFDM with space-time coding, linear precoding and adaptive power allocation to provide higher quality of transmission in terms of the bit error rate performance and power efficiency. In addition to exploiting the maximum diversity gain in frequency, time and space, the proposed scheme enjoys high coding advantages and low-complexity decoding. The significant performance improvement of our design is confirmed by corroborating numerical simulations.

  12. An evaluation of approximations of acute hazard indices based on chronic hazard indices for California fossil-fuel power stations

    International Nuclear Information System (INIS)

    Gratt, L.B.; Levin, L.

    1998-01-01

    The measures for evaluating risk under the Clean Air Act Amendments of 1990 are yet to be defined. Many risk assessments have used only chronic risk measures (lifetime cancer probability and chronic hazard index) based on yearly averages of long-term dispersion of substances into ambient air. In California, many facilities prepared risk assessments using hourly meteorological data and short-term emission rates, allowing the calculation of an acute hazard index. These risk assessments are more costly and labor-intensive than those using the annualized meteorological data. A simple scheme to estimate the acute hazard index from the chronic index is proposed. This scheme is evaluated for four electric power stations in Southern California. The simple scheme was found lacking due to the inability to reasonably estimate both the hourly emission rates from annual averages and hourly concentrations from annual concentrations. The need for the acute risk measure for stack emission can be questioned based on the more detailed risk assessments performed in California

  13. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  14. A real-time Global Warming Index.

    Science.gov (United States)

    Haustein, K; Allen, M R; Forster, P M; Otto, F E L; Mitchell, D M; Matthews, H D; Frame, D J

    2017-11-13

    We propose a simple real-time index of global human-induced warming and assess its robustness to uncertainties in climate forcing and short-term climate fluctuations. This index provides improved scientific context for temperature stabilisation targets and has the potential to decrease the volatility of climate policy. We quantify uncertainties arising from temperature observations, climate radiative forcings, internal variability and the model response. Our index and the associated rate of human-induced warming is compatible with a range of other more sophisticated methods to estimate the human contribution to observed global temperature change.

  15. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  16. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shelly Salim

    2016-06-01

    Full Text Available A cognitive radio sensor network (CRSN is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  17. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  18. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  19. Non-hydrostatic semi-elastic hybrid-coordinate SISL extension of HIRLAM. Part I: numerical scheme

    Science.gov (United States)

    Rõõm, Rein; Männik, Aarne; Luhamaa, Andres

    2007-10-01

    Two-time-level, semi-implicit, semi-Lagrangian (SISL) scheme is applied to the non-hydrostatic pressure coordinate equations, constituting a modified Miller-Pearce-White model, in hybrid-coordinate framework. Neutral background is subtracted in the initial continuous dynamics, yielding modified equations for geopotential, temperature and logarithmic surface pressure fluctuation. Implicit Lagrangian marching formulae for single time-step are derived. A disclosure scheme is presented, which results in an uncoupled diagnostic system, consisting of 3-D Poisson equation for omega velocity and 2-D Helmholtz equation for logarithmic pressure fluctuation. The model is discretized to create a non-hydrostatic extension to numerical weather prediction model HIRLAM. The discretization schemes, trajectory computation algorithms and interpolation routines, as well as the physical parametrization package are maintained from parent hydrostatic HIRLAM. For stability investigation, the derived SISL model is linearized with respect to the initial, thermally non-equilibrium resting state. Explicit residuals of the linear model prove to be sensitive to the relative departures of temperature and static stability from the reference state. Relayed on the stability study, the semi-implicit term in the vertical momentum equation is replaced to the implicit term, which results in stability increase of the model.

  20. An Efficient Explicit Finite-Difference Scheme for Simulating Coupled Biomass Growth on Nutritive Substrates

    Directory of Open Access Journals (Sweden)

    G. F. Sun

    2015-01-01

    Full Text Available A novel explicit finite-difference (FD method is presented to simulate the positive and bounded development process of a microbial colony subjected to a substrate of nutrients, which is governed by a nonlinear parabolic partial differential equations (PDE system. Our explicit FD scheme is uniquely designed in such a way that it transfers the nonlinear terms in the original PDE into discrete sets of linear ones in the algebraic equation system that can be solved very efficiently, while ensuring the stability and the boundedness of the solution. This is achieved through (1 a proper design of intertwined FD approximations for the diffusion function term in both time and spatial variations and (2 the control of the time-step through establishing theoretical stability criteria. A detailed theoretical stability analysis is conducted to reveal that our FD method is indeed stable. Our examples verified the fact that the numerical solution can be ensured nonnegative and bounded to simulate the actual physics. Numerical examples have also been presented to demonstrate the efficiency of the proposed scheme. The present scheme is applicable for solving similar systems of PDEs in the investigation of the dynamics of biological films.

  1. Load Balancing Scheme on the Basis of Huffman Coding for P2P Information Retrieval

    Science.gov (United States)

    Kurasawa, Hisashi; Takasu, Atsuhiro; Adachi, Jun

    Although a distributed index on a distributed hash table (DHT) enables efficient document query processing in Peer-to-Peer information retrieval (P2P IR), the index costs a lot to construct and it tends to be an unfair management because of the unbalanced term frequency distribution. We devised a new distributed index, named Huffman-DHT, for P2P IR. The new index uses an algorithm similar to Huffman coding with a modification to the DHT structure based on the term distribution. In a Huffman-DHT, a frequent term is assigned to a short ID and allocated a large space in the node ID space in DHT. Throuth ID management, the Huffman-DHT balances the index registration accesses among peers and reduces load concentrations. Huffman-DHT is the first approach to adapt concepts of coding theory and term frequency distribution to load balancing. We evaluated this approach in experiments using a document collection and assessed its load balancing capabilities in P2P IR. The experimental results indicated that it is most effective when the P2P system consists of about 30, 000 nodes and contains many documents. Moreover, we proved that we can construct a Huffman-DHT easily by estimating the probability distribution of the term occurrence from a small number of sample documents.

  2. I'm Sorry "About That": Apologies, Indexicals, and (Unnamed) Offenses

    Science.gov (United States)

    Margutti, Piera; Traverso, Véronique; Pugliese, Rosa

    2016-01-01

    We investigate an apology format, "I'm sorry about it/that," where indexical terms (pronouns) refer to the offense rather than naming it. We identified two subsets in our collection of indexical apologies. In one, indexicals are subsequent either to the offense formulation or to an apology-relevant event; in the second, indexicals are…

  3. On Merrifield-Simmons index of molecular graphs

    Directory of Open Access Journals (Sweden)

    Gutman Ivan

    2016-01-01

    Full Text Available The Merrifield-Simmons index σ = σ(G of a graph G is the number of independent vertex sets of G. This index can be calculated recursively and expressed in terms of Fibonacci numbers. We determine the molecular graphs for which σ can be recursively calculated in a single step.

  4. A Dual Key-Based Activation Scheme for Secure LoRaWAN

    Directory of Open Access Journals (Sweden)

    Jaehyu Kim

    2017-01-01

    Full Text Available With the advent of the Internet of Things (IoT era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.

  5. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  6. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  7. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  8. Modeling and Analysis of DIPPM: A New Modulation Scheme for Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Sana Ullah Jan

    2015-01-01

    Full Text Available Visible Light Communication (VLC uses an Intensity-Modulation and Direct-Detection (IM/DD scheme to transmit data. However, the light source used in VLC systems is continuously switched on and off quickly, resulting in flickering. In addition, recent illumination systems include dimming support to allow users to dim the light sources to the desired level. Therefore, the modulation scheme for data transmission in VLC system must include flicker mitigation and dimming control capabilities. In this paper, the authors propose a Double Inverse Pulse Position Modulation (DIPPM scheme that minimizes flickering and supports a high level of dimming for the illumination sources in VLC systems. To form DIPPM, some changes are made in the symbol structure of the IPPM scheme, and a detailed explanation and mathematical model of DIPPM are given in this paper. Furthermore, both analytical and simulation results for the error performance of 2-DIPPM are compared with the performance of VPPM. Also, the communication performance of DIPPM is analyzed in terms of the normalized required power.

  9. Relativistic effects on complexity indexes in atoms in position and momentum spaces

    International Nuclear Information System (INIS)

    Maldonado, P.; Sarsa, A.; Buendia, E.; Galvez, F.J.

    2010-01-01

    Three different statistical measures of complexity are explored for the atoms He to Ra. The measures are analysed in both position and momentum spaces. Relativistic effects on the complexity indexes are systematically studied. These effects are discussed in terms of the information content factor and the disorder terms of the complexity indexes. Relativistic and non-relativistic complexity indexes are calculated from Optimized Effective Potential densities.

  10. Discretization of convection-diffusion equations with finite-difference scheme derived from simplified analytical solutions

    International Nuclear Information System (INIS)

    Kriventsev, Vladimir

    2000-09-01

    Most of thermal hydraulic processes in nuclear engineering can be described by general convection-diffusion equations that are often can be simulated numerically with finite-difference method (FDM). An effective scheme for finite-difference discretization of such equations is presented in this report. The derivation of this scheme is based on analytical solutions of a simplified one-dimensional equation written for every control volume of the finite-difference mesh. These analytical solutions are constructed using linearized representations of both diffusion coefficient and source term. As a result, the Efficient Finite-Differencing (EFD) scheme makes it possible to significantly improve the accuracy of numerical method even using mesh systems with fewer grid nodes that, in turn, allows to speed-up numerical simulation. EFD has been carefully verified on the series of sample problems for which either analytical or very precise numerical solutions can be found. EFD has been compared with other popular FDM schemes including novel, accurate (as well as sophisticated) methods. Among the methods compared were well-known central difference scheme, upwind scheme, exponential differencing and hybrid schemes of Spalding. Also, newly developed finite-difference schemes, such as the the quadratic upstream (QUICK) scheme of Leonard, the locally analytic differencing (LOAD) scheme of Wong and Raithby, the flux-spline scheme proposed by Varejago and Patankar as well as the latest LENS discretization of Sakai have been compared. Detailed results of this comparison are given in this report. These tests have shown a high efficiency of the EFD scheme. For most of sample problems considered EFD has demonstrated the numerical error that appeared to be in orders of magnitude lower than that of other discretization methods. Or, in other words, EFD has predicted numerical solution with the same given numerical error but using much fewer grid nodes. In this report, the detailed

  11. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  12. Comparison of the Tangent Linear Properties of Tracer Transport Schemes Applied to Geophysical Problems.

