Frank, Jason
2006-01-01
textabstractIn this note we show that multisymplectic Runge-Kutta box schemes, of which the Gauss-Legendre methods are the most important, preserve a discrete conservation law of wave action. The result follows by loop integration over an ensemble of flow realizations, and the local energy-momentum conservation law for continuous variables in semi-discretizations
Cagnetti, Filippo
2013-11-01
We consider a numerical scheme for the one dimensional time dependent Hamilton-Jacobi equation in the periodic setting. This scheme consists in a semi-discretization using monotone approximations of the Hamiltonian in the spacial variable. From classical viscosity solution theory, these schemes are known to converge. In this paper we present a new approach to the study of the rate of convergence of the approximations based on the nonlinear adjoint method recently introduced by L.C. Evans. We estimate the rate of convergence for convex Hamiltonians and recover the O(h) convergence rate in terms of the L∞ norm and O(h) in terms of the L1 norm, where h is the size of the spacial grid. We discuss also possible generalizations to higher dimensional problems and present several other additional estimates. The special case of quadratic Hamiltonians is considered in detail in the end of the paper. © 2013 IMACS.
J.E. Frank (Jason)
2006-01-01
textabstractIn this note we show that multisymplectic Runge-Kutta box schemes, of which the Gauss-Legendre methods are the most important, preserve a discrete conservation law of wave action. The result follows by loop integration over an ensemble of flow realizations, and the local energy-momentum
Positivity for Convective Semi-discretizations
Fekete, Imre
2017-04-19
We propose a technique for investigating stability properties like positivity and forward invariance of an interval for method-of-lines discretizations, and apply the technique to study positivity preservation for a class of TVD semi-discretizations of 1D scalar hyperbolic conservation laws. This technique is a generalization of the approach suggested in Khalsaraei (J Comput Appl Math 235(1): 137–143, 2010). We give more relaxed conditions on the time-step for positivity preservation for slope-limited semi-discretizations integrated in time with explicit Runge–Kutta methods. We show that the step-size restrictions derived are sharp in a certain sense, and that many higher-order explicit Runge–Kutta methods, including the classical 4th-order method and all non-confluent methods with a negative Butcher coefficient, cannot generally maintain positivity for these semi-discretizations under any positive step size. We also apply the proposed technique to centered finite difference discretizations of scalar hyperbolic and parabolic problems.
A distortional semi-discretized thin-walled beam element
DEFF Research Database (Denmark)
Andreassen, Michael Joachim; Jönsson, Jeppe
2013-01-01
Due to the increased consumption of thin-walled structural elements there has been increasing focus and need for more detailed calculations as well as development of new approaches. In this paper a thin-walled beam element including distortion of the cross section is formulated. The formulation...... is based on a generalized beam theory (GBT), in which the classic Vlasov beam theory for analysis of open and closed thin-walled cross sections is generalized by including distortional displacements. The beam element formulation utilizes a semi-discretization approach in which the cross section...... is discretized into wall elements and the analytical solutions of the related GBT beam equations are used as displacement functions in the axial direction. Thus the beam element contains the semi-analytical solutions. In three related papers the authors have recently presented the semi-discretization approach...
An integrable semi-discretization of the Boussinesq equation
Energy Technology Data Exchange (ETDEWEB)
Zhang, Yingnan, E-mail: ynzhang@njnu.edu.cn [Jiangsu Key Laboratory for NSLSCS, School of Mathematical Sciences, Nanjing Normal University, Nanjing, Jiangsu (China); Tian, Lixin, E-mail: tianlixin@njnu.edu.cn [Jiangsu Key Laboratory for NSLSCS, School of Mathematical Sciences, Nanjing Normal University, Nanjing, Jiangsu (China); Nonlinear Scientific Research Center, Jiangsu University, Zhenjiang, Jiangsu (China)
2016-10-23
Highlights: • A new integrable semi-discretization of the Boussinesq equation is present. • A Bäcklund transformation and a Lax pair for the differential-difference system is derived by using Hirota's bilinear method. • The soliton solutions of 'good' Boussinesq equation and numerical algorithms are investigated. - Abstract: In this paper, we present an integrable semi-discretization of the Boussinesq equation. Different from other discrete analogues, we discretize the ‘time’ variable and get an integrable differential-difference system. Under a standard limitation, the differential-difference system converges to the continuous Boussinesq equation such that the discrete system can be used to design numerical algorithms. Using Hirota's bilinear method, we find a Bäcklund transformation and a Lax pair of the differential-difference system. For the case of ‘good’ Boussinesq equation, we investigate the soliton solutions of its discrete analogue and design numerical algorithms. We find an effective way to reduce the phase shift caused by the discretization. The numerical results coincide with our analysis.
Distortional buckling modes of semi-discretized thin-walled columns
DEFF Research Database (Denmark)
Andreassen, Michael Joachim; Jönsson, Jeppe
2012-01-01
This paper presents distorting buckling solutions for semi-discretized thin-walled columns using the coupled differential equations of a generalized beam theory (GBT). In two related papers recently published by the authors a novel semi-discretization approach to GBT has been presented. The cross...
A semi-discrete integrable multi-component coherently coupled nonlinear Schrödinger system
International Nuclear Information System (INIS)
Zhao, Hai-qiong; Yuan, Jinyun
2016-01-01
A new integrable semi-discrete version is proposed for the multi-component coherently coupled nonlinear Schrödinger equation. The integrability of the semi-discrete system is confirmed by existence of Lax pair and infinite number of conservation laws. With the aid of gauge transformations, explicit formulas for N -fold Darboux transformations are derived whereby some physically important solutions of the system are presented. Furthermore, the theory of the semi-discrete system including Lax pair, Darboux transformations, exact solutions and infinite number of conservation laws are shown for their continuous counterparts in the continuous limit. (paper)
A semi-discretized thin-walled beam element including distortion
DEFF Research Database (Denmark)
Andreassen, Michael Joachim; Jönsson, Jeppe
2013-01-01
An advanced thin-walled beam element including distortion of the cross section is presented. The formulation is based on a generalization of the classical Vlasov beam theory for analysis of open and closed thin-walled cross sections by including distortional displacements.The beam element...... formulation utilizes a semidiscretization approach in which the cross section is discretized into wall elements and the analytical solutions of the related GBT beam equations are used as displacement functions in the axial direction. Thus the beam element contains the semi-analytical solutions. In a number...... of related publications the authors have recently presented the semi-discretization approach and the analytical solution of the generalized beam equations. An illustrative example showing the validity and the accuracy of the developed distortional semi-discretized thin-walled beam element is given...
Centrally managed name resolution schemes for EPICS
International Nuclear Information System (INIS)
Jun, D.
1997-01-01
The Experimental Physics and Industrial Control System (EPICS) uses a broadcast method to locate resources and controls distributed across control servers. There are many advantages offered by using a centrally managed name resolution method, in which resources are located using a repository. The suitability of DCE Directory Service as a name resolution method is explored, and results from a study involving DCE are discussed. An alternative nameserver method developed and in use at the Thomas Jefferson national Accelerator Facility (Jefferson Lab) is described and results of integrating this new method with existing EPICS utilities presented. The various methods discussed in the paper are compared
The approximate inverse in action: IV. Semi-discrete equations in a Banach space setting
International Nuclear Information System (INIS)
Schuster, T; Schöpfer, F; Rieder, A
2012-01-01
This article concerns the method of approximate inverse to solve semi-discrete, linear operator equations in Banach spaces. Semi-discrete means that we search for a solution in an infinite-dimensional Banach space having only a finite number of data available. In this sense the situation is applicable to a large variety of applications where a measurement process delivers a discretization of an infinite-dimensional data space. The method of approximate inverse computes scalar products of the data with pre-computed reconstruction kernels which are associated with mollifiers and the dual of the model operator. The convergence, approximation power and regularization property of this method when applied to semi-discrete operator equations in Hilbert spaces has been investigated in three prequels to this paper. Here we extend these results to a Banach space setting. We prove convergence and stability for general Banach spaces and reproduce the results specifically for the integration operator acting on the space of continuous functions. (paper)
Six-component semi-discrete integrable nonlinear Schrödinger system
Vakhnenko, Oleksiy O.
2018-01-01
We suggest the six-component integrable nonlinear system on a quasi-one-dimensional lattice. Due to its symmetrical form, the general system permits a number of reductions; one of which treated as the semi-discrete integrable nonlinear Schrödinger system on a lattice with three structural elements in the unit cell is considered in considerable details. Besides six truly independent basic field variables, the system is characterized by four concomitant fields whose background values produce three additional types of inter-site resonant interactions between the basic fields. As a result, the system dynamics becomes associated with the highly nonstandard form of Poisson structure. The elementary Poisson brackets between all field variables are calculated and presented explicitly. The richness of system dynamics is demonstrated on the multi-component soliton solution written in terms of properly parameterized soliton characteristics.
Results of von Neumann analyses for reproducing kernel semi-discretizations
Energy Technology Data Exchange (ETDEWEB)
Voth, T.E.; Christon, M.A.
1998-06-01
The Reproducing Kernel Particle Method (RKPM) has many attractive properties that make it ideal for treating a broad class of physical problems. RKPM may be implemented in a mesh-full or a mesh-free manner and provides the ability to tune the method, via the selection of a dilation parameter and window function, in order to achieve the requisite numerical performance. RKPM also provides a framework for performing hierarchical computations making it an ideal candidate for simulating multi-scale problems. Although RKPM has many appealing attributes, the method is quite new and its numerical performance is still being quantified with respect to more traditional discretization methods. In order to assess the numerical performance of RKPM, detailed studies of RKPM on a series of model partial differential equations has been undertaken. The results of von Neumann analyses for RKPM semi-discretizations of one and two-dimensional, first and second-order wave equations are presented in the form of phase and group errors. Excellent dispersion characteristics are found for the consistent mass matrix with the proper choice of dilation parameter. In contrast, the influence of row-sum lumping the mass matrix is shown to introduce severe lagging phase errors. A higher-order mass matrix improves the dispersion characteristics relative to the lumped mass matrix but delivers severe lagging phase errors relative to the fully integrated, consistent mass matrix.
New bounded skew central difference scheme. Part 1: Formulation and testing
Energy Technology Data Exchange (ETDEWEB)
Moukalled, F.; Darwish, M. [American Univ. of Beirut (Lebanon)
1997-01-01
The skew central difference scheme is combined with the normalized variable formulation to yield a new bounded skew central difference scheme. The newly developed scheme is tested and compared with the upwind scheme, the bounded skew upwind scheme, and the high-resolution SMART scheme by solving four problems: (1) pure convection of a step profile in an oblique velocity field; (2) sudden expansion of an oblique flow field in a rectangular cavity; (3) driven flow in a skew cavity; and (4) gradual expansion in an axisymmetric, nonorthogonal channel. Results generated reveal the new scheme to be bounded and to be the most accurate among those investigated.
Ji, Songsong; Yang, Yibo; Pang, Gang; Antoine, Xavier
2018-01-01
The aim of this paper is to design some accurate artificial boundary conditions for the semi-discretized linear Schrödinger and heat equations in rectangular domains. The Laplace transform in time and discrete Fourier transform in space are applied to get Green's functions of the semi-discretized equations in unbounded domains with single-source. An algorithm is given to compute these Green's functions accurately through some recurrence relations. Furthermore, the finite-difference method is used to discretize the reduced problem with accurate boundary conditions. Numerical simulations are presented to illustrate the accuracy of our method in the case of the linear Schrödinger and heat equations. It is shown that the reflection at the corners is correctly eliminated.
Xin, Chunsheng; Ye, Yinghua; Dixit, Sudhir; Qiao, Chunming
2001-07-01
Recently there are considerable amount of research about the automatic control and provisioning in all optical networks. One of the critical issues is how to provide effective lightpath provisioning to improve network performance, such as blocking probability and decision time. Depending on the network topology, configuration, and administration policy, a distributed or centralized control scheme can be employed to manage the routing and signaling. In a distributed control scheme, each node exchanges information with other nodes, but performs routing and signaling independently from other nodes. On the other hand, in a centralized scheme, each node communicates with a central controller and the controller performs routing and signaling on behalf of all other nodes. Intuitively, the centralized scheme can obtain a lower blocking probability since the controller has the complete resource availability information. We have studied the two schemes through emulations, determined the signaling and processing overheads and quantified the conditions that favor one approach over the other.
Chanda, Arnab; Fischer, Achim; Eberhard, Peter; Dwivedy, Santosha Kumar
2014-04-01
In this work, the stability of a flexible thin cylindrical workpiece in turning is analyzed. A process model is derived based on a finite element representation of the workpiece flexibility and a nonlinear cutting force law. Repeated cutting of the same surface due to overlapping cuts is modeled with the help of a time delay. The stability of the so obtained system of periodic delay differential equations is then determined using an approximation as a time-discrete system and Floquet theory. The time-discrete system is obtained using the semi-discretization method. The method is implemented to analyze the stability of two different workpiece models of different thicknesses for different tool positions with respect to the jaw end. It is shown that the stability chart depends on the tool position as well as on the thickness. [Figure not available: see fulltext.
Armand J, K. M.
2017-12-01
In this study, version 4 of the regional climate model (RegCM4) is used to perform 6 years simulation including one year for spin-up (from January 2001 to December 2006) over Central Africa using four convective schemes: The Emmanuel scheme (MIT), the Grell scheme with Arakawa-Schulbert closure assumption (GAS), the Grell scheme with Fritsch-Chappell closure assumption (GFC) and the Anthes-Kuo scheme (Kuo). We have investigated the ability of the model to simulate precipitation, surface temperature, wind and aerosols optical depth. Emphasis in the model results were made in December-January-February (DJF) and July-August-September (JAS) periods. Two subregions have been identified for more specific analysis namely: zone 1 which corresponds to the sahel region mainly classified as desert and steppe and zone 2 which is a region spanning the tropical rain forest and is characterised by a bimodal rain regime. We found that regardless of periods or simulated parameters, MIT scheme generally has a tendency to overestimate. The GAS scheme is more suitable in simulating the aforementioned parameters, as well as the diurnal cycle of precipitations everywhere over the study domain irrespective of the season. In JAS, model results are similar in the representation of regional wind circulation. Apart from the MIT scheme, all the convective schemes give the same trends in aerosols optical depth simulations. Additional experiment reveals that the use of BATS instead of Zeng scheme to calculate ocean flux appears to improve the quality of the model simulations.
Third Order Reconstruction of the KP Scheme for Model of River Tinnelva
Directory of Open Access Journals (Sweden)
Susantha Dissanayake
2017-01-01
Full Text Available The Saint-Venant equation/Shallow Water Equation is used to simulate flow of river, flow of liquid in an open channel, tsunami etc. The Kurganov-Petrova (KP scheme which was developed based on the local speed of discontinuity propagation, can be used to solve hyperbolic type partial differential equations (PDEs, hence can be used to solve the Saint-Venant equation. The KP scheme is semi discrete: PDEs are discretized in the spatial domain, resulting in a set of Ordinary Differential Equations (ODEs. In this study, the common 2nd order KP scheme is extended into 3rd order scheme while following the Weighted Essentially Non-Oscillatory (WENO and Central WENO (CWENO reconstruction steps. Both the 2nd order and 3rd order schemes have been used in simulation in order to check the suitability of the KP schemes to solve hyperbolic type PDEs. The simulation results indicated that the 3rd order KP scheme shows some better stability compared to the 2nd order scheme. Computational time for the 3rd order KP scheme for variable step-length ode solvers in MATLAB is less compared to the computational time of the 2nd order KP scheme. In addition, it was confirmed that the order of the time integrators essentially should be lower compared to the order of the spatial discretization. However, for computation of abrupt step changes, the 2nd order KP scheme shows a more accurate solution.
Central upwind scheme for a compressible two-phase flow model.
Ahmed, Munshoor; Saleem, M Rehan; Zia, Saqib; Qamar, Shamsul
2015-01-01
In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS) and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.
Central upwind scheme for a compressible two-phase flow model.
Directory of Open Access Journals (Sweden)
Munshoor Ahmed
Full Text Available In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.
OLT-centralized sampling frequency offset compensation scheme for OFDM-PON.
Chen, Ming; Zhou, Hui; Zheng, Zhiwei; Deng, Rui; Chen, Qinghui; Peng, Miao; Liu, Cuiwei; He, Jing; Chen, Lin; Tang, Xionggui
2017-08-07
We propose an optical line terminal (OLT)-centralized sampling frequency offset (SFO) compensation scheme for adaptively-modulated OFDM-PON systems. By using the proposed SFO scheme, the phase rotation and inter-symbol interference (ISI) caused by SFOs between OLT and multiple optical network units (ONUs) can be centrally compensated in the OLT, which reduces the complexity of ONUs. Firstly, the optimal fast Fourier transform (FFT) size is identified in the intensity-modulated and direct-detection (IMDD) OFDM system in the presence of SFO. Then, the proposed SFO compensation scheme including phase rotation modulation (PRM) and length-adaptive OFDM frame has been experimentally demonstrated in the downlink transmission of an adaptively modulated optical OFDM with the optimal FFT size. The experimental results show that up to ± 300 ppm SFO can be successfully compensated without introducing any receiver performance penalties.
Maximum principle and convergence of central schemes based on slope limiters
Mehmetoglu, Orhan
2012-01-01
A maximum principle and convergence of second order central schemes is proven for scalar conservation laws in dimension one. It is well known that to establish a maximum principle a nonlinear piecewise linear reconstruction is needed and a typical choice is the minmod limiter. Unfortunately, this implies that the scheme uses a first order reconstruction at local extrema. The novelty here is that we allow local nonlinear reconstructions which do not reduce to first order at local extrema and still prove maximum principle and convergence. © 2011 American Mathematical Society.
Central-Upwind Schemes for Two-Layer Shallow Water Equations
Kurganov, Alexander
2009-01-01
We derive a second-order semidiscrete central-upwind scheme for one- and two-dimensional systems of two-layer shallow water equations. We prove that the presented scheme is well-balanced in the sense that stationary steady-state solutions are exactly preserved by the scheme and positivity preserving; that is, the depth of each fluid layer is guaranteed to be nonnegative. We also propose a new technique for the treatment of the nonconservative products describing the momentum exchange between the layers. The performance of the proposed method is illustrated on a number of numerical examples, in which we successfully capture (quasi) steady-state solutions and propagating interfaces. © 2009 Society for Industrial and Applied Mathematics.
Sensitivity of boundary layer variables to PBL schemes over the central Tibetan Plateau
Xu, L.; Liu, H.; Wang, L.; Du, Q.; Liu, Y.
2017-12-01
Planetary Boundary Layer (PBL) parameterization schemes play critical role in numerical weather prediction and research. They describe physical processes associated with the momentum, heat and humidity exchange between land surface and atmosphere. In this study, two non-local (YSU and ACM2) and two local (MYJ and BouLac) planetary boundary layer parameterization schemes in the Weather Research and Forecasting (WRF) model have been tested over the central Tibetan Plateau regarding of their capability to model boundary layer parameters relevant for surface energy exchange. The model performance has been evaluated against measurements from the Third Tibetan Plateau atmospheric scientific experiment (TIPEX-III). Simulated meteorological parameters and turbulence fluxes have been compared with observations through standard statistical measures. Model results show acceptable behavior, but no particular scheme produces best performance for all locations and parameters. All PBL schemes underestimate near surface air temperatures over the Tibetan Plateau. By investigating the surface energy budget components, the results suggest that downward longwave radiation and sensible heat flux are the main factors causing the lower near surface temperature. Because the downward longwave radiation and sensible heat flux are respectively affected by atmosphere moisture and land-atmosphere coupling, improvements in water vapor distribution and land-atmosphere energy exchange is meaningful for better presentation of PBL physical processes over the central Tibetan Plateau.
Bryson, Steve
2010-10-11
We introduce a new second-order central-upwind scheme for the Saint-Venant system of shallow water equations on triangular grids. We prove that the scheme both preserves "lake at rest" steady states and guarantees the positivity of the computed fluid depth. Moreover, it can be applied to models with discontinuous bottom topography and irregular channel widths. We demonstrate these features of the new scheme, as well as its high resolution and robustness in a number of numerical examples. © EDP Sciences, SMAI, 2010.
Jebri, Fatma; Birol, Florence; Zakardjian, Bruno; Bouffard, Jérome; Sammari, Cherif
2016-07-01
This work is the first study exploiting along track altimetry data to observe and monitor coastal ocean features over the transition area between the western and eastern Mediterranean Basins. The relative performances of both the AVISO and the X-TRACK research regional altimetric data sets are compared using in situ observations. Both products are cross validated with tide gauge records. The altimeter-derived geostrophic velocities are also compared with observations from a moored Acoustic Doppler Current Profiler. Results indicate the good potential of satellite altimetry to retrieve dynamic features over the area. However, X-TRACK shows a more homogenous data coverage than AVISO, with longer time series in the 50 km coastal band. The seasonal evolution of the surface circulation is therefore analyzed by conjointly using X-TRACK data and remotely sensed sea surface temperature observations. This combined data set clearly depicts different current regimes and bifurcations, which allows us to propose a new seasonal circulation scheme for the central Mediterranean. The analysis shows variations of the path and temporal behavior of the main circulation features: the Atlantic Tunisian Current, the Atlantic Ionian Stream, the Atlantic Libyan Current, and the Sidra Gyre. The resulting bifurcating veins of these currents are also discussed, and a new current branch is observed for the first time.
Energy Technology Data Exchange (ETDEWEB)
Moukalled, F.; Darwish, M. [American Univ. of Beirut (Lebanon)
1997-01-01
The bounded skew central difference scheme (NVF SCDS) is used to study numerically the combined effect of vertical ({epsilon}{sub y}) and horizontal ({epsilon}{sub x}) eccentricities on natural convection in an annulus between a heated horizontal cylinder and its square enclosure. Four Rayleigh numbers (Ra = 10{sup 3}, 10{sup 4}, 10{sup 5}, and 10{sup 6}), three aspect ratios (R/L = 0.1, 0.2, and 0.3), and eccentricity values ranging from {minus}0.3 to 0.3 are considered. At constant enclosure aspect ratio, the total heat transfer increases with increasing Rayleigh number. For constant Rayleigh-number values, convection contribution to total heat transfer decreases with increasing values of R/L. For conduction-dominated flows, heat transfer increases with increasing {vert_bar}{epsilon}{sub y}{vert_bar} and/or {vert_bar}{epsilon}{sub x}{vert_bar}. For convection-dominated flows, heat transfer increases with decreasing {epsilon}{sub y} for {epsilon}{sub y} < 0, decreases with increasing {epsilon}{sub y} for {epsilon}{sub y} > 0, and decreases with decreasing {epsilon}{sub x} for {epsilon}{sub x} < 0. For the case when conduction and convection are of equal importance, there is a critical {epsilon}{sub x} for which the total heat transfer is minimum.
Improved Fast Centralized Retransmission Scheme for High-Layer Functional Split in 5G Network
Xu, Sen; Hou, Meng; Fu, Yu; Bian, Honglian; Gao, Cheng
2018-01-01
In order to satisfy the varied 5G critical requirements and the virtualization of the RAN hardware, a two-level architecture for 5G RAN has been studied in 3GPP 5G SI stage. The performance of the PDCP-RLC split option and intra-RLC split option, two mainly concerned options for high layer functional split, exist an ongoing debate. This paper firstly gives an overview of CU-DU split study work in 3GPP. By the comparison of implementation complexity, the standardization impact and system performance, our evaluation result shows the PDCP-RLC split Option outperforms the intra-RLC split option. Aiming to how to reduce the retransmission delay during the intra-CU inter-DU handover, the mainly drawback of PDCP-RLC split option, this paper proposes an improved fast centralized retransmission solution with a low implementation complexity. Finally, system level simulations show that the PDCP-RLC split option with the proposed scheme can significantly improve the UE’s experience.
Directory of Open Access Journals (Sweden)
Vulule John M
2006-06-01
Full Text Available Abstract Background Control of the Anopheline mosquito vectors of malaria by use of insecticides has been shown to impact on both morbidity and mortality due to this disease. Evidence of insecticide resistance in different settings necessitates surveillance studies to allow prompt detection of resistance should it arise and thus enable its management. Possible resistance by Anopheles arabiensis mosquitoes from Mwea rice irrigation scheme in Central Kenya to insecticides in the four classes of insecticides approved by WHO for indoor residual spraying was investigated. Methods Susceptibility to DDT (an organochlorine, fenitrothion (an organophosphate, bendiocarb (a carbamate, lambdacyhalothrin and permethrin (both pyrethroids was tested using standard WHO diagnostic bioassay kits. Bioassays were performed on non-blood fed mosquitoes one- to three-day old. Knockdown was recorded every 10 min and mortality 24 h post-exposure was noted. Results Mortality 24 h post-exposure was 100% for all insecticides except for lambdacyhalothrin, which averaged 99.46%. Knockdown rates at 10 min intervals were not significantly different between the Mwea population and the susceptible KISUMU strain of Anopheles gambiae sensu stricto control. The KDT50 and KDT95 values for the Mwea population were either lower than those for the control or higher by factors of no more than 2 for most comparisons and compared well with those of An. gambiae sensu lato categorized as susceptible in other studies. Conclusion These results suggest that the Mwea population of An. arabiensis is susceptible to all the insecticides tested. This implies that vector control measures employing any of these insecticides would not be hampered by resistance.
Prasetyo, E.; Ekowati, T.; Roessali, W.; Gayatri, S.
2018-02-01
The aims of study were: (i) identify of beef cattle fattening credit scheme, (ii) calculating and analyze of beef cattle farmers’ income, (iii) analyze of factors influencing beef cattle credit scheme towards farmer’s income. The research was held in five regencies in Central Java Province. Beef cattle fattening farm was standardized as an elementary unit. Survey method was used, while Two Stage Cluster Purposive Sampling was used for determining of sample. Data were analyzed using statistical method of quantitative descriptive and inferential statistics in term of income analysis and multiple linear regression models. The result showed that farmers used their own capital to run the farm. The average amount was IDR 10,769,871. Kredit Ketahanan Pangan dan Energi was credit scheme which was dominantly access by farmers. The average credit was IDR 23,312,200/farmer with rate of credit equal to 6.46%, the time of credit returning equal to 24.60 monthand the prediction of average collateral equal to IDR 35,800,00. The average of farmers’ income was IDR 4,361,611.60/2.96 head of beef cattle/fattening period. If the labour cost did not calculate as a cost production, hence the farmer’ income was IDR 7,608,630.41 or in other word the farmer’ income increase 74.44%. Factors of credit scheme which partially significant influence to the farmers’ income were number of own capital usage and value of credit collateral. Meanwhile, name of credit scheme, financing institution as a creditor, amount of credit, rate of credit scheme and time of returning credit were not significantly influence towards farmers’ income.
Japan's ODA assistance scheme and Central Asian engagement: Determinants, trends, expectations
Directory of Open Access Journals (Sweden)
Timur Dadabaev
2016-01-01
The Japan-supported initiatives of recent years tend to favor more pragmatic cooperation schemes. As is exemplified by water-related assistance in Uzbekistan and support for local capacity building in Kyrgyzstan, Japanese assistance of a more focused character can better contribute to development both in these societies and in the region in general. These types of initiatives can successfully complement government-to-government assistance schemes and Japanese investments into large scale projects. The focus on local communities will also ensure that beneficiaries of the Japanese assistance projects will include not only governmental institutions but also the general public at large.
Kibret, Solomon; Alemu, Yihenew; Boelee, Eline; Tekie, Habte; Alemu, Dawit; Petros, Beyene
2010-01-01
To assess the impact of a small-scale irrigation scheme in Ziway area, a semi-arid area in the Central Ethiopian Rift Valley, on malaria transmission. Parasitological, entomological and socio-economic studies were conducted in a village with and a village without irrigation. Blood smear samples were taken from individuals during the dry and wet seasons of 2005/2006. Socio-economic data were collected from household heads and key agricultural and health informants through interviews and questionnaires. Larval and adult mosquitoes were sampled during the dry and short wet seasons of 2006. Female anopheline mosquitoes were tested by enzyme-linked immunosorbent assay for blood meal sources and sporozoite infections. Malaria prevalence was higher in the irrigated village (19%, P year-round source reduction by using proper irrigation water management, coupled with health education, needs to be incorporated into the existing malaria control strategies.
Weng, Sheng; Chen, Xu; Xu, Xiaoyun; Wong, Kelvin K.; Wong, Stephen T. C.
2016-01-01
In coherent anti-Stokes Raman scattering (CARS) and second harmonic generation (SHG) imaging, backward and forward generated photons exhibit different image patterns and thus capture salient intrinsic information of tissues from different perspectives. However, they are often mixed in collection using traditional image acquisition methods and thus are hard to interpret. We developed a multimodal scheme using a single central fiber and multimode fiber bundle to simultaneously collect and differentiate images formed by these two types of photons and evaluated the scheme in an endomicroscopy prototype. The ratio of these photons collected was calculated for the characterization of tissue regions with strong or weak epi-photon generation while different image patterns of these photons at different tissue depths were revealed. This scheme provides a new approach to extract and integrate information captured by backward and forward generated photons in dual CARS/SHG imaging synergistically for biomedical applications. PMID:27375938
A nonconforming scheme for non-Fickian flow in porous media.
Wang, Peizhen; Jiang, Liying; Chen, Shaochun
2017-01-01
In this paper, we construct a semi-discrete scheme and a fully discrete scheme using the Wilson nonconforming element for the parabolic integro-differential equation arising in modeling the non-Fickian flow in porous media by the interior penalty method. Without using the conventional elliptic projection, which was an indispensable tool in the convergence analysis of finite element methods in previous literature, we get an optimal error estimate which is only determined by the interpolation error. Finally, we give some numerical experiments to show the efficiency of the method.
A nonconforming scheme for non-Fickian flow in porous media
Directory of Open Access Journals (Sweden)
Peizhen Wang
2017-06-01
Full Text Available Abstract In this paper, we construct a semi-discrete scheme and a fully discrete scheme using the Wilson nonconforming element for the parabolic integro-differential equation arising in modeling the non-Fickian flow in porous media by the interior penalty method. Without using the conventional elliptic projection, which was an indispensable tool in the convergence analysis of finite element methods in previous literature, we get an optimal error estimate which is only determined by the interpolation error. Finally, we give some numerical experiments to show the efficiency of the method.
Directory of Open Access Journals (Sweden)
Jacob Benjamin
2006-11-01
Full Text Available Abstract Background The survivorship and distribution of Anopheles arabiensis larvae and pupae was examined in a rice agro-ecosystem in Mwea Irrigation Scheme, central Kenya, from August 2005 to April 2006, prior to implementation of larval control programme. Methods Horizontal life tables were constructed for immatures in semi-field condition. The time spent in the various immature stages was determined and survival established. Vertical life tables were obtained from five paddies sampled by standard dipping technique. Results Pre-adult developmental time for An. arabiensis in the trays in the experimental set up in the screen house was 11.85 days from eclosion to emergence. The mean duration of each instar stage was estimated to be 1.40 days for first instars, 2.90 days for second instars, 1.85 days for third instars, 3.80 days for fourth instars and 1.90 days for pupae. A total of 590 individuals emerged into adults, giving an overall survivorship from L1 to adult emergence of 69.4%. A total of 4,956 An. arabiensis immatures were collected in 1,400 dips throughout the sampling period. Of these, 55.9% were collected during the tillering stage, 42.5% during the transplanting period and 1.6% during the land preparation stage. There was a significant difference in the An. arabiensis larval densities among the five stages. Also there was significant variation in immature stage composition for each day's collection in each paddy. These results indicate that the survival of the immatures was higher in some paddies than others. The mortality rate during the transplanting was 99.9% and at tillering was 96.6%, while the overall mortality was 98.3%. Conclusion The survival of An. arabiensis immatures was better during the tillering stage of rice growth. Further the survival of immatures in rice fields is influenced by the rice agronomic activities including addition of nitrogenous fertilizers and pesticides. For effective integrated vector management
Impact of insects on multiple-use values of north-central forests: an experimental rating scheme.
Norton D. Addy; Harold O. Batzer; William J. Mattson; William E. Miller
1971-01-01
Ranking or assigning priorities to problems is an essential step in research problem selection. Up to now, no rigorous basis for ranking forest insects has been available. We evaluate and rank forest insects with a systematic numerical scheme that considers insect impact on the multiple-use values of timber, wildlife, recreation, and water. The result is a better...
DEFF Research Database (Denmark)
Kornum, Birgitte Rahbek; Licht, Cecilie Löe; Weikop, Pia
2006-01-01
, no studies have systematically examined and compared different approaches. The present work combines quantitative and qualitative measurements and compares six different treatment schemes for 5-HT depletion. Treatment outcome was evaluated by HPLC measurements of 5-HT and 5-HIAA concentrations, and by 5-HT...... a different pattern with 5-HT distributed in several brain regions....
Numerical Simulations of Stably Stratified Fluid Flow Using Compact Finite-Difference Schemes
Bodnár, T.; Fraunié, Ph.; Kozel, K.
2010-09-01
The aim of this paper is to present the class of high order compact schemes in the context of numerical simulation of stratified flow. The numerical schemes presented here are based on the approach outlined in Lele [1]. The numerical model presented in this contribution is based on the solution of the Boussinesq approximation by a finite-difference scheme. The numerical scheme itself follows the principle of semi-discretization, with high order compact discretization in space, while the time integration is carried out by suitable Runge-Kutta time-stepping scheme. In the case presented here the steady flow was considered and thus the artificial compressibility method was used to resolve the pressure from the modified continuity equation. The test case used to demonstrate the capabilities of the selected model consists of the flow of stably stratified fluid over low, smooth hill.