    Science.gov (United States)

    Kent, James; Holdaway, Daniel

    2015-01-01

    A number of geophysical applications require the use of the linearized version of the full model. One such example is in numerical weather prediction, where the tangent linear and adjoint versions of the atmospheric model are required for the 4DVAR inverse problem. The part of the model that represents the resolved scale processes of the atmosphere is known as the dynamical core. Advection, or transport, is performed by the dynamical core. It is a central process in many geophysical applications and is a process that often has a quasi-linear underlying behavior. However, over the decades since the advent of numerical modelling, significant effort has gone into developing many flavors of high-order, shape preserving, nonoscillatory, positive definite advection schemes. These schemes are excellent in terms of transporting the quantities of interest in the dynamical core, but they introduce nonlinearity through the use of nonlinear limiters. The linearity of the transport schemes used in Goddard Earth Observing System version 5 (GEOS-5), as well as a number of other schemes, is analyzed using a simple 1D setup. The linearized version of GEOS-5 is then tested using a linear third order scheme in the tangent linear version.

  13. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  14. Locally decodable codes and private information retrieval schemes

    CERN Document Server

    Yekhanin, Sergey

    2010-01-01

    Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency - specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve rec

  15. Associated computational plasticity schemes for nonassociated frictional materials

    DEFF Research Database (Denmark)

    Krabbenhoft, K.; Karim, M. R.; Lyamin, A. V.

    2012-01-01

    A new methodology for computational plasticity of nonassociated frictional materials is presented. The new approach is inspired by the micromechanical origins of friction and results in a set of governing equations similar to those of standard associated plasticity. As such, procedures previously...... developed for associated plasticity are applicable with minor modification. This is illustrated by adaptation of the standard implicit scheme. Moreover, the governing equations can be cast in terms of a variational principle, which after discretization is solved by means of a newly developed second...

  16. Gradient-Index Optics

    Science.gov (United States)

    2010-03-31

    nonimaging design capabilities to incorporate 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 12-04-2011 13. SUPPLEMENTARY NOTES The views, opinions...Box 12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Imaging Optics, Nonimaging Optics, Gradient Index Optics, Camera, Concentrator...imaging and nonimaging design capabilities to incorporate manufacturable GRIN lenses can provide imaging lens systems that are compact and

  17. Toward a Glossary of Self-related Terms

    OpenAIRE

    Morin, Alain

    2017-01-01

    Some scholars have noted that an impressive number of self-related terms have been gradually introduced in the scientific literature. Several of these terms are either ill-defined or synonymous, creating confusion, and redundancy. In an effort to minimize this problem, I present a novel and systematic way of looking at possible relations between several key self-terms. I also propose a tentative classification scheme of self-terms as follows: (1) basic terms related to the overall process of ...

  18. An explicit MOT scheme for solving the TD-EFVIE on nonlinear and dispersive scatterers

    KAUST Repository

    Sayed, Sadeed Bin; Ulku, H. Arda; Bagci, Hakan

    2017-01-01

    An explicit marching-on-in-time (MOT) scheme for solving the time domain electric field volume integral equation (TD-EFVIE) on nonlinear and dispersive scatterers is described. The unknown electric field intensity, electric flux density, and polarization densities representing Kerr nonlinearity along with Lorentz dispersion relation, all of which are induced inside the scatterer upon excitation, are expanded using half and full Schaubert-Wilton-Glisson functions in space. The TD-EFVIE and the constitutive relations between polarization, field, and flux terms are cast in the form of a first-order ordinary differential equation. The resulting matrix system is integrated in time using a predictor-corrector scheme to obtain the time dependent unknown expansion coefficients. The resulting MOT scheme is explicit and accounts for nonlinearity by simple function evaluations.

  19. An explicit MOT scheme for solving the TD-EFVIE on nonlinear and dispersive scatterers

    KAUST Repository

    Sayed, Sadeed Bin

    2017-10-25

    An explicit marching-on-in-time (MOT) scheme for solving the time domain electric field volume integral equation (TD-EFVIE) on nonlinear and dispersive scatterers is described. The unknown electric field intensity, electric flux density, and polarization densities representing Kerr nonlinearity along with Lorentz dispersion relation, all of which are induced inside the scatterer upon excitation, are expanded using half and full Schaubert-Wilton-Glisson functions in space. The TD-EFVIE and the constitutive relations between polarization, field, and flux terms are cast in the form of a first-order ordinary differential equation. The resulting matrix system is integrated in time using a predictor-corrector scheme to obtain the time dependent unknown expansion coefficients. The resulting MOT scheme is explicit and accounts for nonlinearity by simple function evaluations.

  20. Geneflow and Cumulative discounted Revenues of Dairy Cattle Cross-Breeding Schemes

    International Nuclear Information System (INIS)

    Kosgey, I.S.; Bebe, B.O.; Kahi, A.K.; Arendonk, J.A.M.V.

    1999-01-01

    lag behind F 1 males genetically because the latter are used as parents of F 2 cows. In conclusion, although CDES and CDR are higher for the F 1 A.I. or natural mating schemes using inter se mating are promising in terms of logistics and combination of breed effects as indicated in other studies

  1. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    Science.gov (United States)

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  2. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  3. Numerical schemes for dynamically orthogonal equations of stochastic fluid and ocean flows

    International Nuclear Information System (INIS)

    Ueckermann, M.P.; Lermusiaux, P.F.J.; Sapsis, T.P.

    2013-01-01

    The quantification of uncertainties is critical when systems are nonlinear and have uncertain terms in their governing equations or are constrained by limited knowledge of initial and boundary conditions. Such situations are common in multiscale, intermittent and non-homogeneous fluid and ocean flows. The dynamically orthogonal (DO) field equations provide an adaptive methodology to predict the probability density functions of such flows. The present work derives efficient computational schemes for the DO methodology applied to unsteady stochastic Navier–Stokes and Boussinesq equations, and illustrates and studies the numerical aspects of these schemes. Semi-implicit projection methods are developed for the mean and for the DO modes, and time-marching schemes of first to fourth order are used for the stochastic coefficients. Conservative second-order finite-volumes are employed in physical space with new advection schemes based on total variation diminishing methods. Other results include: (i) the definition of pseudo-stochastic pressures to obtain a number of pressure equations that is linear in the subspace size instead of quadratic; (ii) symmetric advection schemes for the stochastic velocities; (iii) the use of generalized inversion to deal with singular subspace covariances or deterministic modes; and (iv) schemes to maintain orthonormal modes at the numerical level. To verify our implementation and study the properties of our schemes and their variations, a set of stochastic flow benchmarks are defined including asymmetric Dirac and symmetric lock-exchange flows, lid-driven cavity flows, and flows past objects in a confined channel. Different Reynolds number and Grashof number regimes are employed to illustrate robustness. Optimal convergence under both time and space refinements is shown as well as the convergence of the probability density functions with the number of stochastic realizations.

  4. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  5. Short-Term Wind Power Forecasting Based on Clustering Pre-Calculated CFD Method

    Directory of Open Access Journals (Sweden)

    Yimei Wang

    2018-04-01

    Full Text Available To meet the increasing wind power forecasting (WPF demands of newly built wind farms without historical data, physical WPF methods are widely used. The computational fluid dynamics (CFD pre-calculated flow fields (CPFF-based WPF is a promising physical approach, which can balance well the competing demands of computational efficiency and accuracy. To enhance its adaptability for wind farms in complex terrain, a WPF method combining wind turbine clustering with CPFF is first proposed where the wind turbines in the wind farm are clustered and a forecasting is undertaken for each cluster. K-means, hierarchical agglomerative and spectral analysis methods are used to establish the wind turbine clustering models. The Silhouette Coefficient, Calinski-Harabaz index and within-between index are proposed as criteria to evaluate the effectiveness of the established clustering models. Based on different clustering methods and schemes, various clustering databases are built for clustering pre-calculated CFD (CPCC-based short-term WPF. For the wind farm case studied, clustering evaluation criteria show that hierarchical agglomerative clustering has reasonable results, spectral clustering is better and K-means gives the best performance. The WPF results produced by different clustering databases also prove the effectiveness of the three evaluation criteria in turn. The newly developed CPCC model has a much higher WPF accuracy than the CPFF model without using clustering techniques, both on temporal and spatial scales. The research provides supports for both the development and improvement of short-term physical WPF systems.

  6. The index of a holomorphic flow with an isolated singularity

    International Nuclear Information System (INIS)

    Verjovsky, A.; Gomez-Mont, X.; Seade, J.