DEFF Research Database (Denmark)
van Leeuwen, Theo
2013-01-01
This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....
A mixed mid-point Runge-Kutta like scheme for the integration of Landau-Lifshitz equation
Rahim, Arbab; Ragusa, Carlo; Jan, Bilal; Khan, Omar
2014-05-01
In this paper, a novel numerical time-stepping scheme for the solution of the dynamic Landau-Lifshitz equation of micromagnetics is introduced. The equation is a non-linear problem, and is traditionally solved using semi-discretization techniques. However, these techniques corrupt some intrinsic properties of the Landau-Lifshitz (LL) dynamics such as the conservation of magnetization magnitude in time. The proposed approach uses a mixed mid-point Runge-Kutta like algorithm which satisfies LL dynamic properties for time-steps up to 1.25 ps. The accuracy of the proposed scheme has been tested and verified using μmag Standard Problem 4 against popular micromagnetic simulation software for different time-steps and cell sizes.
J.K. Hoogland (Jiri); C.D.D. Neumann
2000-01-01
textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing
Tillasman, N. S.; Saragih, R. H.; Umar, N.
2018-03-01
Sepsis is a severe bacterial infection whose treatment still varies in preference. However, for more than 60 years, antibiotics have been regarded as the panacea, as long as they are used wisely and timely. Antibiotic resistance has escalated in recent years, resulting in an accelerating global health security emergency, that is rapidly outpacing available treatment options. In January 2014, the new mandatory health insurance scheme (JKN) was introduced, whose treatments must comply with National Formulary (FORNAS) policy. We aimed to systematically review the prevalence of antibiotic resistance to FORNAS policy’s preferential treatments in adult septic patients who had been in the non-surgical wards. Based on an overall view, 76 out of 90 kinds of antibiotics which had undergone antibiotic susceptibility test (AST) had alarming resistance rate and preferential antibiotics in the current JKN scheme may have become ineffective.
Spectral scheme for spacetime physics
International Nuclear Information System (INIS)
Seriu, Masafumi
2002-01-01
Based on the spectral representation of spatial geometry, we construct an analysis scheme for spacetime physics and cosmology, which enables us to compare two or more universes with each other. In this scheme the spectral distance plays a central role, which is the measure of closeness between two geometries defined in terms of the spectra. We apply this scheme for analyzing the averaging problem in cosmology; we explicitly investigate the time evolution of the spectra, distance between two nearby spatial geometries, simulating the relation between the real Universe and its model. We then formulate the criteria for a model to be a suitable one
Ginsburg, Shoshana B; Viswanath, Satish E; Bloch, B Nicolas; Rofsky, Neil M; Genega, Elizabeth M; Lenkinski, Robert E; Madabhushi, Anant
2015-05-01
To identify computer-extracted features for central gland and peripheral zone prostate cancer localization on multiparametric magnetic resonance imaging (MRI). Preoperative T2-weighted (T2w), diffusion-weighted imaging (DWI), and dynamic contrast-enhanced (DCE) MRI were acquired from 23 men with confirmed prostate cancer. Following radical prostatectomy, the cancer extent was delineated by a pathologist on ex vivo histology and mapped to MRI by nonlinear registration of histology and corresponding MRI slices. In all, 244 computer-extracted features were extracted from MRI, and principal component analysis (PCA) was employed to reduce the data dimensionality so that a generalizable classifier could be constructed. A novel variable importance on projection (VIP) measure for PCA (PCA-VIP) was leveraged to identify computer-extracted MRI features that discriminate between cancer and normal prostate, and these features were used to construct classifiers for cancer localization. Classifiers using features selected by PCA-VIP yielded an area under the curve (AUC) of 0.79 and 0.85 for peripheral zone and central gland tumors, respectively. For tumor localization in the central gland, T2w, DCE, and DWI MRI features contributed 71.6%, 18.1%, and 10.2%, respectively; for peripheral zone tumors T2w, DCE, and DWI MRI contributed 29.6%, 21.7%, and 48.7%, respectively. PCA-VIP identified relatively stable subsets of MRI features that performed well in localizing prostate cancer on MRI. © 2014 Wiley Periodicals, Inc.
Scheme Program Documentation Tools
DEFF Research Database (Denmark)
Nørmark, Kurt
2004-01-01
This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....
Additive operator-difference schemes splitting schemes
Vabishchevich, Petr N
2013-01-01
Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy
On Darboux-integrable semi-discrete chains
International Nuclear Information System (INIS)
Habibullin, Ismagil; Sakieva, Alfia; Zheltukhina, Natalya
2010-01-01
A differential-difference equation d/dx t (n+1,x) = f(x,t(n,x),t(n+1,x),d/dx t (n,x)) with unknown t(n, x) depending on the continuous and discrete variables x and n is studied. We call an equation of such kind Darboux integrable if there exist two functions (called integrals) F and I of a finite number of dynamical variables such that D x F = 0 and DI = I, where D x is the operator of total differentiation with respect to x and D is the shift operator: Dp(n) = p(n + 1). It is proved that the integrals can be brought to some canonical form. A method of construction of an explicit formula for a general solution to Darboux-integrable chains is discussed and such solutions are found for a class of chains.
A New Linearized Crank-Nicolson Mixed Element Scheme for the Extended Fisher-Kolmogorov Equation
Wang, Jinfeng; Li, Hong; He, Siriguleng; Gao, Wei
2013-01-01
We present a new mixed finite element method for solving the extended Fisher-Kolmogorov (EFK) equation. We first decompose the EFK equation as the two second-order equations, then deal with a second-order equation employing finite element method, and handle the other second-order equation using a new mixed finite element method. In the new mixed finite element method, the gradient ∇u belongs to the weaker (L 2(Ω))2 space taking the place of the classical H(div; Ω) space. We prove some a priori bounds for the solution for semidiscrete scheme and derive a fully discrete mixed scheme based on a linearized Crank-Nicolson method. At the same time, we get the optimal a priori error estimates in L 2 and H 1-norm for both the scalar unknown u and the diffusion term w = −Δu and a priori error estimates in (L 2)2-norm for its gradient χ = ∇u for both semi-discrete and fully discrete schemes. PMID:23864831
International Nuclear Information System (INIS)
Hermann, Hauke; Cludius, Johanna
2014-02-01
Both Germany and the European Union have set themselves targets for the reduction of greenhouse gas (GHG) emissions. The EU was the forerunner in 2008 when it adopted the Climate and Energy package and set a target of reducing GHG emissions by 20 % by 2020 compared to 1990. Two years later, Germany adopted a range of national GHG targets in the context of the German government's Energy Concept. This includes a 40% emissions reduction target to be met by 2020. One of the main instruments for achieving GHG emissions reduction targets is the EU Emissions Trading Scheme (EU ETS), which covers all large industrial and combustion installations in Europe. According to the agreement made in 2008 (Climate and Energy Package), the effort to achieve the EU's 20 % reduction target by 2020 was split between the ETS sector (2/3 of the reduction effort, representing a 21 % reduction in GHG emissions for installations covered under the ETS compared to 2005) and the non-ETS sector (1/3 of the reduction effort, representing a 10 % reduction compared to 2005). Logically, GHG emissions reductions occurring in German ETS installations count both towards the EU and the national target. This research project has been commissioned to analyse whether the ETS in its cur-rent design can contribute its fair share in efforts to meet the national emissions reduc-tion target. This question is particularly relevant in light of the following considerations: - The new German Coalition Agreement, signed in December 2013, reiterated the national target of a 40 % reduction of GHG emissions by 2020 compared to 1990 levels. - At the same time, the new Coalition Agreement stated that changes to the ETS are only to be considered if the EU GHG emissions reduction target will not be met. - There is a surplus of CO2 allowances on the ETS market, which undermines the credibility of the instrument as well as the integrity of the emissions reduction tar-gets (both European and national). At the same time, the
Tissue engineering scheming by artificial intelligence.
Xu, J; Ge, H; Zhou, X; Yang, D
2005-01-01
Tissue engineers are often confused when seeking the most effective, economical and secure scheme for tissue engineering. The aim of this study is to generate tissue engineering schemes with artificial intelligence instead of human intelligence. The experimental data of tissue engineered cartilage were integrated and standardized with a centralized database, and a scheme engine was developed using artificial intelligent methods (artificial neural networks and decision trees). The scheme engine was trained with existing cases in the database, and then was used to generate tissue engineering schemes for new experimental animals. Following the schemes generated by the artificial intelligent system, we cured 18 of the 20 experimental animals. In conclusion, artificial intelligence is a powerful method for decision making in the tissue engineering realm.
de Bont, Chris
2018-01-01
This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2001-01-01
to carry out a campaign targeted at this segment. The awareness percentage is already 92 % and 67% of the respondents believe they know the meaning of the scheme. But it stands to reason to study whether the respondents actually know what the labelling scheme stands for or if they just think they do...
Directory of Open Access Journals (Sweden)
R. Sitharthan
2016-09-01
Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.
Threshold Signature Schemes Application
Directory of Open Access Journals (Sweden)
Anastasiya Victorovna Beresneva
2015-10-01
Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.
Energy Technology Data Exchange (ETDEWEB)
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Liang, D.; Mol, A.P.J.
2013-01-01
Payment for environmental services (PES) schemes are increasingly being introduced in developed and developing countries for the ecological conservation of forests also. Such payment schemes resemble a new mode of forest governance labelled political modernization, in which centralized and
International Nuclear Information System (INIS)
2002-04-01
This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)
Energy Technology Data Exchange (ETDEWEB)
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
Energy Technology Data Exchange (ETDEWEB)
Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C., E-mail: csun@lbl.gov
2014-12-21
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
Indian Academy of Sciences (India)
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...
Link Monotonic Allocation Schemes
Slikker, M.
1999-01-01
A network is a graph where the nodes represent players and the links represent bilateral interaction between the players. A reward game assigns a value to every network on a fixed set of players. An allocation scheme specifies how to distribute the worth of every network among the players. This
Alternative health insurance schemes
DEFF Research Database (Denmark)
Keiding, Hans; Hansen, Bodil O.
2002-01-01
In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...
Indian Academy of Sciences (India)
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13 ... Author Affiliations. V Rajaraman1. IBM Professor of Information Technology JNCASR Bangalore 560 064, India.
DEFF Research Database (Denmark)
Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela
2013-01-01
of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...
Simple monotonic interpolation scheme
International Nuclear Information System (INIS)
Greene, N.M.
1980-01-01
A procedure for presenting tabular data, such as are contained in the ENDF/B files, that is simpler, more general, and potentially much more compact than the present schemes used with ENDF/B is presented. The method has been successfully used for Bondarenko interpolation in a module of the AMPX system. 1 figure, 1 table
Modern Schemes for Computation of Transonic Flows in Internal Aerodynamics
Directory of Open Access Journals (Sweden)
J. Fürst
2000-01-01
Full Text Available The work deals with numerical solution of steady transonic flows with applications in internal aerodynamics. The problems are described by the system of 2D or 3D Euler or Navier-Stokes equations. Our group developed during last years several central or upwind TVD finite volume methods for computation of transonic flows through a cascade or in a channel using grids of quadrilateral cells or triangular cells. We also developed other (non TVD schemes e.g. MacCormack scheme or several multistage Runge-Kutta finite volume schemes with applications of some acceleration techniques (multi-grid solution or hierarchical residual averaging. Our aim is to present some comparison of results of flows in internal aerodynamics using TVD schemes or other schemes. One can also compare the influence or artificial viscosity effects especially using TVD schemes.
The Performance-based Funding Scheme of Universities
Directory of Open Access Journals (Sweden)
Juha KETTUNEN
2016-05-01
Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Directory of Open Access Journals (Sweden)
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
Energy Technology Data Exchange (ETDEWEB)
Elliott, C.J.; Fisher, H.; Pepin, J. [Los Alamos National Lab., NM (United States); Gillmann, R. [Federal Highway Administration, Washington, DC (United States)
1996-07-01
Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.
Scalable Nonlinear Compact Schemes
Energy Technology Data Exchange (ETDEWEB)
Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)
2014-04-01
In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.
Quantum identification schemes with entanglements
International Nuclear Information System (INIS)
Mihara, Takashi
2002-01-01
We need secure identification schemes because many situations exist in which a person must be identified. In this paper, we propose three quantum identification schemes with entanglements. First, we propose a quantum one-time pad password scheme. In this scheme, entanglements play the role of a one-time pad password. Next, we propose a quantum identification scheme that requires a trusted authority. Finally, we propose a quantum message authentication scheme that is constructed by combining a different quantum cryptosystem with an ordinary authentication tag
Yasas, F M
1977-01-01
In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.
Bonus Schemes and Trading Activity
Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.
2013-01-01
Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock
International Nuclear Information System (INIS)
Grashilin, V.A.; Karyshev, Yu.Ya.
1982-01-01
A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given
Packet reversed packet combining scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2006-07-01
The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)
Cost-prioritized droop schemes for autonomous microgrids
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
centralized optimal dispatch control. To better adapt to this non-uniformity, an alternative viewpoint based on reducing the Total Generation Cost (TGC including fuel cost, emission penalty and other operational concerns) of the microgrid is discussed, from which two new cost-prioritized droop schemes...... are developed. The schemes operate by tuning the dispatch priorities of the DGs and curve shapes of their resulting active power versus frequency plots. Their effective reduction of TGC has been verified through simulation....
Cost-based droop scheme for DC microgrid
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang
2014-01-01
DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...... voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions....
Transmission usage cost allocation schemes
International Nuclear Information System (INIS)
Abou El Ela, A.A.; El-Sehiemy, R.A.
2009-01-01
This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)
Patrick Honohan
1987-01-01
A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...
Entropy conservative finite element schemes
Tadmor, E.
1986-01-01
The question of entropy stability for discrete approximations to hyperbolic systems of conservation laws is studied. The amount of numerical viscosity present in such schemes is quantified and related to their entropy stability by means of comparison. To this end, two main ingredients are used: entropy variables and the construction of certain entropy conservative schemes in terms of piecewise-linear finite element approximations. It is then shown that conservative schemes are entropy stable, if and (for three-point schemes) only if, they contain more numerical viscosity than the abovementioned entropy conservation ones.
DEFF Research Database (Denmark)
Rotbart, Noy Galil
in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...... evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related...
hybrid modulation scheme fo rid modulation scheme fo dulation ...
African Journals Online (AJOL)
eobe
This work proposes a switching technique for ca proposes a switching technique for ca. (SCSPWM) scheme is employed in the generation circulation schemes are presented for this concepts, it is now possible to generate equal ave pts, it is now possible to generate equal ave semiconductor switches. This results in equal ...
CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...
African Journals Online (AJOL)
The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give better results than Euler backward method and trapezoidal method near a singular point. KEY WORDS: backward differentiation scheme, collocation, initial value problems.
Nonoscillatory shock capturing scheme using flux limited dissipation
International Nuclear Information System (INIS)
Jameson, A.
1985-01-01
A method for modifying the third order dissipative terms by the introduction of flux limiters is proposed. The first order dissipative terms can then be eliminated entirely, and in the case of a scalar conservation law the scheme is converted into a total variation diminishing scheme provided that an appropriate value is chosen for the dissipative coefficient. Particular attention is given to: (1) the treatment of the scalar conservation law; (2) the treatment of the Euler equations for inviscid compressible flow; (3) the boundary conditions; and (4) multistage time stepping and multigrid schemes. Numerical results for transonic flows suggest that a central difference scheme augmented by flux limited dissipative terms can lead to an effective nonoscillatory shock capturing method. 20 references
Coordinated renewable energy support schemes
DEFF Research Database (Denmark)
Morthorst, P.E.; Jensen, S.G.
2006-01-01
This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...
International Nuclear Information System (INIS)
Geyer, P.; Proix, J.M.; Jayet-Gendrot, S.; Schoenberger, P.; Taheri, S.
1995-01-01
The study of cyclic elastoplastic constitutive law is, at the moment, focused on non proportional loadings, but for uniaxial loadings some problems remain, as for example the ability for a law to describe simultaneously ratcheting (constant increment of strain) in non symmetrical ones. We propose a law with a discrete memory variable, the plastic strain at the last unloading, and a ratchetting stress which, in addition to previous phenomena, describes the other hand the choice of all macroscopic variables is justified by a microscopic analysis. The extension to 3D situations of this law is proposed. The discrete nature of the memory leads to discontinuity problems for some loading paths, a modification is then proposed which uses a differential evolution law. For large enough uniaxial cycles, the uniaxial law is nevertheless recovered. An incremental form of he implicit evolution problem is given, and we describe the implementation of this model in the Code Aster a thermomechanical structural software using the f.e.m. developed at Electricite de France. For a 316 stainless steel we present comparisons between experiments and numerical results in uniaxial and biaxial ratchetting and non proportional strain controlled test (circular, square, stair loading). (authors). 13 refs., 10 figs
Relaxation schemes for Chebyshev spectral multigrid methods
Kang, Yimin; Fulton, Scott R.