    1987-05-01

    The index of a holomorphic vector field Z defined on a germ of a hypersurface V with an isolated singularity is defined. The index coincides with the Hopf index in the smooth case. Formulae for the index in terms of the ideals defining Z and V are given. Topological invariance of the index and the Chern class as well as formulae relating global invariants of the Poincare-Hopf type are proven. (author). 26 refs

  7. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  8. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  9. Non-storm irregular variation of the Dst index

    Directory of Open Access Journals (Sweden)

    S. Nakano

    2012-01-01

    Full Text Available The Dst index has a long-term variation that is not associated with magnetic storms. We estimated the long-term non-storm component of the Dst variation by removing the short-term variation related to magnetic storms. The results indicate that the variation of the non-storm component includes not only a seasonal variation but also an irregular variation. The irregular long-term variation is likely to be due to an anti-correlation with the long-term variation of solar-wind activity. In particular, a clear anti-correlation is observed between the non-storm component of Dst and the long-term variation of the solar-wind dynamic pressure. This means that in the long term, the Dst index tends to increase when the solar-wind dynamic pressure decreases. We interpret this anti-correlation as an indication that the long-term non-storm variation of Dst is influenced by the tail current variation. The long-term variation of the solar-wind dynamic pressure controls the plasma sheet thermal pressure, and the change of the plasma sheet thermal pressure would cause the non-storm tail current variation, resulting in the non-storm variation of Dst.

  10. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  11. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  12. Assessing the groundwater recharge under various irrigation schemes in Central Taiwan

    Science.gov (United States)

    Chen, Shih-Kai; Jang, Cheng-Shin; Lin, Zih-Ciao; Tsai, Cheng-Bin

    2014-05-01

    The flooded paddy fields can be considered as a major source of groundwater recharge in Central Taiwan. The risk of rice production has increased notably due to climate change in this area. To respond to agricultural water shortage caused by climate change without affecting rice yield in the future, the application of water-saving irrigation is the substantial resolution. The System of Rice Intensification (SRI) was developed as a set of insights and practices used in growing irrigated rice. Based on the water-saving irrigation practice of SRI, impacts of the new methodology on the reducing of groundwater recharge were assessed in central Taiwan. The three-dimensional finite element groundwater model (FEMWATER) with the variable boundary condition analog functions, was applied in simulating groundwater recharge under different irrigation schemes. According to local climatic and environmental characteristics associated with SRI methodology, the change of infiltration rate was evaluated and compared with the traditional irrigation schemes, including continuous irrigation and rotational irrigation scheme. The simulation results showed that the average infiltration rate in the rice growing season decreased when applying the SRI methodology, and the total groundwater recharge amount of SRI with a 5-day irrigation interval reduced 12% and 9% compared with continuous irrigation (6cm constant ponding water depth) and rotational scheme (5-day irrigation interval with 6 cm initial ponding water depth), respectively. The results could be used as basis for planning long-term adaptive water resource management strategies to climate change in Central Taiwan. Keywords: SRI, Irrigation schemes, Groundwater recharge, Infiltration

  13. Approximate Waveforms for Extreme-Mass-Ratio Inspirals: The Chimera Scheme

    International Nuclear Information System (INIS)

    Sopuerta, Carlos F; Yunes, Nicolás

    2012-01-01

    We describe a new kludge scheme to model the dynamics of generic extreme-mass-ratio inspirals (EMRIs; stellar compact objects spiraling into a spinning supermassive black hole) and their gravitational-wave emission. The Chimera scheme is a hybrid method that combines tools from different approximation techniques in General Relativity: (i) A multipolar, post-Minkowskian expansion for the far-zone metric perturbation (the gravitational waveforms) and for the local prescription of the self-force; (ii) a post-Newtonian expansion for the computation of the multipole moments in terms of the trajectories; and (iii) a BH perturbation theory expansion when treating the trajectories as a sequence of self-adjusting Kerr geodesies. The EMRI trajectory is made out of Kerr geodesic fragments joined via the method of osculating elements as dictated by the multipolar post-Minkowskian radiation-reaction prescription. We implemented the proper coordinate mapping between Boyer-Lindquist coordinates, associated with the Kerr geodesies, and harmonic coordinates, associated with the multipolar post-Minkowskian decomposition. The Chimera scheme is thus a combination of approximations that can be used to model generic inspirals of systems with extreme to intermediate mass ratios, and hence, it can provide valuable information for future space-based gravitational-wave observatories, like LISA, and even for advanced ground detectors. The local character in time of our multipolar post-Minkowskian self-force makes this scheme amenable to study the possible appearance of transient resonances in generic inspirals.

  14. Quasi-SU(3) truncation scheme for even-even sd-shell nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Vargas, C.E. E-mail: cvargas@fis.cinvestav.mx; Hirsch, J.G. E-mail: hirsch@nuclecu.unam.mx; Draayer, J.P. E-mail: draayer@lsu.edu

    2001-07-30

    The quasi-SU(3) symmetry was uncovered in full pf and sdg shell-model calculations for both even-even and odd-even nuclei. It manifests itself through a dominance of single-particle and quadrupole-quadrupole terms in a Hamiltonian used to describe well-deformed nuclei. A practical consequence of the quasi-SU(3) symmetry is an efficient basis truncation scheme. In [C.E. Vargas et al., Phys. Rev. C 58 (1998) 1488] it is shown that when this type of Hamiltonian is diagonalized in an SU(3) basis, only a few irreducible representations (irreps) of SU(3) are needed to describe the yrast band, the leading S=0 irrep augmented with the leading S=1 irreps in the proton and neutron subspaces. In the present article the quasi-SU(3) truncation scheme is used, in conjunction with a 'realistic but schematic' Hamiltonian that includes the most important multipole terms, to describe the energy spectra and B(E2) transition strengths of {sup 20,22}Ne, {sup 24}Mg and {sup 28}Si. The effect of the size of the Hilbert space on both sets of observables is discussed, as well as the structure of the yrast band and the importance of the various terms in the Hamiltonian. The limitations of the model are explicitly discussed.

  15. Energy Aware Routing Schemes in Solar PoweredWireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2016-10-01

    Wireless sensor networks enable inexpensive distributed monitoring systems that are the backbone of smart cities. In this dissertation, we are interested in wireless sensor networks for traffic monitoring and an emergency flood detection to improve the safety of future cities. To achieve real-time traffic monitoring and emergency flood detection, the system has to be continually operational. Accordingly, an energy source is needed to ensure energy availability at all times. The sun provides for the most inexpensive source of energy, and therefore the energy is provided here by a solar panel working in conjunction with a rechargeable battery. Unlike batteries, solar energy fluctuates spatially and temporally due to the panel orientation, seasonal variation and node location, particularly in cities where buildings cast shadows. Especially, it becomes scarce whenever floods are likely to occur, as the weather tends to be cloudy at such times when the emergency detection system is most needed. These considerations lead to the need for the optimization of the energy of the sensor network, to maximize its sensing performance. In this dissertation, we address the challenges associated with long term outdoor deployments along with providing some solutions to overcome part of these challenges. We then introduce the energy optimization problem, as a distributed greedy approach. Motivated by the flood sensing application, our objective is to maximize the energy margin in the solar powered network at the onset of the high rain event, to maximize the network lifetime. The decentralized scheme will achieve this by optimizing the energy over a time horizon T, taking into account the available and predicted energy over the entire routing path. Having a good energy forecasting scheme can significantly enhance the energy optimization in WSN. Thus, this dissertation proposes a new energy forecasting scheme that is compatible with the platform’s capabilities. This proposed

  16. Sensitivity Evaluation of Spectral Nudging Schemes in Historical Dynamical Downscaling for South Asia

    Directory of Open Access Journals (Sweden)

    Mehwish Ramzan

    2017-01-01

    Full Text Available Sensitivity experiments testing two scale-selective bias correction (SSBC methods have been carried out to identify an optimal spectral nudging scheme for historical dynamically downscaled simulations of South Asia, using the coordinated regional climate downscaling experiment (CORDEX protocol and the regional spectral model (RSM. Two time periods were selected under the category of short-term extreme summer and long-term decadal analysis. The new SSBC version applied nudging to full wind components, with an increased relaxation time in the lower model layers, incorporating a vertical weighted damping coefficient. An evaluation of the extraordinary weather conditions experienced in South Asia in the summer of 2005 confirmed the advantages of the new SSBC when modeling monsoon precipitation. Furthermore, the new SSBC scheme was found to predict precipitation and wind patterns more accurately than the older version in decadal analysis, which applies nudging only to the rotational wind field, with a constant strength at all heights.

  17. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  18. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  19. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  20. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  1. Plasma simulation with the Differential Algebraic Cubic Interpolated Propagation scheme

    Energy Technology Data Exchange (ETDEWEB)

    Utsumi, Takayuki [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1998-03-01

    A computer code based on the Differential Algebraic Cubic Interpolated Propagation scheme has been developed for the numerical solution of the Boltzmann equation for a one-dimensional plasma with immobile ions. The scheme advects the distribution function and its first derivatives in the phase space for one time step by using a numerical integration method for ordinary differential equations, and reconstructs the profile in phase space by using a cubic polynomial within a grid cell. The method gives stable and accurate results, and is efficient. It is successfully applied to a number of equations; the Vlasov equation, the Boltzmann equation with the Fokker-Planck or the Bhatnagar-Gross-Krook (BGK) collision term and the relativistic Vlasov equation. The method can be generalized in a straightforward way to treat cases such as problems with nonperiodic boundary conditions and higher dimensional problems. (author)

  2. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  3. Outage Performance of Flexible OFDM Schemes in Packet-Switched Transmissions

    Directory of Open Access Journals (Sweden)

    Romain Couillet

    2009-01-01

    Full Text Available α-OFDM, a generalization of the OFDM modulation, is proposed. This new modulation enhances the outage capacity performance of bursty communications. The α-OFDM scheme is easily implementable as it only requires an additional time symbol rotation after the IDFT stage and a subsequent phase rotation of the cyclic prefix. The physical effect of the induced rotation is to slide the DFT window over the frequency spectrum. When successively used with different angles α at the symbol rate, α-OFDM provides frequency diversity in block fading channels. Interestingly, simulation results show a substantial gain in terms of outage capacity and outage BER in comparison with classical OFDM modulation schemes. The framework is extended to multiantenna and multicellular OFDM-based standards. Practical simulations, in the context of 3GPP-LTE, called hereafter α-LTE, sustain our theoretical claims.

  4. A Countrywide House Price Index for 152 Years

    DEFF Research Database (Denmark)

    Lunde, Jens; Helding Madsen, Anders; Lundbæk Laursen, Maria

    for Herengracht (the Netherlands), Norway, USA, France, and recently also Australia. Until now, the here presented house price index for Denmark is the longest countrywide house price index ever been published, based on official data, and qualitatively probably the best long house price index....... in house prices is depicted. The Danish house price index covering all the 152 years is in reality a simple average sale price index for houses. From 1920 on it was possible to construct another and a “pure” house price index, based on the Sales Price Appraisal Ratio (SPAR) method. Several challenges...... for creating the house price index arose, especially in converting the previous registered house prices in the statistics into current market prices. In real terms, the average sale price index increased more than the SPAR index for the years where the two indices were compared, and the difference express...

  5. Evaluating the effect of alternative carbon allocation schemes in a land surface model (CLM4.5) on carbon fluxes, pools, and turnover in temperate forests

    Science.gov (United States)

    Montané, Francesc; Fox, Andrew M.; Arellano, Avelino F.; MacBean, Natasha; Alexander, M. Ross; Dye, Alex; Bishop, Daniel A.; Trouet, Valerie; Babst, Flurin; Hessl, Amy E.; Pederson, Neil; Blanken, Peter D.; Bohrer, Gil; Gough, Christopher M.; Litvak, Marcy E.; Novick, Kimberly A.; Phillips, Richard P.; Wood, Jeffrey D.; Moore, David J. P.

    2017-09-01

    How carbon (C) is allocated to different plant tissues (leaves, stem, and roots) determines how long C remains in plant biomass and thus remains a central challenge for understanding the global C cycle. We used a diverse set of observations (AmeriFlux eddy covariance tower observations, biomass estimates from tree-ring data, and leaf area index (LAI) measurements) to compare C fluxes, pools, and LAI data with those predicted by a land surface model (LSM), the Community Land Model (CLM4.5). We ran CLM4.5 for nine temperate (including evergreen and deciduous) forests in North America between 1980 and 2013 using four different C allocation schemes: i. dynamic C allocation scheme (named "D-CLM4.5") with one dynamic allometric parameter, which allocates C to the stem and leaves to vary in time as a function of annual net primary production (NPP); ii. an alternative dynamic C allocation scheme (named "D-Litton"), where, similar to (i), C allocation is a dynamic function of annual NPP, but unlike (i) includes two dynamic allometric parameters involving allocation to leaves, stem, and coarse roots; iii.-iv. a fixed C allocation scheme with two variants, one representative of observations in evergreen (named "F-Evergreen") and the other of observations in deciduous forests (named "F-Deciduous"). D-CLM4.5 generally overestimated gross primary production (GPP) and ecosystem respiration, and underestimated net ecosystem exchange (NEE). In D-CLM4.5, initial aboveground biomass in 1980 was largely overestimated (between 10 527 and 12 897 g C m-2) for deciduous forests, whereas aboveground biomass accumulation through time (between 1980 and 2011) was highly underestimated (between 1222 and 7557 g C m-2) for both evergreen and deciduous sites due to a lower stem turnover rate in the sites than the one used in the model. D-CLM4.5 overestimated LAI in both evergreen and deciduous sites because the leaf C-LAI relationship in the model did not match the observed leaf C

  6. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  7. Chemical evolution and the origin of life: cumulative keyword subject index 1970-1986

    Science.gov (United States)

    Roy, A. C.; Powers, J. V.; Rummel, J. D. (Principal Investigator)

    1990-01-01

    This cumulative subject index encompasses the subject indexes of the bibliographies on Chemical Evolution and the Origin of Life that were first published in 1970 and have continued through publication of the 1986 bibliography supplement. Early bibliographies focused on experimental and theoretical material dealing directly with the concepts of chemical evolution and the origin of life, excluding the broader areas of exobiology, biological evolution, and geochemistry. In recent years, these broader subject areas have also been incorporated as they appear in literature searches relating to chemical evolution and the origin of life, although direct attempts have not been made to compile all of the citations in these broad areas. The keyword subject indexes have also undergone an analogous change in scope. Compilers of earlier bibliographies used the most specific term available in producing the subject index. Compilers of recent bibliographies have used a number of broad terms relating to the overall subject content of each citation and specific terms where appropriate. The subject indexes of these 17 bibliographies have, in general, been cumulatively compiled exactly as they originally appeared. However, some changes have been made in an attempt to correct errors, combine terms, and provide more meaningful terms.

  8. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  9. A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Nam Nguyen

    2015-01-01

    Full Text Available The existing IEEE and 3GPP standards have laid the foundation for integrating cellular and WiFi network to deliver a seamless experience for the end-users when roaming across multiple access networks. However, in recent studies, the issue of making roaming decision and intelligently selecting the most preferable Point of Service to optimize network resource and improve end user’s experience has not been considered properly. In this paper, we propose a novel cellular and WiFi roaming decision and AP selection scheme based on state of the art, 3GPP TS24.312 and IEEE 802.11u, k standards. Our proposed scheme assists the mobile nodes to decide the right timing to make roaming decision and select preferable point of service based on the operator’s policies and real-time network condition. We also introduce our simulation model of a heterogeneous network with cellular and WiFi interworking as well as 3GPP ANDSF, TS24.312. It is a complete end-to-end system model from application to physical layer with considering user’s mobility and realistic traffic model. The proposed scheme outperformed the conventional WiFi selection scheme in terms of dynamically steering mobile node’s data traffic from macrocell to available Access Points. The proposed scheme increased the utilization and balanced the traffic load of access points and improved user’s experienced throughput.

  10. The Perception of Generic Capabilities and Learning Environment among Undergraduate Nursing Students after the Implementation of a Senior Intake Scheme

    Science.gov (United States)

    Chan, Carmen W. H.; Leung, Doris Y. P.; Lee, Diana T. F.; Chair, Sek Ying; Ip, Wan Yim; Sit, Janet W. H.

    2018-01-01

    Hong Kong has introduced a senior intake admission scheme which is similar to the US model of credit transfer from community college programmes to university bachelor programmes. The study aimed to assess the outcomes, in terms of generic capabilities, of introducing a senior intake articulation scheme to a bachelor of nursing curriculum in Hong…

  11. Three-batch reloading scheme for IRIS reactor extended cycles

    International Nuclear Information System (INIS)

    Jecmenica, R.; Pevec, D.; Grgic, D.

    2004-01-01

    To fully exploit the IRIS reactor optimized maintenance, and at the same time improve fuel utilization, a core design enabling a 4-year operating cycle together with a three-batch reloading scheme is desirable. However, this requires not only the increased allowed burnup but also use of fuel with uranium oxide enriched beyond 5%. This paper considers three-batch reloading scheme for a 4-year operating cycle with the assumptions of increased discharge burnup and fuel enrichment beyond 5%. Calculational model of IRIS reactor core has been developed based on FER FA2D code for group constants generation and NRC's PARCS nodal code for global core analysis. Studies have been performed resulting in a preliminary design of a three-batch core configuration for the first cycle. It must be emphasized that this study is outside the current IRIS licensing efforts, which rely on the present fuel technology (enrichment below 5%), but it is of long-term interest for potential future IRIS design upgrades. (author)

  12. Convergence of a semi-discretization scheme for the Hamilton-Jacobi equation: A new approach with the adjoint method

    KAUST Repository

    Cagnetti, Filippo; Gomes, Diogo A.; Tran, Hung Vinh

    2013-01-01

    We consider a numerical scheme for the one dimensional time dependent Hamilton-Jacobi equation in the periodic setting. This scheme consists in a semi-discretization using monotone approximations of the Hamiltonian in the spacial variable. From classical viscosity solution theory, these schemes are known to converge. In this paper we present a new approach to the study of the rate of convergence of the approximations based on the nonlinear adjoint method recently introduced by L.C. Evans. We estimate the rate of convergence for convex Hamiltonians and recover the O(h) convergence rate in terms of the L∞ norm and O(h) in terms of the L1 norm, where h is the size of the spacial grid. We discuss also possible generalizations to higher dimensional problems and present several other additional estimates. The special case of quadratic Hamiltonians is considered in detail in the end of the paper. © 2013 IMACS.

  13. Convergence of a semi-discretization scheme for the Hamilton-Jacobi equation: A new approach with the adjoint method

    KAUST Repository

    Cagnetti, Filippo

    2013-11-01

    We consider a numerical scheme for the one dimensional time dependent Hamilton-Jacobi equation in the periodic setting. This scheme consists in a semi-discretization using monotone approximations of the Hamiltonian in the spacial variable. From classical viscosity solution theory, these schemes are known to converge. In this paper we present a new approach to the study of the rate of convergence of the approximations based on the nonlinear adjoint method recently introduced by L.C. Evans. We estimate the rate of convergence for convex Hamiltonians and recover the O(h) convergence rate in terms of the L∞ norm and O(h) in terms of the L1 norm, where h is the size of the spacial grid. We discuss also possible generalizations to higher dimensional problems and present several other additional estimates. The special case of quadratic Hamiltonians is considered in detail in the end of the paper. © 2013 IMACS.