1993-01-01
Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.
Good governance for pension schemes
Thornton, Paul
2011-01-01
Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.
A Novel Iris Segmentation Scheme
Directory of Open Access Journals (Sweden)
Chen-Chung Liu
2014-01-01
Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.
Numerical schemes for explosion hazards
International Nuclear Information System (INIS)
Therme, Nicolas
2015-01-01
In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so
Breeding schemes in reindeer husbandry
Directory of Open Access Journals (Sweden)
Lars Rönnegård
2003-04-01
Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.
Small-scale classification schemes
DEFF Research Database (Denmark)
Hertzum, Morten
2004-01-01
. While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements...
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik
2016-11-01
Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.
Frequency Stabilizing Scheme for a Danish Island Grid
DEFF Research Database (Denmark)
Cha, Seung-Tae; Wu, Qiuwei; Østergaard, Jacob
2012-01-01
This paper describes the development of frequency stabilizing control scheme for a small Danish island of Bornholm. The Bornholm power system is able to transit from interconnected operation with the Nordic power system to isolated islanding operation. During islanding operation the shedding...... with a battery energy storage system (BESS) has been proposed. The real-time models of distribution grids of Bornholm power system were used to carry out case studies to illustrate the performance of centralized load frequency control as well as coordinated control scheme. Case study results show...
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad
2012-09-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
A Randomized Central Limit Theorem
International Nuclear Information System (INIS)
Eliazar, Iddo; Klafter, Joseph
2010-01-01
The Central Limit Theorem (CLT), one of the most elemental pillars of Probability Theory and Statistical Physics, asserts that: the universal probability law of large aggregates of independent and identically distributed random summands with zero mean and finite variance, scaled by the square root of the aggregate-size (√(n)), is Gaussian. The scaling scheme of the CLT is deterministic and uniform - scaling all aggregate-summands by the common and deterministic factor √(n). This Letter considers scaling schemes which are stochastic and non-uniform, and presents a 'Randomized Central Limit Theorem' (RCLT): we establish a class of random scaling schemes which yields universal probability laws of large aggregates of independent and identically distributed random summands. The RCLT universal probability laws, in turn, are the one-sided and the symmetric Levy laws.
Studying ignition schemes on European laser facilities
Jacquemot, S.; Amiranoff, F.; Baton, S. D.; Chanteloup, J. C.; Labaune, C.; Koenig, M.; Michel, D. T.; Perez, F.; Schlenvoigt, H. P.; Canaud, B.; Cherfils Clérouin, C.; Debras, G.; Depierreux, S.; Ebrardt, J.; Juraszek, D.; Lafitte, S.; Loiseau, P.; Miquel, J. L.; Philippe, F.; Rousseaux, C.; Blanchot, N.; Edwards, C. B.; Norreys, P.; Atzeni, S.; Schiavi, A.; Breil, J.; Feugeas, J. L.; Hallo, L.; Lafon, M.; Ribeyre, X.; Santos, J. J.; Schurtz, G.; Tikhonchuk, V.; Debayle, A.; Honrubia, J. J.; Temporal, M.; Batani, D.; Davies, J. R.; Fiuza, F.; Fonseca, R. A.; Silva, L. O.; Gizzi, L. A.; Koester, P.; Labate, L.; Badziak, J.; Klimo, O.
2011-09-01
Demonstrating ignition and net energy gain in the near future on MJ-class laser facilities will be a major step towards determining the feasibility of Inertial Fusion Energy (IFE), in Europe as in the United States. The current status of the French Laser MégaJoule (LMJ) programme, from the laser facility construction to the indirectly driven central ignition target design, is presented, as well as validating experimental campaigns, conducted, as part of this programme, on various laser facilities. However, the viability of the IFE approach strongly depends on our ability to address the salient questions related to efficiency of the target design and laser driver performances. In the overall framework of the European HiPER project, two alternative schemes both relying on decoupling target compression and fuel heating—fast ignition (FI) and shock ignition (SI)—are currently considered. After a brief presentation of the HiPER project's objectives, FI and SI target designs are discussed. Theoretical analysis and 2D simulations will help to understand the unresolved key issues of the two schemes. Finally, the on-going European experimental effort to demonstrate their viability on currently operated laser facilities is described.
An intelligent robotics control scheme
Orlando, N. E.
1984-01-01
The problem of robot control is viewed at the level of communicating high-level commands produced by intelligent algorithms to the actuator/sensor controllers. Four topics are considered in the design of an integrated control and communications scheme for an intelligent robotic system: the use of abstraction spaces, hierarchical versus heterarchical control, distributed processing, and the interleaving of the steps of plan creation and plan execution. A scheme is presented for an n-level distributed hierarchical/heterarchical control system that effectively interleaves intelligent planning, execution, and sensory feedback. A three-level version of this scheme has been successfully implemented in the Intelligent Systems Research Lab at NASA Langley Research Center. This implementation forms the control structure for DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), a testbed system integrating AI software with robotics hardware.
One-qubit fingerprinting schemes
International Nuclear Information System (INIS)
Beaudrap, J. Niel de
2004-01-01
Fingerprinting is a technique in communication complexity in which two parties (Alice and Bob) with large data sets send short messages to a third party (a referee), who attempts to compute some function of the larger data sets. For the equality function, the referee attempts to determine whether Alice's data and Bob's data are the same. In this paper, we consider the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit (classically) or one qubit (in the quantum regime) messages to the referee for the equality problem. Restrictive bounds are demonstrated for the error probability of one-bit fingerprinting schemes, and show that it is easy to construct one-qubit fingerprinting schemes which can outperform any one-bit fingerprinting scheme. The author hopes that this analysis will provide results useful for performing physical experiments, which may help to advance implementations for more general quantum communication protocols
Modulation Schemes for Wireless Access
Directory of Open Access Journals (Sweden)
F. Vejrazka
2000-12-01
Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and ÃÂ€/4 differential quadrature phase shift keying (ÃÂ€/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of ÃÂ€/4-QPSK signal is considerably improved by appropriateprefiltering.
Electrical injection schemes for nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2013-01-01
injection schemes have been compared: vertical pi- n junction through a current post structure as in1 and lateral p-i-n junction with either uniform material as in2 or with a buried heterostructure (BH) as in3. To allow a direct comparison of the three schemes the same active material composition consisting......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...
Simple scheme for gauge mediation
International Nuclear Information System (INIS)
Murayama, Hitoshi; Nomura, Yasunori
2007-01-01
We present a simple scheme for constructing models that achieve successful gauge mediation of supersymmetry breaking. In addition to our previous work [H. Murayama and Y. Nomura, Phys. Rev. Lett. 98, 151803 (2007)] that proposed drastically simplified models using metastable vacua of supersymmetry breaking in vectorlike theories, we show there are many other successful models using various types of supersymmetry-breaking mechanisms that rely on enhanced low-energy U(1) R symmetries. In models where supersymmetry is broken by elementary singlets, one needs to assume U(1) R violating effects are accidentally small, while in models where composite fields break supersymmetry, emergence of approximate low-energy U(1) R symmetries can be understood simply on dimensional grounds. Even though the scheme still requires somewhat small parameters to sufficiently suppress gravity mediation, we discuss their possible origins due to dimensional transmutation. The scheme accommodates a wide range of the gravitino mass to avoid cosmological problems
Electrical Injection Schemes for Nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2014-01-01
Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....
Economic Droop Scheme for Decentralized Power Management in DC Microgrids
Directory of Open Access Journals (Sweden)
E. Alizadeh
2016-12-01
Full Text Available This paper proposes an autonomous and economic droop control scheme for DC microgrid application. In this method, a cost-effective power sharing technique among various types of DG units is properly adopted. The droop settings are determined based on an algorithm to individually manage the power management without any complicated optimization methods commonly applied in the centralized control method. In the proposed scheme, the system retains all the advantages of the traditional droop method while minimizes the generation costs of the DC microgrid. In the proposed method, all DGs are classified in a sorting rule based on their total generation cost and the reference voltage of their droop equations is then determined. The proposed scheme is applied to a typical DC microgrid consisting of four different types of DGs and a controllable load. The simulation results are presented to verify the effectiveness of the proposed method using MATLAB/SIMULINK software.
Inverse scattering scheme for the Dirac equation at fixed energy
International Nuclear Information System (INIS)
Leeb, H.; Lehninger, H.; Schilder, C.
2001-01-01
Full text: Based on the concept of generalized transformation operators a new hierarchy of Dirac equations with spherical symmetric scalar and fourth component vector potentials is presented. Within this hierarchy closed form expressions for the solutions, the potentials and the S-matrix can be given in terms of solutions of the original Dirac equation. Using these transformations an inverse scattering scheme has been constructed for the Dirac equation which is the analog to the rational scheme in the non-relativistic case. The given method provides for the first time an inversion scheme with closed form expressions for the S-matrix for non-relativistic scattering problems with central and spin-orbit potentials. (author)
Efficient adaptive fuzzy control scheme
Papp, Z.; Driessen, B.J.F.
1995-01-01
The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy
New practicable Siberian Snake schemes
International Nuclear Information System (INIS)
Steffen, K.
1983-07-01
Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)
Homogenization scheme for acoustic metamaterials
Yang, Min
2014-02-26
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
Chertock, Alina; Cui, Shumo; Kurganov, Alexander; Özcan, Şeyma Nur; Tadmor, Eitan
2018-04-01
We develop a second-order well-balanced central-upwind scheme for the compressible Euler equations with gravitational source term. Here, we advocate a new paradigm based on a purely conservative reformulation of the equations using global fluxes. The proposed scheme is capable of exactly preserving steady-state solutions expressed in terms of a nonlocal equilibrium variable. A crucial step in the construction of the second-order scheme is a well-balanced piecewise linear reconstruction of equilibrium variables combined with a well-balanced central-upwind evolution in time, which is adapted to reduce the amount of numerical viscosity when the flow is at (near) steady-state regime. We show the performance of our newly developed central-upwind scheme and demonstrate importance of perfect balance between the fluxes and gravitational forces in a series of one- and two-dimensional examples.
Design and simulation of advanced fault tolerant flight control schemes
Gururajan, Srikanth
This research effort describes the design and simulation of a distributed Neural Network (NN) based fault tolerant flight control scheme and the interface of the scheme within a simulation/visualization environment. The goal of the fault tolerant flight control scheme is to recover an aircraft from failures to its sensors or actuators. A commercially available simulation package, Aviator Visual Design Simulator (AVDS), was used for the purpose of simulation and visualization of the aircraft dynamics and the performance of the control schemes. For the purpose of the sensor failure detection, identification and accommodation (SFDIA) task, it is assumed that the pitch, roll and yaw rate gyros onboard are without physical redundancy. The task is accomplished through the use of a Main Neural Network (MNN) and a set of three De-Centralized Neural Networks (DNNs), providing analytical redundancy for the pitch, roll and yaw gyros. The purpose of the MNN is to detect a sensor failure while the purpose of the DNNs is to identify the failed sensor and then to provide failure accommodation. The actuator failure detection, identification and accommodation (AFDIA) scheme also features the MNN, for detection of actuator failures, along with three Neural Network Controllers (NNCs) for providing the compensating control surface deflections to neutralize the failure induced pitching, rolling and yawing moments. All NNs continue to train on-line, in addition to an offline trained baseline network structure, using the Extended Back-Propagation Algorithm (EBPA), with the flight data provided by the AVDS simulation package. The above mentioned adaptive flight control schemes have been traditionally implemented sequentially on a single computer. This research addresses the implementation of these fault tolerant flight control schemes on parallel and distributed computer architectures, using Berkeley Software Distribution (BSD) sockets and Message Passing Interface (MPI) for inter
Project financing renewable energy schemes
International Nuclear Information System (INIS)
Brandler, A.
1993-01-01
The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)
Finite volume schemes for Vlasov
Directory of Open Access Journals (Sweden)
Crouseilles Nicolas
2013-01-01
Full Text Available We present finite volume schemes for the numerical approximation of the one-dimensional Vlasov-Poisson equation (FOV CEMRACS 2011 project. Stability analysis is performed for the linear advection and links with semi-Lagrangian schemes are made. Finally, numerical results enable to compare the different methods using classical plasma test cases. Des schémas de type volumes finis sont étudiés ici pour l’approximation de l’équation de Vlasov-Poisson (projet FOV, CEMRACS 2011. Une analyse de stabilité est effectuée dans le cas de l’advection linéaire et plusieurs liens sont faits entre les méthodes volumes finis et semi-Lagrangiennes. Enfin, les méthodes sont comparées sur des cas tests académiques de la physique des plasmas.
Distance labeling schemes for trees
DEFF Research Database (Denmark)
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...
New schemes for particle accelerators
International Nuclear Information System (INIS)
Nishida, Y.
1985-01-01
In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here
An Arbitrated Quantum Signature Scheme without Entanglement"*
International Nuclear Information System (INIS)
Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun
2017-01-01
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)
An Arbitrated Quantum Signature Scheme without Entanglement*
Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun
2017-09-01
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.
Analogical Argument Schemes and Complex Argument Structure
Directory of Open Access Journals (Sweden)
Andre Juthe
2015-09-01
Full Text Available This paper addresses several issues in argumentation theory. The over-arching goal is to discuss how a theory of analogical argument schemes fits the pragma-dialectical theory of argument schemes and argument structures, and how one should properly reconstruct both single and complex argumentation by analogy. I also propose a unified model that explains how formal valid deductive argumentation relates to argument schemes in general and to analogical argument schemes in particular. The model suggests “scheme-specific-validity” i.e. that there are contrasting species of validity for each type of argument scheme that derive from one generic conception of validity.
Decoupling schemes for the SSC Collider
International Nuclear Information System (INIS)
Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.
1993-05-01
A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper
Decoupling schemes for the SCC Collider
International Nuclear Information System (INIS)
Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.
1993-01-01
A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper
TVD schemes for open channel flow
Delis, A. I.; Skeels, C. P.
1998-04-01
The Saint Venant equations for modelling flow in open channels are solved in this paper, using a variety of total variation diminishing (TVD) schemes. The performance of second- and third-order-accurate TVD schemes is investigated for the computation of free-surface flows, in predicting dam-breaks and extreme flow conditions created by the river bed topography. Convergence of the schemes is quantified by comparing error norms between subsequent iterations. Automatically calculated time steps and entropy corrections allow high CFL numbers and smooth transition between different conditions. In order to compare different approaches with TVD schemes, the most accurate of each type was chosen. All four schemes chosen proved acceptably accurate. However, there are important differences between the schemes in the occurrence of clipping, overshooting and oscillating behaviour and in the highest CFL numbers allowed by a scheme. These variations in behaviour stem from the different orders and inherent properties of the four schemes.
Algebraic K-theory of generalized schemes
DEFF Research Database (Denmark)
Anevski, Stella Victoria Desiree
Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry and ge...
Algebraic K-theory of generalized schemes
DEFF Research Database (Denmark)
Anevski, Stella Victoria Desiree
Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...
MIRD radionuclide data and decay schemes
Eckerman, Keith F
2007-01-01
For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.
Secret Sharing Schemes and Advanced Encryption Standard
2015-09-01
Secret Sharing Scheme, they have only been better under certain parameters; there is always a trade -off with some parameter of the scheme. xiv...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SECRET SHARING SCHEMES AND ADVANCED ENCRYPTION STANDARD by Bing Yong Lim September 2015 Thesis...AND SUBTITLE SECRET SHARING SCHEMES AND ADVANCED ENCRYPTION STANDARD 5. FUNDING NUMBERS 6. AUTHOR(S) Lim, Bin Yong 7. PERFORMING ORGANIZATION NAME(S
Tightly Secure Signatures From Lossy Identification Schemes
Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi
2015-01-01
International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...
THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES
African Journals Online (AJOL)
PUBLICATIONS1
and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...
The Original Management Incentive Schemes
Richard T. Holden
2005-01-01
During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...
The mathematics of Ponzi schemes
Artzrouni, Marc
2009-01-01
A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...
Adaptive Optics Metrics & QC Scheme
Girard, Julien H.
2017-09-01
"There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."
Network Regulation and Support Schemes
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed-in...... tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators...
REMINDER: Saved Leave Scheme (SLS)
2003-01-01
Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...
Arbitrated quantum signature scheme using Bell states
International Nuclear Information System (INIS)
Li Qin; Chan, W. H.; Long Dongyang
2009-01-01
In an arbitrated quantum signature scheme, the signatory signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum signature scheme using two-particle entangled Bell states similar to the previous scheme using three-particle entangled Greenberger-Horne-Zeilinger states [G. H. Zeng and C. H. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed scheme can preserve the merits in the original scheme while providing a higher efficiency in transmission and reducing the complexity of implementation.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj
2015-11-01
In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.