  14. Shift work at young age is associated with elevated long-term cortisol levels and body mass index.

    Science.gov (United States)

    Manenschijn, Laura; van Kruysbergen, Rulanda G P M; de Jong, Frank H; Koper, Jan W; van Rossum, Elisabeth F C

    2011-11-01

    The incidence of obesity and other features of the metabolic syndrome is increased in shift workers. This may be due to a misalignment between the internal circadian rhythm and the behavioral rhythm. The stress hormone cortisol could play a role in this phenomenon because it is secreted in a circadian rhythm, and long-term elevated cortisol leads to components of the metabolic syndrome. We compared cortisol levels in scalp hair of shift and day workers to study changes in long-term cortisol due to shift work. Hair samples were collected from 33 shift workers and 89 day workers. Cortisol was extracted from the hair samples with methanol, and cortisol levels were measured using ELISA. Height and weight were measured, and body mass index (BMI) was calculated. Shift workers had higher hair cortisol levels than day workers: 47.32 pg/mg hair [95% confidence interval (CI) = 38.37-58.21] vs. 29.72 pg/mg hair (95% CI = 26.18-33.73) (P cortisol levels were present only in younger shift workers: 48.53 pg/mg hair (95% CI = 36.56-64.29) vs. 26.42 pg/mg hair (95% CI = 22.91-30.55) (P cortisol and BMI were positively correlated (β = 0.262; P = 0.005). Shift work at a young adult age is associated with elevated long-term cortisol levels and increased BMI. Elevated cortisol levels and BMI may contribute to the increased cardiovascular risk found in shift workers.

  15. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  16. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  17. Fast computation of the Maslov index for hyperbolic linear systems with periodic coefficients

    International Nuclear Information System (INIS)

    Chardard, F; Dias, F; Bridges, T J

    2006-01-01

    The Maslov index is a topological property of periodic orbits of finite-dimensional Hamiltonian systems that is widely used in semiclassical quantization, quantum chaology, stability of waves and classical mechanics. The Maslov index is determined from the analysis of a linear Hamiltonian system with periodic coefficients. In this paper, a numerical scheme is devised to compute the Maslov index for hyperbolic linear systems when the phase space has a low dimension. The idea is to compute on the exterior algebra of the ambient vector space, where the Lagrangian subspace representing the unstable subspace is reduced to a line. When the exterior algebra is projectified the Lagrangian subspace always forms a closed loop. The idea is illustrated by application to Hamiltonian systems on a phase space of dimension 4. The theory is used to compute the Maslov index for the spectral problem associated with periodic solutions of the fifth-order Korteweg de Vries equation

  18. Changes in body mass index in long-term childhood cancer survivors.

    Science.gov (United States)

    van Santen, Hanneke M; Geskus, Ronald B; Raemaekers, Steven; van Trotsenburg, A S Paul; Vulsma, Thomas; van der Pal, Helena J H; Caron, Hubert N; Kremer, Leontien C M

    2015-12-01

    Previous studies have reported changes in the body mass index (BMI) with time in childhood cancer survivors (CCSs) during follow-up. The limitations of these studies include that they described only a subgroup of survivors or used questionnaires with self-reported heights and weights. The goal of this study was to examine BMI in a large cohort of long-term CCSs and relate this to the BMI at diagnosis, age, sex, tumor type, treatment, and endocrine defects. All patients treated for childhood cancer at the Emma Children's Hospital/Academic Medical Center between 1966 and 1996 who had survived for at least 5 years were eligible for inclusion. For 893 CCSs with a mean follow-up of 14.9 years, the BMI at the late effects outpatient clinic was compared with the BMI for the general Dutch population. For girls, an increased prevalence of obesity was found. Risk factors for developing a high BMI at follow-up were a younger age and a high BMI at diagnosis and treatment with cranial radiotherapy. A significantly increased prevalence of severe underweight was found in all adult subgroups except for females aged 26 to 45 years. An association was found between a low BMI at diagnosis and a low BMI at follow-up. No treatment-related variables could be related to changes in BMI. The BMI at diagnosis is one of the most important predictors for the BMI at follow-up, and this suggests an important genetic or environmental cause. Adult CCSs are at high risk for developing severe underweight at follow-up. Future studies should focus on the causes and clinical consequences of underweight. © 2015 American Cancer Society.

  19. Changes in body mass index in long-term childhood cancer survivors

    NARCIS (Netherlands)

    van Santen, HM; Geskus, Ronald B; Raemaekers, Steven; van Trotsenburg, A S Paul; Vulsma, Thomas; van der Pal, Helena J H; Caron, Hubert N; Kremer, Leontien C M

    2015-01-01

    BACKGROUND: Previous studies have reported changes in the body mass index (BMI) with time in childhood cancer survivors (CCSs) during follow-up. The limitations of these studies include that they described only a subgroup of survivors or used questionnaires with self-reported heights and weights.

  20. A Cost-Based Adaptive Handover Hysteresis Scheme to Minimize the Handover Failure Rate in 3GPP LTE System

    Directory of Open Access Journals (Sweden)

    Gil Gye-Tae

    2010-01-01

    Full Text Available We deal with a cost-based adaptive handover hysteresis scheme for the horizontal handover decision strategies, as one of the self-optimization techniques that can minimize the handover failure rate (HFR in the 3rd generation partnership project (3GPP long-term evolution (LTE system based on the network-controlled hard handover. Especially, for real-time operation, we propose an adaptive hysteresis scheme with a simplified cost function considering some dominant factors closely related to HFR performance such as the load difference between the target and serving cells, the velocity of user equipment (UE, and the service type. With the proposed scheme, a proper hysteresis value based on the dominant factors is easily obtained, so that the handover parameter optimization for minimizing the HFR can be effectively achieved. Simulation results show that the proposed scheme can support better HFR performance than the conventional schemes.

  1. Air quality health index variation across British Columbia

    Energy Technology Data Exchange (ETDEWEB)

    Hasselback, P. [Interior Health Authority, Kelowna, BC (Canada); Taylor, E. [British Columbia Ministry of Health Living and Sport, Vancouver, BC (Canada)

    2010-09-15

    The new Air Quality Health Index (AQHI) is a tool aiming to present the health risks related to air pollution in Canada. This index can be used by individuals to help them reduce their health risk resulting from poor air quality. An assessment of the short term health risk induced by poor air quality is provided to Canadians through the AQHI. The AQHI is based on three factors: ambient concentrations of nitrogen dioxide, fine particulate matter and ozone, the local air quality information being presented on an hourly and daily basis and being calculated each hour for several locations across Canada. Pulmonary disorders and impacts on cardiac function are the more significant short term health risks. Longer term exposure to poor air quality is associated with increased rates of allergies and asthma, low birth weight, atherosclerosis, poorer lung development in children, lung cancer and ear infections. Information on the AQHI and on the variation across British Columbia of the health risk associated with this index are presented in this document. 19 refs., 5 tabs., 5 figs.

  2. Green Frame Aggregation Scheme for IEEE 802.11n Networks

    KAUST Repository

    Alaslani, Maha S.

    2015-04-01

    Frame aggregation is one of the major MAC layer enhancements in the IEEE 802.11 family that boosts the network throughput performance. It aims to achieve higher throughput by transmitting huge amount of data in a single transmit oppor- tunity. With the increasing awareness of energy e ciency, it has become vital to rethink about the design of such frame aggregation protocol. Aggregation techniques help to reduce energy consumption over ideal channel conditions. However, in a noisy channel environment, a new energy-aware frame aggregation scheme is required. In this thesis, a novel Green Frame Aggregation (GFA) scheduling scheme has been proposed and evaluated. GFA optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects the optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel situations. The design, the implementation, and evaluation of GFA using testbed deployment is done. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy e ciency by about 6⇥ in the presence of severe interference conditions. Moreover, GFA also outperforms the static frame sizing method in terms of network goodput and maintains almost the same end- to-end latency.

  3. Asymptotic preserving and all-regime Lagrange-Projection like numerical schemes: application to two-phase flows in low mach regime

    International Nuclear Information System (INIS)

    Girardin, Mathieu

    2014-01-01

    Two-phase flows in Pressurized Water Reactors belong to a wide range of Mach number flows. Computing accurate approximate solutions of those flows may be challenging from a numerical point of view as classical finite volume methods are too diffusive in the low Mach regime. In this thesis, we are interested in designing and studying some robust numerical schemes that are stable for large time steps and accurate even on coarse meshes for a wide range of flow regimes. An important feature is the strategy to construct those schemes. We use a mixed implicit-explicit strategy based on an operator splitting to solve fast and slow phenomena separately. Then, we introduce a modification of a Suliciu type relaxation scheme to improve the accuracy of the numerical scheme in some regime of interest. Two approaches have been used to assess the ability of our numerical schemes to deal with a wide range of flow regimes. The first approach, based on the asymptotic preserving property, has been used for the gas dynamics equations with stiff source terms. The second approach, based on the all-regime property, has been used for the gas dynamics equations and the homogeneous two-phase flows models HRM and HEM in the low Mach regime. We obtained some robustness and stability properties for our numerical schemes. In particular, some discrete entropy inequalities are shown. Numerical evidences, in 1D and in 2D on unstructured meshes, assess the gain in term of accuracy and CPU time of those asymptotic preserving and all-regime numerical schemes in comparison with classical finite volume methods. (author) [fr

  4. What Factors Affect Voluntary Uptake of Community-Based Health Insurance Schemes in Low- and Middle-Income Countries? A Systematic Review and Meta-Analysis.