Parham, D M
2005-01-01
Quality assurance plays a vital role in the healthcare profession and histopathologists play a central role in the diagnosis and treatment of disease. In the past these specialists have worked in isolation and quality assurance of their work has been difficult. In recent years this has changed with the introduction of External Quality Assurance slide schemes. This paper discusses how these schemes have evolved, the problems of standard setting and their validity as a measure of pathologists performance.
A comparative study of the active force control schemes applied to robot arm
International Nuclear Information System (INIS)
Musa Mailah; Hewit, J.R.
2000-01-01
In this paper, a comparative study of three different types of active force control (AFC) schemes applied to a robotic arm is described. The study particularly focuses on the techniques to compute the estimated inertia matrix (ΙΝ) of a robotic manipulator necessary for the execution of the AFC strategy since the computation of (ΙΝ) is the common central theme to all AFC-based schemes. The first of the three AFC schemes is based on the conventional method of obtaining (ΙΝ), the second uses artificial neural network while the third incorporates an iterative learning algorithm. The study also discusses the characteristics of the (ΙΝ) curves obtained, the trajectory track performance of the schemes and the effects of the modelled disturbances. The robustness of all the AFC schemes are also ascertained in the study. (Author)
Adaptive Numerical Dissipative Control in High Order Schemes for Multi-D Non-Ideal MHD
Yee, H. C.; Sjoegreen, B.
2004-01-01
The goal is to extend our adaptive numerical dissipation control in high order filter schemes and our new divergence-free methods for ideal MHD to non-ideal MHD that include viscosity and resistivity. The key idea consists of automatic detection of different flow features as distinct sensors to signal the appropriate type and amount of numerical dissipation/filter where needed and leave the rest of the region free of numerical dissipation contamination. These scheme-independent detectors are capable of distinguishing shocks/shears, flame sheets, turbulent fluctuations and spurious high-frequency oscillations. The detection algorithm is based on an artificial compression method (ACM) (for shocks/shears), and redundant multi-resolution wavelets (WAV) (for the above types of flow feature). These filter approaches also provide a natural and efficient way for the minimization of Div(B) numerical error. The filter scheme consists of spatially sixth order or higher non-dissipative spatial difference operators as the base scheme for the inviscid flux derivatives. If necessary, a small amount of high order linear dissipation is used to remove spurious high frequency oscillations. For example, an eighth-order centered linear dissipation (AD8) might be included in conjunction with a spatially sixth-order base scheme. The inviscid difference operator is applied twice for the viscous flux derivatives. After the completion of a full time step of the base scheme step, the solution is adaptively filtered by the product of a 'flow detector' and the 'nonlinear dissipative portion' of a high-resolution shock-capturing scheme. In addition, the scheme independent wavelet flow detector can be used in conjunction with spatially compact, spectral or spectral element type of base schemes. The ACM and wavelet filter schemes using the dissipative portion of a second-order shock-capturing scheme with sixth-order spatial central base scheme for both the inviscid and viscous MHD flux
Construction of Low Dissipative High Order Well-Balanced Filter Schemes for Non-Equilibrium Flows
Wang, Wei; Yee, H. C.; Sjogreen, Bjorn; Magin, Thierry; Shu, Chi-Wang
2009-01-01
The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. [26] to a class of low dissipative high order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. The class of filter schemes developed by Yee et al. [30], Sjoegreen & Yee [24] and Yee & Sjoegreen [35] consist of two steps, a full time step of spatially high order non-dissipative base scheme and an adaptive nonlinear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e., choosing a well-balanced base scheme with a well-balanced filter (both with high order). A typical class of these schemes shown in this paper is the high order central difference schemes/predictor-corrector (PC) schemes with a high order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady state solutions exactly; it is able to capture small perturbations, e.g., turbulence fluctuations; it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.
Positivity-preserving space-time CE/SE scheme for high speed flows
Shen, Hua
2017-03-02
We develop a space-time conservation element and solution element (CE/SE) scheme using a simple slope limiter to preserve the positivity of the density and pressure in computations of inviscid and viscous high-speed flows. In general, the limiter works with all existing CE/SE schemes. Here, we test the limiter on a central Courant number insensitive (CNI) CE/SE scheme implemented on hybrid unstructured meshes. Numerical examples show that the proposed limiter preserves the positivity of the density and pressure without disrupting the conservation law; it also improves robustness without losing accuracy in solving high-speed flows.
Scheme of thinking quantum systems
International Nuclear Information System (INIS)
Yukalov, V I; Sornette, D
2009-01-01
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field
Support Schemes and Ownership Structures
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana
of the ongoing fuel cell based micro‐combined heat and power (mCHP) demonstration projects by addressing the socio‐economic and systems analyses perspectives of a large‐scale promotion scheme of fuel cells. This document constitutes the deliverable of Work Package 1 of the FC4Home project and provides......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... previous findings and provides a short “preview” of the quantitative analyses in subsequent Work Packages by giving some food for thought on the way....
Cost-based droop scheme with lower generation costs for microgrids
DEFF Research Database (Denmark)
Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
In an autonomous microgrid where centralized management and communication links are not viable, droop control has been the preferred scheme for power sharing among distributed generators (DGs). At present, although many droop variations have been proposed to achieve proportional power sharing based...... on the DG kVA ratings. Other operating characteristics like generation costs, efficiencies and emission penalties at different loadings have not been considered. This makes existing droop schemes not too well-suited for standalone microgrids without central management system, where different types of DGs...
On Optimal Designs of Some Censoring Schemes
Directory of Open Access Journals (Sweden)
Dr. Adnan Mohammad Awad
2016-03-01
Full Text Available The main objective of this paper is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models. In addition, the paper investigates four related issues namely; the effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.
How can conceptual schemes change teaching?
Wickman, Per-Olof
2012-03-01
Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.
Resonance ionization scheme development for europium
Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K
2017-01-01
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
Alternative schemes for the inertial fusion energy
Energy Technology Data Exchange (ETDEWEB)
Tikhonchuk, V.T. [Centre Lasers Intenses et Applications, University Bordeaux 1-CNRS-CEA, 33405, Talence (France); Mima, K., E-mail: tikhonchuk@celia.u-bordeaux1.fr [Institute of Laser Engineering, Osaka University, Osaka (Japan)
2011-10-15
The advanced target designs are requiring a lower laser energy for ignition and promising higher energy gains. Two approaches are under development within the European inertial fusion energy project HiPER: the fast ignition scheme with energetic electrons and the shock ignition scheme. The fundamental physical issues and major experimental works related to the alternative ignition schemes as well as the reactor designs are discussed.
Resonance ionization scheme development for europium
Energy Technology Data Exchange (ETDEWEB)
Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)
2017-11-15
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
Data mining for detecting Bitcoin Ponzi schemes
Bartoletti, Massimo; Pes, Barbara; Serusi, Sergio
2018-01-01
Soon after its introduction in 2009, Bitcoin has been adopted by cyber-criminals, which rely on its pseudonymity to implement virtually untraceable scams. One of the typical scams that operate on Bitcoin are the so-called Ponzi schemes. These are fraudulent investments which repay users with the funds invested by new users that join the scheme, and implode when it is no longer possible to find new investments. Despite being illegal in many countries, Ponzi schemes are now proliferating on Bit...
Comparing Security Notions of Secret Sharing Schemes
Directory of Open Access Journals (Sweden)
Songsong Dai
2015-03-01
Full Text Available Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes. Different to the entropies, Kolmogorov complexity was also defined and used in study the security of individual instances for secret sharing schemes. This paper is concerned with these security notions for secret sharing schemes defined by the variational measures, including Shannon entropy, guessing probability, min entropy and Kolmogorov complexity.
Quantum signature scheme for known quantum messages
International Nuclear Information System (INIS)
Kim, Taewan; Lee, Hyang-Sook
2015-01-01
When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)
A Spatial Domain Quantum Watermarking Scheme
International Nuclear Information System (INIS)
Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang
2016-01-01
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)
Improved Load Shedding Scheme considering Distributed Generation
DEFF Research Database (Denmark)
Das, Kaushik; Nitsas, Antonios; Altin, Müfit
2017-01-01
. These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...... of frequency response, amount of consumption and DG disconnected during load shedding....
Public Goods and Voting on Formal Sanction Schemes
DEFF Research Database (Denmark)
Putterman, Louis; Tyran, Jean-Robert; Kamei, Kenju
The burgeoning literature on the use of sanctions to support public goods provision has largely neglected the use of formal or centralized sanctions. We let subjects playing a linear public goods game vote on the parameters of a formal sanction scheme capable both of resolving and of exacerbating...... the free-rider problem, depending on parameter settings. Most groups quickly learned to choose parameters inducing efficient outcomes. But despite uniform money payoffs implying common interest in those parameters, voting patterns suggest significant influence of cooperative orientation, political...
Collection development at the NOAA Central Library
Quillen, Steve R.
1994-01-01
The National Oceanic and Atmospheric Administration (NOAA) Central Library collection, approximately one million volumes, incorporates the holdings of its predecessor agencies. Within the library, the collections are filed separately, based on their source and/or classification schemes. The NOAA Central Library provides a variety of services to users, ranging from quick reference and interlibrary loan to in-depth research and online data bases.
Mobile Machine for E-payment Scheme
Sattar J Aboud
2010-01-01
In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.
Sampling scheme optimization from hyperspectral data
Debba, P.
2006-01-01
This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized
A generalized scheme for designing multistable continuous ...
Indian Academy of Sciences (India)
In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...
Hybrid scheme for Brownian semistationary processes
DEFF Research Database (Denmark)
Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.
We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme is to ap...
Consolidation of the health insurance scheme
Association du personnel
2009-01-01
In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).
A hierarchical classification scheme of psoriasis images
DEFF Research Database (Denmark)
Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær
2003-01-01
A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...
Community healthcare financing scheme: findings among residents ...
African Journals Online (AJOL)
... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...
A generalized scheme for designing multistable continuous ...
Indian Academy of Sciences (India)
Abstract. In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two m- dimensional dynamical systems ...
A new third order finite volume weighted essentially non-oscillatory scheme on tetrahedral meshes
Zhu, Jun; Qiu, Jianxian
2017-11-01
In this paper a third order finite volume weighted essentially non-oscillatory scheme is designed for solving hyperbolic conservation laws on tetrahedral meshes. Comparing with other finite volume WENO schemes designed on tetrahedral meshes, the crucial advantages of such new WENO scheme are its simplicity and compactness with the application of only six unequal size spatial stencils for reconstructing unequal degree polynomials in the WENO type spatial procedures, and easy choice of the positive linear weights without considering the topology of the meshes. The original innovation of such scheme is to use a quadratic polynomial defined on a big central spatial stencil for obtaining third order numerical approximation at any points inside the target tetrahedral cell in smooth region and switch to at least one of five linear polynomials defined on small biased/central spatial stencils for sustaining sharp shock transitions and keeping essentially non-oscillatory property simultaneously. By performing such new procedures in spatial reconstructions and adopting a third order TVD Runge-Kutta time discretization method for solving the ordinary differential equation (ODE), the new scheme's memory occupancy is decreased and the computing efficiency is increased. So it is suitable for large scale engineering requirements on tetrahedral meshes. Some numerical results are provided to illustrate the good performance of such scheme.
Novel Noncommutative Cryptography Scheme Using Extra Special Group
Directory of Open Access Journals (Sweden)
Gautam Kumar
2017-01-01
Full Text Available Noncommutative cryptography (NCC is truly a fascinating area with great hope of advancing performance and security for high end applications. It provides a high level of safety measures. The basis of this group is established on the hidden subgroup or subfield problem (HSP. The major focus in this manuscript is to establish the cryptographic schemes on the extra special group (ESG. ESG is showing one of the most appropriate noncommutative platforms for the solution of an open problem. The working principle is based on the random polynomials chosen by the communicating parties to secure key exchange, encryption-decryption, and authentication schemes. This group supports Heisenberg, dihedral order, and quaternion group. Further, this is enhanced from the general group elements to equivalent ring elements, known by the monomials generations for the cryptographic schemes. In this regard, special or peculiar matrices show the potential advantages. The projected approach is exclusively based on the typical sparse matrices, and an analysis report is presented fulfilling the central cryptographic requirements. The order of this group is more challenging to assail like length based, automorphism, and brute-force attacks.
Labelling schemes: From a consumer perspective
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2000-01-01
Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...
International Nuclear Information System (INIS)
Bhunia, C.T.
2007-07-01
Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)
Second-order accurate kinetic schemes for the ultra-relativistic Euler equations
International Nuclear Information System (INIS)
Kunik, Matthias; Qamar, Shamsul; Warnecke, Gerald
2003-01-01
A second-order accurate kinetic scheme for the numerical solution of the relativistic Euler equations is presented. These equations describe the flow of a perfect fluid in terms of the particle density n, the spatial part of the four-velocity u and the pressure p. The kinetic scheme, is based on the well-known fact that the relativistic Euler equations are the moments of the relativistic Boltzmann equation of the kinetic theory of gases when the distribution function is a relativistic Maxwellian. The kinetic scheme consists of two phases, the convection phase (free-flight) and collision phase. The velocity distribution function at the end of the free-flight is the solution of the collisionless transport equation. The collision phase instantaneously relaxes the distribution to the local Maxwellian distribution. The fluid dynamic variables of density, velocity, and internal energy are obtained as moments of the velocity distribution function at the end of the free-flight phase. The scheme presented here is an explicit method and unconditionally stable. The conservation laws of mass, momentum and energy as well as the entropy inequality are everywhere exactly satisfied by the solution of the kinetic scheme. The scheme also satisfies positivity and L 1 -stability. The scheme can be easily made into a total variation diminishing method for the distribution function through a suitable choice of the interpolation strategy. In the numerical case studies the results obtained from the first- and second-order kinetic schemes are compared with the first- and second-order upwind and central schemes. We also calculate the experimental order of convergence and numerical L 1 -stability of the scheme for smooth initial data
An assessment of unstructured grid finite volume schemes for cold gas hypersonic flow calculations
Directory of Open Access Journals (Sweden)
João Luiz F. Azevedo
2009-06-01
Full Text Available A comparison of five different spatial discretization schemes is performed considering a typical high speed flow application. Flowfields are simulated using the 2-D Euler equations, discretized in a cell-centered finite volume procedure on unstructured triangular meshes. The algorithms studied include a central difference-type scheme, and 1st- and 2nd-order van Leer and Liou flux-vector splitting schemes. These methods are implemented in an efficient, edge-based, unstructured grid procedure which allows for adaptive mesh refinement based on flow property gradients. Details of the unstructured grid implementation of the methods are presented together with a discussion of the data structure and of the adaptive refinement strategy. The application of interest is the cold gas flow through a typical hypersonic inlet. Results for different entrance Mach numbers and mesh topologies are discussed in order to assess the comparative performance of the various spatial discretization schemes.
Costs and economic consequences of a help-at-home scheme for older people in England.
Bauer, Annette; Knapp, Martin; Wistow, Gerald; Perkins, Margaret; King, Derek; Iemmi, Valentina
2017-03-01
Solutions to support older people to live independently and reduce the cost of an ageing population are high on the political agenda of most developed countries. Help-at-home schemes offer a mix of community support with the aim to address a range of well-being needs. However, not much is currently known about the costs, outcomes and economic consequences of such schemes. Understanding their impact on individuals' well-being and the economic consequences for local and central government can contribute to decisions about sustainable long-term care financing. This article presents results from a mixed-methods study of a voluntary sector-provided help-at-home scheme in England for people of 55 years and older. The study followed a participatory approach, which involved staff and volunteers. Data were collected during 2012 and 2013. Social care-related quality of life was measured with the Adult Social Care Outcomes Toolkit for 24 service users (59% response rate) when they started using the scheme and 4-6 months later. A customised questionnaire that captured resource use and well-being information was sent to 1064 service users (63% response rate). The same tool was used in assessment with service users who started using the scheme between November 2012 and April 2013 (100% response rate). Costs of the scheme were established from local budget and activity data. The scheme was likely to achieve a mean net benefit of £1568 per person from a local government and National Health Service (NHS) perspective and £3766 from the perspective of the individual. An expenditure of £2851 per person accrued to central government for the additional redistribution of benefit payments to older people. This article highlights the potential contribution of voluntary sector-run help-at-home schemes to an affordable welfare system for ageing societies. © 2016 John Wiley & Sons Ltd.
Ponzi scheme diffusion in complex networks
Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue
2017-08-01
Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.
Optimal Face-Iris Multimodal Fusion Scheme
Directory of Open Access Journals (Sweden)
Omid Sharifi
2016-06-01
Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.
2002-01-01
The Central Solenoid (CS) is a single layer coil wound internally in a supporting cylinder housed in the cryostat of the Liquid Argon Calorimeter. It was successfully tested at Toshiba in December 2000 and was delivered to CERN in September 2001 ready for integration in the LAr Calorimeter in 2003. An intermediate test of the chimney and proximity cryogenics was successfully performed in June 2002.