    Directory of Open Access Journals (Sweden)

    David Mark Dror

    Full Text Available This research article reports on factors influencing initial voluntary uptake of community-based health insurance (CBHI schemes in low- and middle-income countries (LMIC, and renewal decisions.Following PRISMA protocol, we conducted a comprehensive search of academic and gray literature, including academic databases in social science, economics and medical sciences (e.g., Econlit, Global health, Medline, Proquest and other electronic resources (e.g., Eldis and Google scholar. Search strategies were developed using the thesaurus or index terms (e.g., MeSH specific to the databases, combined with free text terms related to CBHI or health insurance. Searches were conducted from May 2013 to November 2013 in English, French, German, and Spanish. From the initial search yield of 15,770 hits, 54 relevant studies were retained for analysis of factors influencing enrolment and renewal decisions. The quantitative synthesis (informed by meta-analysis and the qualitative analysis (informed by thematic synthesis were compared to gain insight for an overall synthesis of findings/statements.Meta-analysis suggests that enrolments in CBHI were positively associated with household income, education and age of the household head (HHH, household size, female-headed household, married HHH and chronic illness episodes in the household. The thematic synthesis suggests the following factors as enablers for enrolment: (a knowledge and understanding of insurance and CBHI, (b quality of healthcare, (c trust in scheme management. Factors found to be barriers to enrolment include: (a inappropriate benefits package, (b cultural beliefs, (c affordability, (d distance to healthcare facility, (e lack of adequate legal and policy frameworks to support CBHI, and (f stringent rules of some CBHI schemes. HHH education, household size and trust in the scheme management were positively associated with member renewal decisions. Other motivators were: (a knowledge and understanding of

  5. What Factors Affect Voluntary Uptake of Community-Based Health Insurance Schemes in Low- and Middle-Income Countries? A Systematic Review and Meta-Analysis

    Science.gov (United States)

    Hossain, S. A. Shahed; Pérez Koehlmoos, Tracey Lynn; John, Denny

    2016-01-01

    Introduction This research article reports on factors influencing initial voluntary uptake of community-based health insurance (CBHI) schemes in low- and middle-income countries (LMIC), and renewal decisions. Methods Following PRISMA protocol, we conducted a comprehensive search of academic and gray literature, including academic databases in social science, economics and medical sciences (e.g., Econlit, Global health, Medline, Proquest) and other electronic resources (e.g., Eldis and Google scholar). Search strategies were developed using the thesaurus or index terms (e.g., MeSH) specific to the databases, combined with free text terms related to CBHI or health insurance. Searches were conducted from May 2013 to November 2013 in English, French, German, and Spanish. From the initial search yield of 15,770 hits, 54 relevant studies were retained for analysis of factors influencing enrolment and renewal decisions. The quantitative synthesis (informed by meta-analysis) and the qualitative analysis (informed by thematic synthesis) were compared to gain insight for an overall synthesis of findings/statements. Results Meta-analysis suggests that enrolments in CBHI were positively associated with household income, education and age of the household head (HHH), household size, female-headed household, married HHH and chronic illness episodes in the household. The thematic synthesis suggests the following factors as enablers for enrolment: (a) knowledge and understanding of insurance and CBHI, (b) quality of healthcare, (c) trust in scheme management. Factors found to be barriers to enrolment include: (a) inappropriate benefits package, (b) cultural beliefs, (c) affordability, (d) distance to healthcare facility, (e) lack of adequate legal and policy frameworks to support CBHI, and (f) stringent rules of some CBHI schemes. HHH education, household size and trust in the scheme management were positively associated with member renewal decisions. Other motivators were: (a

  6. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  7. Drell-Yan cross section in the jet calculus scheme

    International Nuclear Information System (INIS)

    Tanaka, Hidekazu; Kobayashi, Hirokazu

    2009-01-01

    We calculate factorized cross sections for lepton pair production mediated by a virtual photon in hadron-hadron collisions using the jet calculus scheme, in which a kinematical constraint due to parton radiation is taken into account. This method guarantees a proper phase space boundary for subtraction terms. Some properties of the calculated cross sections are examined. We also discuss matching between the hard scattering cross sections and parton showers at the next-to-leading logarithmic (NLL) order of quantum chromodynamics (QCD). (author)

  8. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  9. Changes in body mass index in long-term childhood cancer survivors

    NARCIS (Netherlands)

    van Santen, Hanneke M.; Geskus, Ronald B.; Raemaekers, Steven; van Trotsenburg, A. S. Paul; Vulsma, Thomas; van der Pal, Helena J. H.; Caron, Hubert N.; Kremer, Leontien C. M.

    2015-01-01

    Previous studies have reported changes in the body mass index (BMI) with time in childhood cancer survivors (CCSs) during follow-up. The limitations of these studies include that they described only a subgroup of survivors or used questionnaires with self-reported heights and weights. The goal of

  10. CANDELS Visual Classifications: Scheme, Data Release, and First Results

    Science.gov (United States)

    Kartaltepe, Jeyhan S.; Mozena, Mark; Kocevski, Dale; McIntosh, Daniel H.; Lotz, Jennifer; Bell, Eric F.; Faber, Sandy; Ferguson, Henry; Koo, David; Bassett, Robert; hide

    2014-01-01

    We have undertaken an ambitious program to visually classify all galaxies in the five CANDELS fields down to H <24.5 involving the dedicated efforts of 65 individual classifiers. Once completed, we expect to have detailed morphological classifications for over 50,000 galaxies spanning 0 < z < 4 over all the fields. Here, we present our detailed visual classification scheme, which was designed to cover a wide range of CANDELS science goals. This scheme includes the basic Hubble sequence types, but also includes a detailed look at mergers and interactions, the clumpiness of galaxies, k-corrections, and a variety of other structural properties. In this paper, we focus on the first field to be completed - GOODS-S, which has been classified at various depths. The wide area coverage spanning the full field (wide+deep+ERS) includes 7634 galaxies that have been classified by at least three different people. In the deep area of the field, 2534 galaxies have been classified by at least five different people at three different depths. With this paper, we release to the public all of the visual classifications in GOODS-S along with the Perl/Tk GUI that we developed to classify galaxies. We present our initial results here, including an analysis of our internal consistency and comparisons among multiple classifiers as well as a comparison to the Sersic index. We find that the level of agreement among classifiers is quite good and depends on both the galaxy magnitude and the galaxy type, with disks showing the highest level of agreement and irregulars the lowest. A comparison of our classifications with the Sersic index and restframe colors shows a clear separation between disk and spheroid populations. Finally, we explore morphological k-corrections between the V-band and H-band observations and find that a small fraction (84 galaxies in total) are classified as being very different between these two bands. These galaxies typically have very clumpy and extended morphology or

  11. Quantitative indexes of gas-steam thermo electrical power plants thermodynamical cycles; Indices quantitativos de ciclos termodinamicos de centrais termoeletricas de gas-vapor

    Energy Technology Data Exchange (ETDEWEB)

    Vlassov, D.; Vargas, J.V.C. [Parana Univ., Curitiba, PR (Brazil). Dept. de Engenharia Mecanica]. E-mails: vlassov@demec.ufpr.br; jvargas@demec.ufpr.br

    2002-07-01

    This paper analyses various thermal schemes of the world wide most used cycles in gas-steam thermoelectric power plants. The combination of gas turbine cycle with the steam-gas cycle in thermoelectric power plants is performed in several ways, resulting in different thermal schemes, used equipment and operation plant basic characteristics. The thermal scheme of a gas-steam power plant is a determinant factor for the definition of energetic, economic and ecological characteristics. For the comparative analysis various quantitative indexes are presented, as for example: the heat fraction supplied to the gas turbine cycle and the cycle binary rate.

  12. Physical renormalization schemes and asymptotic safety in quantum gravity

    Science.gov (United States)

    Falls, Kevin

    2017-12-01

    The methods of the renormalization group and the ɛ -expansion are applied to quantum gravity revealing the existence of an asymptotically safe fixed point in spacetime dimensions higher than two. To facilitate this, physical renormalization schemes are exploited where the renormalization group flow equations take a form which is independent of the parameterisation of the physical degrees of freedom (i.e. the gauge fixing condition and the choice of field variables). Instead the flow equation depends on the anomalous dimensions of reference observables. In the presence of spacetime boundaries we find that the required balance between the Einstein-Hilbert action and Gibbons-Hawking-York boundary term is preserved by the beta functions. Exploiting the ɛ -expansion near two dimensions we consider Einstein gravity coupled to matter. Scheme independence is generically obscured by the loop-expansion due to breaking of two-dimensional Weyl invariance. In schemes which preserve two-dimensional Weyl invariance we avoid the loop expansion and find a unique ultraviolet (UV) fixed point. At this fixed point the anomalous dimensions are large and one must resum all loop orders to obtain the critical exponents. Performing the resummation a set of universal scaling dimensions are found. These scaling dimensions show that only a finite number of matter interactions are relevant. This is a strong indication that quantum gravity is renormalizable.

  13. Reconfigurable Charge Pump Circuit with Variable Pumping Frequency Scheme for Harvesting Solar Energy under Various Sunlight Intensities

    Directory of Open Access Journals (Sweden)

    Jeong Heon Kim

    2014-01-01

    Full Text Available We propose variable pumping frequency (VPF scheme which is merged with the previous reconfigurable charge pump (RCP circuit that can change its architecture according to a given sunlight condition. Here, merging the VPF scheme with the architecture reconfiguration can improve percentage output currents better by 21.4% and 22.4% than RCP circuit with the fixed pumping frequencies of 7 MHz and 15 MHz, respectively. Comparing the VPF scheme with real maximum power points (MPP, the VPF can deliver 91.9% of the maximum amount of output current to the load on average. In terms of the power and area overheads, the VPF scheme proposed in this paper consumes the power by 0.4% of the total power consumption and occupies the layout area by 1.61% of the total layout area.

  14. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  15. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  16. A New Switching-Based Median Filtering Scheme and Algorithm for Removal of High-Density Salt and Pepper Noise in Images

    Directory of Open Access Journals (Sweden)

    Jayaraj V

    2010-01-01

    Full Text Available A new switching-based median filtering scheme for restoration of images that are highly corrupted by salt and pepper noise is proposed. An algorithm based on the scheme is developed. The new scheme introduces the concept of substitution of noisy pixels by linear prediction prior to estimation. A novel simplified linear predictor is developed for this purpose. The objective of the scheme and algorithm is the removal of high-density salt and pepper noise in images. The new algorithm shows significantly better image quality with good PSNR, reduced MSE, good edge preservation, and reduced streaking. The good performance is achieved with reduced computational complexity. A comparison of the performance is made with several existing algorithms in terms of visual and quantitative results. The performance of the proposed scheme and algorithm is demonstrated.

  17. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  18. An analytical approach for a nodal scheme of two-dimensional neutron transport problems

    International Nuclear Information System (INIS)

    Barichello, L.B.; Cabrera, L.C.; Prolo Filho, J.F.

    2011-01-01

    Research highlights: → Nodal equations for a two-dimensional neutron transport problem. → Analytical Discrete Ordinates Method. → Numerical results compared with the literature. - Abstract: In this work, a solution for a two-dimensional neutron transport problem, in cartesian geometry, is proposed, on the basis of nodal schemes. In this context, one-dimensional equations are generated by an integration process of the multidimensional problem. Here, the integration is performed for the whole domain such that no iterative procedure between nodes is needed. The ADO method is used to develop analytical discrete ordinates solution for the one-dimensional integrated equations, such that final solutions are analytical in terms of the spatial variables. The ADO approach along with a level symmetric quadrature scheme, lead to a significant order reduction of the associated eigenvalues problems. Relations between the averaged fluxes and the unknown fluxes at the boundary are introduced as the usually needed, in nodal schemes, auxiliary equations. Numerical results are presented and compared with test problems.

  19. An entropy-variables-based formulation of residual distribution schemes for non-equilibrium flows

    Science.gov (United States)

    Garicano-Mena, Jesús; Lani, Andrea; Degrez, Gérard

    2018-06-01

    In this paper we present an extension of Residual Distribution techniques for the simulation of compressible flows in non-equilibrium conditions. The latter are modeled by means of a state-of-the-art multi-species and two-temperature model. An entropy-based variable transformation that symmetrizes the projected advective Jacobian for such a thermophysical model is introduced. Moreover, the transformed advection Jacobian matrix presents a block diagonal structure, with mass-species and electronic-vibrational energy being completely decoupled from the momentum and total energy sub-system. The advantageous structure of the transformed advective Jacobian can be exploited by contour-integration-based Residual Distribution techniques: established schemes that operate on dense matrices can be substituted by the same scheme operating on the momentum-energy subsystem matrix and repeated application of scalar scheme to the mass-species and electronic-vibrational energy terms. Finally, the performance gain of the symmetrizing-variables formulation is quantified on a selection of representative testcases, ranging from subsonic to hypersonic, in inviscid or viscous conditions.

  20. Improving a Spectral Bin Microphysical Scheme Using TRMM Satellite Observations

    Science.gov (United States)

    Li, Xiaowen; Tao, Wei-Kuo; Matsui, Toshihisa; Liu, Chuntao; Masunaga, Hirohiko

    2010-01-01

    Comparisons between cloud model simulations and observations are crucial in validating model performance and improving physical processes represented in the mod Tel.hese modeled physical processes are idealized representations and almost always have large rooms for improvements. In this study, we use data from two different sensors onboard TRMM (Tropical Rainfall Measurement Mission) satellite to improve the microphysical scheme in the Goddard Cumulus Ensemble (GCE) model. TRMM observed mature-stage squall lines during late spring, early summer in central US over a 9-year period are compiled and compared with a case simulation by GCE model. A unique aspect of the GCE model is that it has a state-of-the-art spectral bin microphysical scheme, which uses 33 different bins to represent particle size distribution of each of the seven hydrometeor species. A forward radiative transfer model calculates TRMM Precipitation Radar (PR) reflectivity and TRMM Microwave Imager (TMI) 85 GHz brightness temperatures from simulated particle size distributions. Comparisons between model outputs and observations reveal that the model overestimates sizes of snow/aggregates in the stratiform region of the squall line. After adjusting temperature-dependent collection coefficients among ice-phase particles, PR comparisons become good while TMI comparisons worsen. Further investigations show that the partitioning between graupel (a high-density form of aggregate), and snow (a low-density form of aggregate) needs to be adjusted in order to have good comparisons in both PR reflectivity and TMI brightness temperature. This study shows that long-term satellite observations, especially those with multiple sensors, can be very useful in constraining model microphysics. It is also the first study in validating and improving a sophisticated spectral bin microphysical scheme according to long-term satellite observations.

  1. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  2. Valuation of Index-Linked Cash Flows in a Heath–Jarrow–Morton Framework

    Directory of Open Access Journals (Sweden)

    Jonas Alm

    2015-09-01

    Full Text Available In this paper, we study the valuation of stochastic cash flows that exhibit dependence on interest rates. We focus on insurance liability cash flows linked to an index, such as a consumer price index or wage index, where changes in the index value can be partially understood in terms of changes in the term structure of interest rates. Insurance liability cash flows that are not explicitly linked to an index may still be valued in our framework by interpreting index returns as so-called claims inflation, i.e., an increase in claims cost per sold insurance contract. We focus primarily on the case when a deep and liquid market for index-linked contracts is absent or when the market price data are unreliable. Firstly, we present an approach for assigning a monetary value to a stochastic cash flow that does not require full knowledge of the joint dynamics of the cash flow and the term structure of interest rates. Secondly, we investigate in detail model selection, estimation and validation in a Heath–Jarrow–Morton framework. Finally, we analyze the effects of model uncertainty on the valuation of the cash flows and how forecasts of cash flows and interest rates translate into model parameters and affect the valuation.

  3. Appraisal of long term groundwater quality of peninsular India using water quality index and fractal dimension

    Science.gov (United States)

    Rawat, Kishan Singh; Singh, Sudhir Kumar; Jacintha, T. German Amali; Nemčić-Jurec, Jasna; Tripathi, Vinod Kumar

    2017-12-01

    A review has been made to understand the hydrogeochemical behaviour of groundwater through statistical analysis of long term water quality data (year 2005-2013). Water Quality Index ( WQI), descriptive statistics, Hurst exponent, fractal dimension and predictability index were estimated for each water parameter. WQI results showed that majority of samples fall in moderate category during 2005-2013, but monitoring site four falls under severe category (water unfit for domestic use). Brownian time series behaviour (a true random walk nature) exists between calcium (Ca^{2+}) and electric conductivity (EC); magnesium (Mg^{2+}) with EC; sodium (Na+) with EC; sulphate (SO4^{2-}) with EC; total dissolved solids (TDS) with chloride (Cl-) during pre- (2005-2013) and post- (2006-2013) monsoon season. These parameters have a closer value of Hurst exponent ( H) with Brownian time series behaviour condition (H=0.5). The result of times series analysis of water quality data shows a persistent behaviour (a positive autocorrelation) that has played a role between Cl- and Mg^{2+}, Cl- and Ca^{2+}, TDS and Na+, TDS and SO4^{2-}, TDS and Ca^{2+} in pre- and post-monsoon time series because of the higher value of H (>1). Whereas an anti-persistent behaviour (or negative autocorrelation) was found between Cl- and EC, TDS and EC during pre- and post-monsoon due to low value of H. The work outline shows that the groundwater of few areas needs treatment before direct consumption, and it also needs to be protected from contamination.

  4. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  5. A space-time lower-upper symmetric Gauss-Seidel scheme for the time-spectral method

    Science.gov (United States)

    Zhan, Lei; Xiong, Juntao; Liu, Feng

    2016-05-01

    The time-spectral method (TSM) offers the advantage of increased order of accuracy compared to methods using finite-difference in time for periodic unsteady flow problems. Explicit Runge-Kutta pseudo-time marching and implicit schemes have been developed to solve iteratively the space-time coupled nonlinear equations resulting from TSM. Convergence of the explicit schemes is slow because of the stringent time-step limit. Many implicit methods have been developed for TSM. Their computational efficiency is, however, still limited in practice because of delayed implicit temporal coupling, multiple iterative loops, costly matrix operations, or lack of strong diagonal dominance of the implicit operator matrix. To overcome these shortcomings, an efficient space-time lower-upper symmetric Gauss-Seidel (ST-LU-SGS) implicit scheme with multigrid acceleration is presented. In this scheme, the implicit temporal coupling term is split as one additional dimension of space in the LU-SGS sweeps. To improve numerical stability for periodic flows with high frequency, a modification to the ST-LU-SGS scheme is proposed. Numerical results show that fast convergence is achieved using large or even infinite Courant-Friedrichs-Lewy (CFL) numbers for unsteady flow problems with moderately high frequency and with the use of moderately high numbers of time intervals. The ST-LU-SGS implicit scheme is also found to work well in calculating periodic flow problems where the frequency is not known a priori and needed to be determined by using a combined Fourier analysis and gradient-based search algorithm.

  6. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  7. Exponential Synchronization of Networked Chaotic Delayed Neural Network by a Hybrid Event Trigger Scheme.

    Science.gov (United States)

    Fei, Zhongyang; Guan, Chaoxu; Gao, Huijun; Zhongyang Fei; Chaoxu Guan; Huijun Gao; Fei, Zhongyang; Guan, Chaoxu; Gao, Huijun

    2018-06-01

    This paper is concerned with the exponential synchronization for master-slave chaotic delayed neural network with event trigger control scheme. The model is established on a network control framework, where both external disturbance and network-induced delay are taken into consideration. The desired aim is to synchronize the master and slave systems with limited communication capacity and network bandwidth. In order to save the network resource, we adopt a hybrid event trigger approach, which not only reduces the data package sending out, but also gets rid of the Zeno phenomenon. By using an appropriate Lyapunov functional, a sufficient criterion for the stability is proposed for the error system with extended ( , , )-dissipativity performance index. Moreover, hybrid event trigger scheme and controller are codesigned for network-based delayed neural network to guarantee the exponential synchronization between the master and slave systems. The effectiveness and potential of the proposed results are demonstrated through a numerical example.