Adaptive Packet Combining Scheme in Three State Channel Model
Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak
2018-01-01
The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.
Deitmar schemes, graphs and zeta functions
Mérida-Angulo, Manuel; Thas, Koen
2017-07-01
In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called "loose graph" (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are "defined over F1" in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called "surgery," we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.
Cognitive radio networks dynamic resource allocation schemes
Wang, Shaowei
2014-01-01
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off
Finite-volume scheme for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)
2016-02-01
In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.
Vector domain decomposition schemes for parabolic equations
Vabishchevich, P. N.
2017-09-01
A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.
Autonomous Droop Scheme With Reduced Generation Cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng
2014-01-01
) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...
A survey of Strong Convergent Schemes for the Simulation of ...
African Journals Online (AJOL)
We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...
Setting aside transactions from pyramid schemes as impeachable ...
African Journals Online (AJOL)
These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...
ONU Power Saving Scheme for EPON System
Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki
PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.
Designing optimal sampling schemes for field visits
CSIR Research Space (South Africa)
Debba, Pravesh
2008-10-01
Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...
Comparison of refueling schemes for DUPIC core
International Nuclear Information System (INIS)
Choi, H.; Rhee, B.W.; Park, H.
1995-01-01
A parametric study has been performed for the various refueling schemes of CANDU 6 reactor loaded with reference DUPIC fuel. The optimum discharge burnup was determined such that the peak bundle power is minimized for the equilibrium core. Based on the results of instantaneous core calculation using patterned random age distributions, it was decided to perform the refueling simulations only for 2-bundle and 4-bundle shift refueling schemes. The 600 FPD simulation has shown that the operational margins of the channel and bundle power to the license limits are 7.9% and 17.1%, respectively, for 2-bundle shift refueling scheme. The 4-bundle shift refueling scheme also satisfies the license limits and the operational margins of the channel and bundle power are 7.1% and 9.8%, respectively. The results of refueling simulation indicate the possibility of using reference DUPIC fuel in current CANDU 6 reactor. (author)
Transition amplitudes within the stochastic quantization scheme
International Nuclear Information System (INIS)
Hueffel, H.
1993-01-01
Quantum mechanical transition amplitudes are calculated within the stochastic quantization scheme for the free nonrelativistic particle, the harmonic oscillator and the nonrelativistic particle in a constant magnetic field; we close with free Grassmann quantum mechanics. (authors)
Boson expansion theory in the seniority scheme
International Nuclear Information System (INIS)
Tamura, T.; Li, C.; Pedrocchi, V.G.
1985-01-01
A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given
Sleep apnea - central; Obesity - central sleep apnea; Cheyne-Stokes - central sleep apnea; Heart failure - central sleep apnea ... Central sleep apnea results when the brain temporarily stops sending signals to the muscles that control breathing. The condition ...
A new scheme to calculate isotope effects.
Swiderek, Katarzyna; Dybala-Defratyka, Agnieszka; Rohr, Daniel R
2011-09-01
We present a new scheme to calculate isotope effects. Only selected frequencies at the target level of theory are calculated. The frequencies are selected by an analysis of the Hessian from a lower level of theory. We obtain accurate isotope effects without calculating the full Hessian at the target level of theory. The calculated frequencies are very accurate. The scheme converges to the correct isotope effect.
Basis scheme of personnel training system
International Nuclear Information System (INIS)
Rerucha, F.; Odehnal, J.
1998-01-01
Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel
Optical Transmission Schemes for GEO Feeder Links
Cowley, William; Giggenbach, Dirk; Mata Calvo, Ramon
2014-01-01
A novel transmission scheme for the forward link of a broadband satellite system that aims to avoid the need for feeder-link RF spectrum is described1. The hybrid scheme uses one or more optical uplinks from a hub station to geostationary satellite, plus one or more Ka band downlinks. The approach aims to retain the advantages of strong channel coding with high spectral efficiency, as used in recent high-speed digital video broadcast satellites, yet minimise on-boar...
Sellafield site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)
Simplified Learning Scheme For Analog Neural Network
Eberhardt, Silvio P.
1991-01-01
Synaptic connections adjusted one at a time in small increments. Simplified gradient-descent learning scheme for electronic neural-network processor less efficient than better-known back-propagation scheme, but offers two advantages: easily implemented in circuitry because data-access circuitry separated from learning circuitry; and independence of data-access circuitry makes possible to implement feedforward as well as feedback networks, including those of multiple-attractor type. Important in such applications as recognition of patterns.
Relaxation schemes for the shallow water equations
Delis, A. I.; Katsaounis, Th.
2003-03-01
We present a class of first and second order in space and time relaxation schemes for the shallow water (SW) equations. A new approach of incorporating the geometrical source term in the relaxation model is also presented. The schemes are based on classical relaxation models combined with Runge-Kutta time stepping mechanisms. Numerical results are presented for several benchmark test problems with or without the source term present.
Cryptanalysis of Two Fault Countermeasure Schemes
DEFF Research Database (Denmark)
Banik, Subhadeep; Bogdanov, Andrey
2015-01-01
In this paper, we look at two fault countermeasure schemes proposed very recently in literature. The first proposed in ACISP 2015 constructs a transformation function using a cellular automata based linear diffusion, and a non-linear layer using a series of bent functions. This countermeasure...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....
Cancelable remote quantum fingerprint templates protection scheme
International Nuclear Information System (INIS)
Liao Qin; Guo Ying; Huang Duan
2017-01-01
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)
Canonical, stable, general mapping using context schemes.
Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict
2015-11-15
Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
A Classification Scheme for Literary Characters
Directory of Open Access Journals (Sweden)
Matthew Berry
2017-10-01
Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.
DEFF Research Database (Denmark)
Costa, Ana; Kroff, Pablo; Morthorst, Poul Erik
2011-01-01
by means of energy systems analysis and studies on central cases for each of the participating project partners. This document comprises results from Work Package 6 – National Cases combining support schemes, ownership structures and operational strategies of the FC4Home research project. It integrates......The scope of the FC4Home project is to assess technical and economic aspects of the ongoing fuel cell based micro-combined heat and power demonstration projects by addressing the socio-economic and systems analyses perspectives of a large-scale promotion scheme of fuel cells. This was carried out...
Directory of Open Access Journals (Sweden)
Alekha Kumar Mishra
2017-01-01
Full Text Available Node replication attack possesses a high level of threat in wireless sensor networks (WSNs and it is severe when the sensors are mobile. A limited number of replica detection schemes in mobile WSNs (MWSNs have been reported till date, where most of them are centralized in nature. The centralized detection schemes use time-location claims and the base station (BS is solely responsible for detecting replica. Therefore, these schemes are prone to single point of failure. There is also additional communication overhead associated with sending time-location claims to the BS. A distributed detection mechanism is always a preferred solution to the above kind of problems due to significantly lower communication overhead than their counterparts. In this paper, we propose a distributed replica detection scheme for MWSNs. In this scheme, the deviation in the distance traveled by a node and its replica is recorded by the observer nodes. Every node is an observer node for some nodes in the network. Observers are responsible for maintaining a sliding window of recent time-distance broadcast of the nodes. A replica is detected by an observer based on the degree of violation computed from the deviations recorded using the time-distance sliding window. The analysis and simulation results show that the proposed scheme is able to achieve higher detection probability compared to distributed replica detection schemes such as Efficient Distributed Detection (EDD and Multi-Time-Location Storage and Diffusion (MTLSD.
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...
HR Department
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...
Financial incentive schemes in primary care
Directory of Open Access Journals (Sweden)
Gillam S
2015-09-01
Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care
Directory of Open Access Journals (Sweden)
Criel Bart
2007-07-01
Full Text Available Abstract Background Despite the promotion of Community Health Insurance (CHI in Uganda in the second half of the 90's, mainly under the impetus of external aid organisations, overall membership has remained low. Today, some 30,000 persons are enrolled in about a dozen different schemes located in Central and Southern Uganda. Moreover, most of these schemes were created some 10 years ago but since then, only one or two new schemes have been launched. The dynamic of CHI has apparently come to a halt. Methods A case study evaluation was carried out on two selected CHI schemes: the Ishaka and the Save for Health Uganda (SHU schemes. The objective of this evaluation was to explore the reasons for the limited success of CHI. The evaluation involved review of the schemes' records, key informant interviews and exit polls with both insured and non-insured patients. Results Our research points to a series of not mutually exclusive explanations for this under-achievement at both the demand and the supply side of health care delivery. On the demand side, the following elements have been identified: lack of basic information on the scheme's design and operation, limited understanding of the principles underlying CHI, limited community involvement and lack of trust in the management of the schemes, and, last but not least, problems in people's ability to pay the insurance premiums. On the supply-side, we have identified the following explanations: limited interest and knowledge of health care providers and managers of CHI, and the absence of a coherent policy framework for the development of CHI. Conclusion The policy implications of this study refer to the need for the government to provide the necessary legislative, technical and regulative support to CHI development. The main policy challenge however is the need to reconcile the government of Uganda's interest in promoting CHI with the current policy of abolition of user fees in public facilities.
Could a scheme for licensing smokers work in Australia?
Magnusson, Roger S; Currow, David C
2013-08-05
In this article, we evaluate the possible advantages and disadvantages of a licensing scheme that would require adult smokers to verify their right to purchase tobacco products at point of sale using a smart-card licence. A survey of Australian secondary school students conducted in 2011 found that half of 17-2013-old smokers and one-fifth of 12-2013-old smokers believed it was "easy" or "very easy" to purchase cigarettes themselves. Reducing tobacco use by adolescents now is central to the future course of the current epidemic of tobacco-caused disease, since most current adult smokers began to smoke as adolescents--at a time when they were unable to purchase tobacco lawfully. The requirement for cigarette retailers to reconcile all stock purchased from wholesalers against a digital record of retail sales to licensed smokers would create a robust incentive for retailers to comply with laws that prohibit tobacco sales to children. Foreseeable objections to introducing a smokers licence need to be taken into account, but once we move beyond the "shock of the new", it is difficult to identify anything about a smokers licence that is particularly offensive or demeaning. A smoker licensing scheme deserves serious consideration for its potential to dramatically curtail retailers' violation of the law against selling tobacco to minors, to impose stricter accountability for sale of a uniquely harmful drug and to allow intelligent use of information about smokers' purchases to help smokers quit.
Quantum Watermarking Scheme Based on INEQR
Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou
2018-04-01
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.
IPCT: A scheme for mobile authentication
Directory of Open Access Journals (Sweden)
Vishnu Shankar
2016-09-01
Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.
A Traffic Restriction Scheme for Enhancing Carpooling
Directory of Open Access Journals (Sweden)
Dong Ding
2017-01-01
Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.
Optimal Sales Schemes for Network Goods
DEFF Research Database (Denmark)
Parakhonyak, Alexei; Vikander, Nick
to consumers, allowing success to breed success. Failure can also breed failure, but this is made less likely by consumers’ desire to influence one another’s behavior. We show that when consumers differ in the weight they place on the network externality, the firm would like to serve consumers with lower......This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...... consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...
Tradable white certificate schemes : what can we learn from tradable green certificate schemes?
Oikonomou, Vlasis; Mundaca, Luis
In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green
Carbon trading: Current schemes and future developments
International Nuclear Information System (INIS)
Perdan, Slobodan; Azapagic, Adisa
2011-01-01
This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.
Gerolymos, G. A.; Sénéchal, D.; Vallet, I.
2009-12-01
We study WENO(2 r - 1) reconstruction [D.S. Balsara, C.W. Shu, Monotonicity prserving WENO schemes with increasingly high-order of accuracy, J. Comput. Phys. 160 (2000) 405-452], with the mapping ( WENOM) procedure of the nonlinear weights [A.K. Henrick, T.D. Aslam, J.M. Powers, Mapped weighted-essentially-non-oscillatory schemes: achieving optimal order near critical points, J. Comput. Phys. 207 (2005) 542-567], which we extend up to WENO17 (r=9). We find by numerical experiment that these procedures are essentially nonoscillatory without any stringent CFL limitation (CFL∈[0.8,1]), for scalar hyperbolic problems (both linear and scalar conservation laws), provided that the exponent pβ in the definition of the Jiang-Shu [G.S. Jiang, C.W. Shu, Efficient implementation of weighted ENO schemes, J. Comput. Phys. 126 (1996) 202-228] nonlinear weights be taken as pβ=r, as originally proposed by Liu et al. [X.D. Liu, S. Osher, T. Chan, Weighted essentially nonoscillatory schemes, J. Comput. Phys. 115 (1994) 200-212], instead of pβ=2 (this is valid both for WENO and WENOM reconstructions), although the optimal value of the exponent is probably pβ(r)∈[2,r]. Then, we apply the family of very-high-order reconstructions to the Euler equations of gasdynamics, by combining local characteristic decomposition [A. Harten, B. Engquist, S. Osher, S.R. Chakravarthy, Uniformly high-order accurate essentially nonoscillatory schemes III, J. Comput. Phys. 71 (1987) 231-303], with recursive-order-reduction ( ROR) aiming at aleviating the problems induced by the nonlinear interactions of characteristic fields within the stencil. The proposed ROR algorithm, which generalizes the algorithm of Titarev and Toro [V.A. Titarev, E.F. Toro, Finite-volume WENO schemes for 3-D conservation laws, J. Comput. Phys. 201 (2004) 238-260], is free of adjustable parameters, and the corresponding schemes are essentially nonoscillatory, as Δx→0, up to r=9, for all of the test-cases studied. Finally
EPU correction scheme study at the CLS
Energy Technology Data Exchange (ETDEWEB)
Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)
2016-07-27
The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.
Security problem on arbitrated quantum signature schemes
Energy Technology Data Exchange (ETDEWEB)
Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)
2011-12-15
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Clocking Scheme for Switched-Capacitor Circuits
DEFF Research Database (Denmark)
Steensgaard-Madsen, Jesper
1998-01-01
A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....
Verification of an objective analysis scheme
International Nuclear Information System (INIS)
Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.
1987-01-01
An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs
Low overhead slipless carrier phase estimation scheme.
Cheng, Haiquan; Li, Yan; Kong, Deming; Zang, Jizhao; Wu, Jian; Lin, Jintong
2014-08-25
Two slipless schemes are compared with application to single carrier 30 Gbaud quadrature phase shift keying (QPSK) system. An equivalent linewidth model considering the phase noise induced by both the laser linewidth and fiber nonlinearity is applied in the performance analysis. The simulation results show that it is possible to mitigate cycle slip (CS) using only 0.39% pilot overhead for the proposed blind carrier phase recovery (CPR) + pilot-symbols-aided phase unwrapping (PAPU) scheme within 1 dB signal-to-noise ratio (SNR) penalty limit at the bit error ratio (BER) of 10(-3) with 4 MHz equivalent linewidth.
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi
Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.
Investigation of schemes for incorporating generator Q limits in the ...
Indian Academy of Sciences (India)
Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...
An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.
Salim, Shelly; Moh, Sangman
2016-06-30
A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.
An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks
Directory of Open Access Journals (Sweden)
Shelly Salim
2016-06-01
Full Text Available A cognitive radio sensor network (CRSN is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.
High resolution finite volume scheme for the quantum hydrodynamic equations
Lin, Chin-Tien; Yeh, Jia-Yi; Chen, Jiun-Yeu
2009-03-01
The theory of quantum fluid dynamics (QFD) helps nanotechnology engineers to understand the physical effect of quantum forces. Although the governing equations of quantum fluid dynamics and classical fluid mechanics have the same form, there are two numerical simulation problems must be solved in QFD. The first is that the quantum potential term becomes singular and causes a divergence in the numerical simulation when the probability density is very small and close to zero. The second is that the unitarity in the time evolution of the quantum wave packet is significant. Accurate numerical evaluations are critical to the simulations of the flow fields that are generated by various quantum fluid systems. A finite volume scheme is developed herein to solve the quantum hydrodynamic equations of motion, which significantly improve the accuracy and stability of this method. The QFD equation is numerically implemented within the Eulerian method. A third-order modified Osher-Chakravarthy (MOC) upwind-centered finite volume scheme was constructed for conservation law to evaluate the convective terms, and a second-order central finite volume scheme was used to map the quantum potential field. An explicit Runge-Kutta method is used to perform the time integration to achieve fast convergence of the proposed scheme. In order to meet the numerical result can conform to the physical phenomenon and avoid numerical divergence happening due to extremely low probability density, the minimum value setting of probability density must exceed zero and smaller than certain value. The optimal value was found in the proposed numerical approach to maintain a converging numerical simulation when the minimum probability density is 10 -5 to 10 -12. The normalization of the wave packet remains close to unity through a long numerical simulation and the deviations from 1.0 is about 10 -4. To check the QFD finite difference numerical computations, one- and two-dimensional particle motions were
High resolution finite volume scheme for the quantum hydrodynamic equations
International Nuclear Information System (INIS)
Lin, C.-T.; Yeh, J.-Y.; Chen, J.-Y.