  8. A hybrid spatio-temporal data indexing method for trajectory databases.

    Science.gov (United States)

    Ke, Shengnan; Gong, Jun; Li, Songnian; Zhu, Qing; Liu, Xintao; Zhang, Yeting

    2014-07-21

    In recent years, there has been tremendous growth in the field of indoor and outdoor positioning sensors continuously producing huge volumes of trajectory data that has been used in many fields such as location-based services or location intelligence. Trajectory data is massively increased and semantically complicated, which poses a great challenge on spatio-temporal data indexing. This paper proposes a spatio-temporal data indexing method, named HBSTR-tree, which is a hybrid index structure comprising spatio-temporal R-tree, B*-tree and Hash table. To improve the index generation efficiency, rather than directly inserting trajectory points, we group consecutive trajectory points as nodes according to their spatio-temporal semantics and then insert them into spatio-temporal R-tree as leaf nodes. Hash table is used to manage the latest leaf nodes to reduce the frequency of insertion. A new spatio-temporal interval criterion and a new node-choosing sub-algorithm are also proposed to optimize spatio-temporal R-tree structures. In addition, a B*-tree sub-index of leaf nodes is built to query the trajectories of targeted objects efficiently. Furthermore, a database storage scheme based on a NoSQL-type DBMS is also proposed for the purpose of cloud storage. Experimental results prove that HBSTR-tree outperforms TB*-tree in some aspects such as generation efficiency, query performance and query type.

  9. A Hybrid Spatio-Temporal Data Indexing Method for Trajectory Databases

    Directory of Open Access Journals (Sweden)

    Shengnan Ke

    2014-07-01

    Full Text Available In recent years, there has been tremendous growth in the field of indoor and outdoor positioning sensors continuously producing huge volumes of trajectory data that has been used in many fields such as location-based services or location intelligence. Trajectory data is massively increased and semantically complicated, which poses a great challenge on spatio-temporal data indexing. This paper proposes a spatio-temporal data indexing method, named HBSTR-tree, which is a hybrid index structure comprising spatio-temporal R-tree, B*-tree and Hash table. To improve the index generation efficiency, rather than directly inserting trajectory points, we group consecutive trajectory points as nodes according to their spatio-temporal semantics and then insert them into spatio-temporal R-tree as leaf nodes. Hash table is used to manage the latest leaf nodes to reduce the frequency of insertion. A new spatio-temporal interval criterion and a new node-choosing sub-algorithm are also proposed to optimize spatio-temporal R-tree structures. In addition, a B*-tree sub-index of leaf nodes is built to query the trajectories of targeted objects efficiently. Furthermore, a database storage scheme based on a NoSQL-type DBMS is also proposed for the purpose of cloud storage. Experimental results prove that HBSTR-tree outperforms TB*-tree in some aspects such as generation efficiency, query performance and query type.

  10. A Hybrid Spatio-Temporal Data Indexing Method for Trajectory Databases

    Science.gov (United States)

    Ke, Shengnan; Gong, Jun; Li, Songnian; Zhu, Qing; Liu, Xintao; Zhang, Yeting

    2014-01-01

    In recent years, there has been tremendous growth in the field of indoor and outdoor positioning sensors continuously producing huge volumes of trajectory data that has been used in many fields such as location-based services or location intelligence. Trajectory data is massively increased and semantically complicated, which poses a great challenge on spatio-temporal data indexing. This paper proposes a spatio-temporal data indexing method, named HBSTR-tree, which is a hybrid index structure comprising spatio-temporal R-tree, B*-tree and Hash table. To improve the index generation efficiency, rather than directly inserting trajectory points, we group consecutive trajectory points as nodes according to their spatio-temporal semantics and then insert them into spatio-temporal R-tree as leaf nodes. Hash table is used to manage the latest leaf nodes to reduce the frequency of insertion. A new spatio-temporal interval criterion and a new node-choosing sub-algorithm are also proposed to optimize spatio-temporal R-tree structures. In addition, a B*-tree sub-index of leaf nodes is built to query the trajectories of targeted objects efficiently. Furthermore, a database storage scheme based on a NoSQL-type DBMS is also proposed for the purpose of cloud storage. Experimental results prove that HBSTR-tree outperforms TB*-tree in some aspects such as generation efficiency, query performance and query type. PMID:25051028

  11. A reliability index for assessment of crack profile reconstructed from ECT signals using a neural-network approach

    International Nuclear Information System (INIS)

    Yusa, Noritaka; Chen, Zhenmao; Miya, Kenzo; Cheng, Weiying

    2002-01-01

    This paper proposes a reliability parameter to enhance an version scheme developed by authors. The scheme is based upon an artificial neural network that simulates mapping between eddy current signals and crack profiles. One of the biggest advantages of the scheme is that it can deal with conductive cracks, which is necessary to reconstruct natural cracks. However, it has one significant disadvantage: the reliability of reconstructed profiles was unknown. The parameter provides an index for assessment of the crack profile and overcomes this disadvantage. After the parameter is validated by reconstruction of simulated cracks, it is applied to reconstruction of natural cracks that occurred in steam generator tubes of a pressurized water reactor. It is revealed that the parameter is applicable to not only simulated cracks but also natural ones. (author)

  12. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  13. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  14. A gas dynamics scheme for a two moments model of radiative transfer

    International Nuclear Information System (INIS)

    Buet, Ch.; Despres, B.

    2007-01-01

    We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)

  15. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  16. Analysis of adaptive walks on NK fitness landscapes with different interaction schemes

    International Nuclear Information System (INIS)

    Nowak, Stefan; Krug, Joachim

    2015-01-01

    Fitness landscapes are genotype to fitness mappings commonly used in evolutionary biology and computer science which are closely related to spin glass models. In this paper, we study the NK model for fitness landscapes where the interaction scheme between genes can be explicitly defined. The focus is on how this scheme influences the overall shape of the landscape. Our main tool for the analysis are adaptive walks, an idealized dynamics by which the population moves uphill in fitness and terminates at a local fitness maximum. We use three different types of walks and investigate how their length (the number of steps required to reach a local peak) and height (the fitness at the endpoint of the walk) depend on the dimensionality and structure of the landscape. We find that the distribution of local maxima over the landscape is particularly sensitive to the choice of interaction pattern. Most quantities that we measure are simply correlated to the rank of the scheme, which is equal to the number of nonzero coefficients in the expansion of the fitness landscape in terms of Walsh functions

  17. A Novel Dedicated Route Protection Scheme for Survivability of Link Failure in Elastic Optical Networks

    Directory of Open Access Journals (Sweden)

    Sridhar Iyer

    2017-11-01

    Full Text Available The spectrally efficient transportation of the high bit rate(s data is achievable by the Elastic optical networks (EONs. However, in the EONs, owing to the failure occurrence even in an individual simple element, different service(s maybe interrupted. Hence, it is imperative that the schemes for survivability be developed so that the issues due to the possible failure(s can be overcome. In the current work, in view of survivability of the link failure(s in the EONs, we propose the Spectrum Continuity and Contiguity Established DRP (SCC-E-DRP algorithm which is a novel dedicated route protection (DRP scheme that attempts to avoid the problem of trap topology during its exploration for a pair of link disjoint path. Further, to evaluate the link disjoint paths, we resort to the use of the SCC Established Shortest Route (SCC-E-SR algorithm which is a modified Dijkstra’s algorithm based scheme that selects the path(s pair(s based on the end-toend SCC. We conduct extensive simulations considering realistic network topologies, and compare the performance of the SCCE-DRP scheme with the existing techniques. The obtained results show that, compared to the existing schemes, the SCC-E-DRP scheme achieves better results in terms of blocking probability.

  18. Numerical investigation on compressible flow characteristics in axial compressors using a multi block finite-volume scheme

    International Nuclear Information System (INIS)

    Farhanieh, B.; Amanifard, N.; Ghorbanian, K.

    2002-01-01

    An unsteady two-dimensional numerical investigation was performed on the viscous flow passing through a multi-blade cascade. A Cartesian finite-volume approach was linked to Van-Leer's and Roe's flux splitting schemes to evaluate inviscid flux terms. To prevent the oscillatory behavior of numerical results and to increase the accuracy, Mon tonic Upstream Scheme for Conservation Laws was added to flux splitting schemes. The Baldwin-Lo max (B L) turbulence model was implemented to solve the turbulent case studies. Implicit solution was also provided using Lower and Upper (L U) decomposition technique to compare with explicit solutions. To validate the numerical procedure, two test cases are prepared and flow over a Na Ca 0012 airfoil was investigated and the pressure coefficients were compared to the reference data. The numerical solver was implemented to study the flow passing over a compressor cascade. The results of various combinations of splitting schemes and the Mon tonic Upstream Scheme for Conventional Laws limiter were compared with each other to find the suitable methods in cascade problems. Finally the convergence histories of implemented schemes were compared to each other to show the behavior of the solver in using various methods before implementation of them in flow instability studies

  19. A comparison of carbon allocation schemes: On the equity-efficiency tradeoff

    International Nuclear Information System (INIS)

    Pan, Xunzhang; Teng, Fei; Wang, Gehua

    2014-01-01

    In the long-term stabilization targets of greenhouse gases concentrations, various carbon emission rights allocation schemes have been proposed. To compare and evaluate them, the most essential is the equity-efficiency tradeoff. This paper measures the equity and the efficiency in the global rather than the narrower national perspective. Specifically, the equity of the first allocation is quantified by the carbon Gini coefficient defined by per capita cumulative emission, and the economic efficiency to accomplish obligations is described with the discounted global abatement costs. Under 20 key allocation schemes, the numerical comparison on the equity-efficiency tradeoff side is carried out through the Equitable Access to Sustainable Development model. Our studies indicate that the equity and the efficiency of future emission space allocation approximately show a three-stage relationship. - Highlights: • The equity-efficiency tradeoff among 20 key allocation schemes is carried out. • Both the equity and the efficiency are measured in the global perspective. • The Equitable Access to Sustainable Development model is adopted as the study tool. • A practical trade framework is indispensable to efficiently address climate change. • The equity and the efficiency generally show a three-stage tradeoff relationship

  20. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property