2009-01-01
The theory of quantum fluid dynamics (QFD) helps nanotechnology engineers to understand the physical effect of quantum forces. Although the governing equations of quantum fluid dynamics and classical fluid mechanics have the same form, there are two numerical simulation problems must be solved in QFD. The first is that the quantum potential term becomes singular and causes a divergence in the numerical simulation when the probability density is very small and close to zero. The second is that the unitarity in the time evolution of the quantum wave packet is significant. Accurate numerical evaluations are critical to the simulations of the flow fields that are generated by various quantum fluid systems. A finite volume scheme is developed herein to solve the quantum hydrodynamic equations of motion, which significantly improve the accuracy and stability of this method. The QFD equation is numerically implemented within the Eulerian method. A third-order modified Osher-Chakravarthy (MOC) upwind-centered finite volume scheme was constructed for conservation law to evaluate the convective terms, and a second-order central finite volume scheme was used to map the quantum potential field. An explicit Runge-Kutta method is used to perform the time integration to achieve fast convergence of the proposed scheme. In order to meet the numerical result can conform to the physical phenomenon and avoid numerical divergence happening due to extremely low probability density, the minimum value setting of probability density must exceed zero and smaller than certain value. The optimal value was found in the proposed numerical approach to maintain a converging numerical simulation when the minimum probability density is 10 -5 to 10 -12 . The normalization of the wave packet remains close to unity through a long numerical simulation and the deviations from 1.0 is about 10 -4 . To check the QFD finite difference numerical computations, one- and two-dimensional particle motions were
Shanghai : Developing a Green Electricity Scheme
Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.
2006-01-01
This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...
External quality assessment schemes for toxicology.
Wilson, John
2002-08-14
A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).
An HFB scheme in natural orbitals
International Nuclear Information System (INIS)
Reinhard, P.G.; Rutz, K.; Maruhn, J.A.
1997-01-01
We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)
The EU Greenhouse Gas Emissions Trading Scheme
Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn
2015-01-01
This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas
A generalized scheme for designing multistable continuous ...
Indian Academy of Sciences (India)
ical, ecological, neuronal and social systems. Our scheme may be useful for identifying mechanisms behind many natural multistable systems and helpful to control multistable dynamical systems. Acknowledgement. Authors thank the reviewer for critical comments and valuable suggestions which helped in improving the ...
SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES
Directory of Open Access Journals (Sweden)
V. Bogomolov
2014-10-01
Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.
Argument schemes, topoi, and laws of logic
Wagemans, J.H.M.; van Eemeren, F.H.; Garssen, B.; Godden, D.; Mitchell, G.
2011-01-01
In a pragma-dialectical reconstruction of argumentative discourse, argumentation schemes are used to analyze the way in which the acceptability of the argument is transferred to that of the standpoint. In some contexts, the analytical armamentarium that is needed to reconstruct such an Acceptability
Value constraints in the CLP scheme
M.H. van Emden
1996-01-01
textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines
The Partners in Flight species prioritization scheme
William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker
1993-01-01
The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....
Traffic calming schemes : opportunities and implementation strategies.
Schagen, I.N.L.G. van (ed.)
2003-01-01
Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and
THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...
African Journals Online (AJOL)
user
introduced a free primary education programme. ... education in Nigeria. This period witnessed the introduction of Free. Education scheme in Western Region and marked a radical departure from the hitherto existing educational patterns not only in Western. Nigeria but ..... The institutions of higher education also benefited.
International Nuclear Information System (INIS)
Pinto, H.V.
1976-02-01
Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt
Autonomous droop scheme with reduced generation cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...
A classification scheme for LWR fuel assemblies
Energy Technology Data Exchange (ETDEWEB)
Moore, R.S.; Williamson, D.A.; Notz, K.J.
1988-11-01
With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.
Asynchronous schemes for CFD at extreme scales
Konduri, Aditya; Donzis, Diego
2013-11-01
Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.
Nigeria's first national social protection scheme | IDRC ...
International Development Research Centre (IDRC) Digital Library (Canada)
2017-06-14
Jun 14, 2017 ... Implemented between 2012 and 2014, the non-contributory pension scheme targets the elderly in poor households in Ekiti state, where the majority of the population live in rural areas and work in the informal sector. A team of researchers led by Dr Damilola Olajide, with the collaboration of the State ...
Generalization of binary tensor product schemes depends upon four parameters
International Nuclear Information System (INIS)
Bashir, R.; Bari, M.; Mustafa, G.
2018-01-01
This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)
Generalization of Binary Tensor Product Schemes Depends upon Four Parameters
Directory of Open Access Journals (Sweden)
Robina Bashir
2018-01-01
Full Text Available This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes.
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Alawi A. Al-Saggaf; Haridas Acharya
2013-01-01
By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message). The eff...
A novel secret image sharing scheme based on chaotic system
Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu
2012-04-01
In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.
Simple Numerical Schemes for the Korteweg-deVries Equation
International Nuclear Information System (INIS)
McKinstrie, C. J.; Kozlov, M.V.
2000-01-01
Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves
DEFF Research Database (Denmark)
Alrabadi, Osama; Papadias, C.B.; Kalis, A.
2009-01-01
A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO...... systems. The array can spatially multiplex the input streams by creating all the desired linear combinations (for a given modulation scheme) of the basis functions. The desired combinations are obtained by projecting the ratio of the symbols to be spatially multiplexed on the ratio of the basis functions...
New advection schemes for free surface flows
International Nuclear Information System (INIS)
Pavan, Sara
2016-01-01
The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in
A classification scheme for risk assessment methods.
Energy Technology Data Exchange (ETDEWEB)
Stamp, Jason Edwin; Campbell, Philip LaRoche
2004-08-01
This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In
Chao, I.-Fen; Zhang, Tsung-Min
2015-06-01
Long-reach passive optical networks (LR-PONs) have been considered to be promising solutions for future access networks. In this paper, we propose a distributed medium access control (MAC) scheme over an advantageous LR-PON network architecture that reroutes the control information from and back to all ONUs through an (N + 1) × (N + 1) star coupler (SC) deployed near the ONUs, thereby overwhelming the extremely long propagation delay problem in LR-PONs. In the network, the control slot is designed to contain all bandwidth requirements of all ONUs and is in-band time-division-multiplexed with a number of data slots within a cycle. In the proposed MAC scheme, a novel profit-weight-based dynamic bandwidth allocation (P-DBA) scheme is presented. The algorithm is designed to efficiently and fairly distribute the amount of excess bandwidth based on a profit value derived from the excess bandwidth usage of each ONU, which resolves the problems of previously reported DBA schemes that are either unfair or inefficient. The simulation results show that the proposed decentralized algorithms exhibit a nearly three-order-of-magnitude improvement in delay performance compared to the centralized algorithms over LR-PONs. Moreover, the newly proposed P-DBA scheme guarantees low delay performance and fairness even when under attack by the malevolent ONU irrespective of traffic loads and burstiness.
Kent, James; Holdaway, Daniel
2015-01-01
A number of geophysical applications require the use of the linearized version of the full model. One such example is in numerical weather prediction, where the tangent linear and adjoint versions of the atmospheric model are required for the 4DVAR inverse problem. The part of the model that represents the resolved scale processes of the atmosphere is known as the dynamical core. Advection, or transport, is performed by the dynamical core. It is a central process in many geophysical applications and is a process that often has a quasi-linear underlying behavior. However, over the decades since the advent of numerical modelling, significant effort has gone into developing many flavors of high-order, shape preserving, nonoscillatory, positive definite advection schemes. These schemes are excellent in terms of transporting the quantities of interest in the dynamical core, but they introduce nonlinearity through the use of nonlinear limiters. The linearity of the transport schemes used in Goddard Earth Observing System version 5 (GEOS-5), as well as a number of other schemes, is analyzed using a simple 1D setup. The linearized version of GEOS-5 is then tested using a linear third order scheme in the tangent linear version.
Rosandić, Marija; Paar, Vladimir
2014-06-10
The standard classification scheme of the genetic code is organized for alphabetic ordering of nucleotides. Here we introduce the new, "ideal" classification scheme in compact form, for the first time generated by codon sextets encoding Ser, Arg and Leu amino acids. The new scheme creates the known purine/pyrimidine, codon-anticodon, and amino/keto type symmetries and a novel A+U rich/C+G rich symmetry. This scheme is built from "leading" and "nonleading" groups of 32 codons each. In the ensuing 4 × 16 scheme, based on trinucleotide quadruplets, Ser has a central role as initial generator. Six codons encoding Ser and six encoding Arg extend continuously along a linear array in the "leading" group, and together with four of six Leu codons uniquely define construction of the "leading" group. The remaining two Leu codons enable construction of the "nonleading" group. The "ideal" genetic code suggests the evolution of genetic code with serine as an initiator. Copyright © 2014 Elsevier B.V. All rights reserved.
Kent, James; Holdaway, Daniel
2015-04-01
Data assimilation is one of the most common inverse problems encountered in geophysical models. One of the leading techniques used for data assimilation in numerical weather prediction is four dimensional variational data assimilation (4DVAR). In 4DVAR the tangent linear and adjoint versions of the nonlinear model are used to perform a minimization with time dependent observations. In order for the minimization to perform well requires a certain degree of linearity in both the underlying equations and numerical methods used to solve them. Advection is central to the underlying equations used for numerical weather prediction, as well as many other geophysical models. From the advection of momentum, temperature and moisture to passive tracers such as smoke from wildfires, accurate transport is paramount. Over recent decades much effort has been directed toward the development of positive definite, non-oscillatory, mass conserving advection schemes. These schemes are capable of giving excellent representation of transport, but by definition introduce nonlinearity into equations that are otherwise quite linear. One such example is the flux limited piecewise parabolic method (PPM) used in NASA's Goddard Earth Observing System version 5 (GEOS-5), which can perform very poorly when linearized. With a view to an optimal representation of transport in the linear versions of atmospheric models and 4DVAR we analyse the performance of a number of different linear and nonlinear advection schemes. The schemes are analysed using a one dimensional case study, a passive tracer in GEOS-5 experiment and using the full linearized version of GEOS-5. Using the three studies it is shown that higher order linear schemes provide the best representation of the transport of perturbations and sensitivities. In certain situations the nonlinear schemes give the best performance but are subject to issues. It is also shown that many of the desirable properties of the nonlinear schemes are
Scheme for Quantum Computing Immune to Decoherence
Williams, Colin; Vatan, Farrokh
2008-01-01
A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report
Mobile devices for community-based REDD+ monitoring: A case study for Central Vietnam
Pratihast, A.K.; Herold, M.; Avitabile, V.; Bruin, de S.; Bartholomeus, H.; Souza Jr., C.M.; Ribbe, L.
2013-01-01
Monitoring tropical deforestation and forest degradation is one of the central elements for the Reduced Emissions from Deforestation and Forest Degradation in developing countries (REDD+) scheme. Current arrangements for monitoring are based on remote sensing and field measurements. Since monitoring
Numerical schemes for solving the Euler equations of gas dynamics
International Nuclear Information System (INIS)
Dervieux, A.; Vijayasundaram, G.
1985-01-01
The first-order upwind schemes of Godunov-Van Leer, Steger-Warming, Godunov, Roe, Osher and Glimm; Godunov type scheme I; the second-order upwind schemes of Van Leer, Fromm-Van Leer, Hancock-Van Leer, and Moretti; and the second-order centered schemes of Richtmyer, Mac Cormack, Lerat-Peyrat, and Jameson are described. Their performances for the shock-tube problem proposed by Sod are compared. The schemes of Godunov-Van Leer, Glimm, Fromm-Van Leer, and Hancock-Van Leer produced the best results. All the First-order upwind schemes, the Glimm scheme, the Jameson scheme, and the Hancock-Van Leer scheme can be extended to two dimensions in the finite element setting. 30 references
Fixed Wordsize Implementation of Lifting Schemes
Directory of Open Access Journals (Sweden)
Tanja Karp
2007-01-01
Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.
Signal Processing Schemes for Doppler Global Velocimetry
Meyers, James F.; Lee, Joseph W.; Cavone, Angelo A.
1991-01-01
Two schemes for processing signals obtained from the Doppler global velocimeter are described. The analog approach is a simple, real time method for obtaining an RS-170 video signal containing the normalized intensity image. Pseudo colors are added using a monochromatic frame grabber producing a standard NTSC video signal that can be monitored and/or recorded. The digital approach is more complicated, but maintains the full resolution of the acquisition cameras with the capabilities to correct the signal image for pixel sensitivity variations and to remove of background light. Prototype circuits for each scheme are described and example results from the investigation of the vortical flow field above a 75-degree delta wing presented.
Exclusion from the Health Insurance Scheme
2003-01-01
A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635
A hybrid Lagrangian Voronoi-SPH scheme
Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.
2017-11-01
A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.
Generalized seniority scheme in light Sn isotopes
International Nuclear Information System (INIS)
Sandulescu, N.; Sandulescu, N.; Blomqvist, J.; Liotta, R.J.; Engeland, T.; Holt, A.; Osnes, E.; Hjorth-Jensen, M.
1997-01-01
In search of a possible truncation scheme for shell model calculations, the yrast generalized seniority states are compared with the corresponding shell model states for the case of the Sn isotopes 104-112 Sn. For most of the cases the energies agree within a few hundred keV. For the 0 + (2 + ) states the overlaps decrease from 97% (93%) in 104 Sn to 91% (78%) in 112 Sn when the coefficients of the pairs in the S and D boson operators are allowed to vary with the number of particles. For constant pairing coefficients throughout the entire isotope range, the overlaps are considerably smaller. It is concluded, with the realistic effective interaction applied here, that a truncation scheme based on seniority zero and two states is inadequate when the number of valence particles gets large and that configurations of higher seniority should be included. copyright 1997 The American Physical Society
A numerical relativity scheme for cosmological simulations
Daverio, David; Dirian, Yves; Mitsou, Ermis
2017-12-01
Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3 + 1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.
Simple CARS measurement point traversing scheme
Eckbreth, A. C.; Stufflebeam, J. H.
1985-05-01
The present simple optical scheme employing fixed field lenses permits large measurement point translations for small changes in the separation of Galilean telescopes. For the case of an intensity-dependent process, such as CARS, these translations are accomplished at a constant focusing solid angle, thereby yielding constant focal zone intensity. This will eliminate any signal variation with position which is implicitly due to measurement location.
Efficient Scheme for Chemical Flooding Simulation
Directory of Open Access Journals (Sweden)
Braconnier Benjamin
2014-07-01
Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].
Computer aided design of database relation schemes
Brehovský, Martin
2006-01-01
Project "Computer aided design of database relation schemes" shows the importance and problems with designing nowadays Database schemas and gives ideas on possible solutions to these problems. Its main purpose is to describe a solution on optimizing Database designing that is transforming database schemas into tables. These tables should also fulfill the requirements based on the need for data consistency and database maintenance. Main part of this project is an application, which implements ...
A new chaotic secure communication scheme
Energy Technology Data Exchange (ETDEWEB)
Hua Changchun [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China)]. E-mail: cch@ysu.edu.cn; Yang Bo [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China); Ouyang Gaoxiang [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China); Guan Xinping [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China)]. E-mail: xpguan@ysu.edu.cn
2005-07-18
A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient.
Preventing corruption in community mineral beneficiation schemes
Nest, Michael
2017-01-01
Abstract This paper analyses patterns of corruption and corruption risks related to community mineral beneficiation schemes (CMBSs) that distribute benefits funded by mineral revenues to communities. It analyses insights from existing scholarship on CMBSs, evidence from seven cases of corruption, and lessons from guidance documents on reducing corruption in the mining value chain. The aim of the paper is to stimulate debate and further research about the suitability of anti-corruption st...
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
data additions, deletions, and modifications [5]. Recent out- ages for well-known cloud storage providers, including Amazon S3 and Microsoft Azure , also...For example, Microsoft Azure Blob storage, Google Cloud Storage, and Rackspace Cloud Files all have similar storage services and pricing schemes as...limitations. Max object size Max PUT size Max metadata size Amazon S3 5 TB 5 GB 2 KB Microsoft Azure 195 GB 64 MB 8 KB Google Cloud Storage 5 TB 5 TB
Pay schemes, bargaining, and competition for talent
Lindbeck, Assar; Weibull, Jörgen W.
2015-01-01
The paper provides a framework for analysis of remuneration to agents whose task is to make well-informed decisions on behalf of a principal, with managers in large corporations as the most prominent example. The principal and agent initially bargain over the pay scheme to the latter. The bargaining outcome depends both on competition for agents and on the relative bargaining power of the two parties, given their outside options, thus allowing for the possibility that the agent may be the cur...
Droop Scheme With Consideration of Operating Costs
DEFF Research Database (Denmark)
Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede
2014-01-01
considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....
Central Diabetes Insipidus, Central Hypothyroidism, Renal Tubular ...
African Journals Online (AJOL)
diseases, primary hypothyroidism, and other disorders of the central nervous, gastrointestinal, genitourinary, and orthopedic systems. In this report, we describe a 3‑month‑old Saudi boy with the rare association of DWS with central diabetes insipidus, congenital central hypothyroidism, and type‑2 renal tubular acidosis.
Shen, Hua
2016-10-19
A maximum-principle-satisfying space-time conservation element and solution element (CE/SE) scheme is constructed to solve a reduced five-equation model coupled with the stiffened equation of state for compressible multifluids. We first derive a sufficient condition for CE/SE schemes to satisfy maximum-principle when solving a general conservation law. And then we introduce a slope limiter to ensure the sufficient condition which is applicative for both central and upwind CE/SE schemes. Finally, we implement the upwind maximum-principle-satisfying CE/SE scheme to solve the volume-fraction-based five-equation model for compressible multifluids. Several numerical examples are carried out to carefully examine the accuracy, efficiency, conservativeness and maximum-principle-satisfying property of the proposed approach.
Parallel S/sub n/ iteration schemes
International Nuclear Information System (INIS)
Wienke, B.R.; Hiromoto, R.E.
1986-01-01
The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial
Doppler Shift Compensation Schemes in VANETs
Directory of Open Access Journals (Sweden)
F. Nyongesa
2015-01-01
Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.
INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME
Tel : 7-3635
2002-01-01
Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...
An evaluation scheme for nanotechnology policies
International Nuclear Information System (INIS)
Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar
2011-01-01
Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.
A rational function based scheme for solving advection equation
Energy Technology Data Exchange (ETDEWEB)
Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi
1995-07-01
A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).
A weak blind signature scheme based on quantum cryptography
Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan
2009-02-01
In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.
Computing with high-resolution upwind schemes for hyperbolic equations
International Nuclear Information System (INIS)
Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)
1985-01-01
Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references
Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme
Directory of Open Access Journals (Sweden)
Raman Kumar
2014-01-01
Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.
Central Nervous System Vasculitis
... Forms of Vasculitis / Central Nervous System (CNS) Vasculitis Central Nervous System (CNS) Vasculitis Swap out your current Facebook Profile ... your Facebook personal page. Replace with this image. Central nervous system (CNS) vasculitis is inflammation of blood vessel walls ...
3n-Point Quaternary Shape Preserving Subdivision Schemes
Directory of Open Access Journals (Sweden)
MEHWISH BARI
2017-07-01
Full Text Available In this paper, an algorithm is defined to construct 3n-point quaternary approximating subdivision schemes which are useful to design different geometric objects in the field of geometric modeling. We are going to establish a family of approximating schemes because approximating scheme provide maximum smoothness as compare to the interpolating schemes. It is to be observed that the proposed schemes satisfying the basic sum rules with bell-shaped mask go up to the convergent subdivision schemes which preserve monotonicity. We analyze the shape-preserving properties such that convexity and concavity of proposed schemes. We also show that quaternary schemes associated to the certain refinable functions with dilation 4 have higher order shape preserving properties. We also calculated the polynomial reproduction of proposed quaternary approximating subdivision schemes. The proposed schemes have tension parameter, so by choosing different values of the tension parameter we can get different limit curves of initial control polygon. We show in the table form that the proposed schemes are better than the existing schemes by comparing them on the behalf of their support and continuity. The visual quality of proposed schemes is demonstrated by different snapshots.
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
Directory of Open Access Journals (Sweden)
Caixue Zhou
2017-01-01
Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.
Systematic Luby Transform codes as incremental redundancy scheme
CSIR Research Space (South Africa)
Grobler, TL
2011-09-01
Full Text Available Systematic Luby Transform (fountain) codes are investigated as a possible incremental redundancy scheme for EDGE. The convolutional incremental redundancy scheme currently used by EDGE is replaced by the fountain approach. The results...
Ramakrishnan, Vivek; Ramesh, K.
2017-05-01
Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.
Novel efficient hybrid‐DEM collision integration scheme
Buist, Kay A.; Seelen, Luuk J.H.; Deen, Niels G.; Padding, Johan T.; Kuipers, Hans J.A.M.
2017-01-01
A hybrid collision integration scheme is introduced, benefiting from the efficient handling of binary collisions in the hard sphere scheme and the robust time scaling of the soft sphere scheme. In typical dynamic dense granular flow, simulated with the soft sphere scheme, the amount of collisions involving more than two particles are limited, and necessarily so because of loss of energy decay otherwise. Because most collisions are binary, these collisions can be handled within one time step w...
Quantum Communication Scheme Using Non-symmetric Quantum Channel
International Nuclear Information System (INIS)
Cao Haijing; Chen Zhonghua; Song Heshan
2008-01-01
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel
Description and Application of the CE-SE Scheme
Directory of Open Access Journals (Sweden)
Martin KOSÍK
2010-12-01
Full Text Available The CE-SE scheme is new numerical methodology for conservation laws. It was developed by Dr.Chang of NASA Glenn Research Center and his collaborators. The 1D and 2D variant of CE-SE scheme for scalar convection and for Euler equations for incompressible flows is described. The CESE scheme is compared with classical schemes in 1D. The solution to inviscid incompressible flow in GAMM channel in 2D is presented.
Multichannel feedforward control schemes with coupling compensation for active sound profiling
Mosquera-Sánchez, Jaime A.; Desmet, Wim; de Oliveira, Leopoldo P. R.
2017-05-01
Active sound profiling includes a number of control techniques that enables the equalization, rather than the mere reduction, of acoustic noise. Challenges may rise when trying to achieve distinct targeted sound profiles simultaneously at multiple locations, e.g., within a vehicle cabin. This paper introduces distributed multichannel control schemes for independently tailoring structural borne sound reaching a number of locations within a cavity. The proposed techniques address the cross interactions amongst feedforward active sound profiling units, which compensate for interferences of the primary sound at each location of interest by exchanging run-time data amongst the control units, while attaining the desired control targets. Computational complexity, convergence, and stability of the proposed multichannel schemes are examined in light of the physical system at which they are implemented. The tuning performance of the proposed algorithms is benchmarked with the centralized and pure-decentralized control schemes through computer simulations on a simplified numerical model, which has also been subjected to plant magnitude variations. Provided that the representation of the plant is accurate enough, the proposed multichannel control schemes have been shown as the only ones that properly deliver targeted active sound profiling tasks at each error sensor location. Experimental results in a 1:3-scaled vehicle mock-up further demonstrate that the proposed schemes are able to attain reductions of more than 60 dB upon periodic disturbances at a number of positions, while resolving cross-channel interferences. Moreover, when the sensor/actuator placement is found as defective at a given frequency, the inclusion of a regularization parameter in the cost function is seen to not hinder the proper operation of the proposed compensation schemes, at the time that it assures their stability, at the expense of losing control performance.
Centralized cooperative spectrum sensing for ad-hoc disaster relief network clusters
DEFF Research Database (Denmark)
Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.
2010-01-01
-based orchestration cooperative sensing scheme is proposed, where the cluster head controls and adapts the distribution of the cluster sensing's nodes according to the monitored spectrum state. The proposed scheme performance is evaluated through a framework, which allows gauging the accuracy of wideband multi....... The main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, spectrum sensing cooperative schemes are paramount. A centralized cluster...
A combined spectrum sensing and OFDM demodulation scheme
Heskamp, M.; Slump, Cornelis H.
2009-01-01
In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation
A practicable γ5-scheme in dimensional regularization
International Nuclear Information System (INIS)
Koerner, J.G.; Kreimer, D.; Schilcher, K.
1991-08-01
We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)
throughput analysis of arq schemes using state transition diagrams
African Journals Online (AJOL)
User
networks operating in severely fading channels. (Shi et al. ... time. Among the three basic ARQ schemes, the ideal SR scheme gives the highest throughout efficiency. The main limitation of the ideal SR scheme is the requirement for an infinite buffer storage size at the ... the method of using the synchronization effi- ciency is ...
Throughput Analysis of Arq Schemes Using State Transition Diagrams
African Journals Online (AJOL)
ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...
Forgery attack to Kang-Tang digital signature scheme
Fang, Jie; Guo, Yongning; Liu, Chenglian
2014-10-01
In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.
SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING
Directory of Open Access Journals (Sweden)
Constanta RADULESCU
2011-07-01
Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.
LHC INTERACTION REGION CORRECTION SCHEME STUDIES
International Nuclear Information System (INIS)
FISCHER, W.; PTITSIN, V.; WEI, J.
1999-01-01
In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance
LHC INTERACTION REGION CORRECTION SCHEME STUDIES
Energy Technology Data Exchange (ETDEWEB)
FISCHER,W.; PTITSIN,V.; WEI,J.
1999-09-07
In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance.
A Ponzi scheme exposed to volatile markets
Parodi, Bernhard R.
2014-01-01
The PGBM model for a couple of counteracting, exponentially growing capital flows is presented: the available capital stock X(t) evolves according to a variant of inhomogeneous geometric Brownian motion (GBM) with time-dependent drift, in particular, to the stochastic differential equation dX(t)=[pX(t) + rho1*exp(q1*t)+rho2*exp(q2*t)]dt + sigma*X(t)*dW(t), where W(t) is a Wiener process. As a paragon, we study a continuous-time model for a nine-parameter Ponzi scheme with an exponentially gro...
New Financing Schemes of Public Infrastructure
Directory of Open Access Journals (Sweden)
Ignacio de la Riva
2017-01-01
Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.
Investigation of a monochromator scheme for SPEAR
International Nuclear Information System (INIS)
Wille, K.; Chao, A.W.
1984-08-01
The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended
Complete activation scheme for IP design protection
Brice Colombier; Ugo Mureddu; Marek Laban; Oto Petura; Lilian Bossuet; Viktor Fischer
2017-01-01
International audience; —Intellectual Property (IP) illegal copying is a major threat in today's integrated circuits industry which is massively based on a design-and-reuse paradigm. In order to fight this threat, a designer must track how many times an IP has been instantiated. Moreover, illegal copies of an IP must be unusable. We propose a hardware/software scheme which allows a designer to remotely activate an IP with minimal area overhead. The software modifies the IP efficiently and can...
A Classification Scheme for Glaciological AVA Responses
Booth, A.; Emir, E.
2014-12-01
A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator
Effectiveness of clean taxi priority incentive at Amsterdam Central Station
van der Flier, A.S.; Dam, J.; van den Hoed, R.
2017-01-01
The municipality of Amsterdam wants to have an emission free taxi sector by 2025. In order to reach that goal, the city has taken a number of measures which favour clean taxis above conventional taxis. One of these measures is an innovative priority privilege scheme at the Amsterdam Central Station
IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME
Human Resources Division
2001-01-01
CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...
Extended lattice Boltzmann scheme for droplet combustion.
Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas
2017-05-01
The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.
Present and future nuclear power financing schemes
International Nuclear Information System (INIS)
Diel, R.
1977-01-01
The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de
Privacy protection schemes for fingerprint recognition systems
Marasco, Emanuela; Cukic, Bojan
2015-05-01
The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.
Finite-difference schemes for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)
2014-09-01
In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.
Optimum penstocks for low head microhydro schemes
Energy Technology Data Exchange (ETDEWEB)
Alexander, K.V. [Department of Mechanical Engineering, University of Canterbury, Christchurch, P.O. Box 4800, Christchurch (New Zealand); Giddens, E.P. [Formally of Department of Civil Engineering, University of Canterbury, 81 Grange Street, Opawa, Christchurch (New Zealand)
2008-03-15
This paper presents an analysis for penstock optimization, for low head microhydro schemes. The intent of the optimization is to minimize capital cost per kilowatt rather than maximize the energy from the site. It is shown that site slope is an important consideration that affects the economics. While this work stands alone it has been generated as part of a research program that is in the final stages of developing a modular set of cost-effective low-head microhydro schemes for site heads below those currently serviced by Pelton Wheels. The rationale for the work has been that there is a multitude of viable low-head sites in isolated areas where microhydro is a realistic energy option, and where conventional economics are not appropriate. This is especially the case in third world countries. The goals of this paper have been to illustrate the issues and show how to decide on the most cost-effective penstock solutions that systematically cover the 0.2-20 kW supply. The paper presents the results as a matrix of the most cost-effective penstocks, and in the larger project it matches them to a modular set of turbines. It shows how to find the relative cost-effectiveness of alternative penstocks, and concludes with examples illustrating the results. (author)
Password Authentication Based on Fractal Coding Scheme
Directory of Open Access Journals (Sweden)
Nadia M. G. Al-Saidi
2012-01-01
Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.
Single particle level scheme for alpha decay
International Nuclear Information System (INIS)
Mirea, M.
1998-01-01
The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)
Multiplexing schemes for quantum repeater networks
Aparicio, Luciano; Van Meter, Rodney
2011-08-01
When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.
A subgrid parameterization scheme for precipitation
Directory of Open Access Journals (Sweden)
S. Turner
2012-04-01
Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.
Wilkinson, M.H.F.
A run length code compression scheme of extreme simplicity, used for image storage in an automated bacterial morphometry system, is compared with more common compression schemes, such as are used in the tag image file format. These schemes are Lempel-Ziv and Welch (LZW), Macintosh Packbits, and
A group signature scheme based on quantum teleportation
Energy Technology Data Exchange (ETDEWEB)
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)
2010-05-01
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Quantum election scheme based on anonymous quantum key distribution
International Nuclear Information System (INIS)
Zhou Rui-Rui; Yang Li
2012-01-01
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)
Enhanced arbitrated quantum signature scheme using Bell states
International Nuclear Information System (INIS)
Wang Chao; Liu Jian-Wei; Shang Tao
2014-01-01
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme
Computational evaluation of convection schemes in fluid dynamics problems
Directory of Open Access Journals (Sweden)
Paulo Laerte Natti
2012-11-01
Full Text Available This article provides a computational evaluation of the popular high resolution upwind WACEB, CUBISTA and ADBQUICKEST schemes for solving non-linear fluid dynamics problems. By using the finite difference methodology, the schemes are analyzed and implemented in the context of normalized variables of Leonard. In order to access the performance of the schemes, Riemann problems for 1D Burgers, Euler and shallow water equations are considered. From the numerical results, the schemes are ranked according to their performance in solving these non-linear equations. The best scheme is then applied in the numerical simulation of tridimensional incompressible moving free surface flows.
Keratoconus: Classification scheme based on videokeratography and clinical signs
Li, Xiaohui; Yang, Huiying; Rabinowitz, Yaron S.
2013-01-01
PURPOSE To determine in a longitudinal study whether there is correlation between videokeratography and clinical signs of keratoconus that might be useful to practicing clinicians. SETTING Cornea-Genetic Eye Institute, Cedars-Sinai Medical Center, Los Angeles, California, USA. METHODS Eyes grouped as keratoconus, early keratoconus, keratoconus suspect, or normal based on clinical signs and videokeratography were examined at baseline and followed for 1 to 8 years. Differences in quantitative videokeratography indices and the progression rate were evaluated. The quantitative indices were central keratometry (K), the inferior–superior (I–S) value, and the keratoconus percentage index (KISA). Discriminant analysis was used to estimate the classification rate using the indices. RESULTS There were significant differences at baseline between the normal, keratoconus-suspect, and early keratoconus groups in all indices; the respective means were central K: 44.17 D, 45.13 D, and 45.97 D; I–S: 0.57, 1.20, and 4.44; log(KISA): 2.49, 2.94, and 5.71 (all Pkeratoconus-suspect group progressed to early keratoconus or keratoconus and 75% in the early keratoconus group progressed to keratoconus. Using all 3 indices and age, 86.9% in the normal group, 75.3% in the early keratoconus group, and 44.6% in the keratoconus-suspect group could be classified, yielding a total classification rate of 68.9%. CONCLUSIONS Cross-sectional and longitudinal data showed significant differences between groups in the 3 indices. Use of this classification scheme might form a basis for detecting subclinical keratoconus. PMID:19683159
Neural Computation Scheme of Compound Control: Tacit Learning for Bipedal Locomotion
Shimoda, Shingo; Kimura, Hidenori
The growing need for controlling complex behaviors of versatile robots working in unpredictable environment has revealed the fundamental limitation of model-based control strategy that requires precise models of robots and environments before their operations. This difficulty is fundamental and has the same root with the well-known frame problem in artificial intelligence. It has been a central long standing issue in advanced robotics, as well as machine intelligence, to find a prospective clue to attack this fundamental difficulty. The general consensus shared by many leading researchers in the related field is that the body plays an important role in acquiring intelligence that can conquer unknowns. In particular, purposeful behaviors emerge during body-environment interactions with the help of an appropriately organized neural computational scheme that can exploit what the environment can afford. Along this line, we propose a new scheme of neural computation based on compound control which represents a typical feature of biological controls. This scheme is based on classical neuron models with local rules that can create macroscopic purposeful behaviors. This scheme is applied to a bipedal robot and generates the rhythm of walking without any model of robot dynamics and environments.
A continuous winding scheme for superconducting tokamak coils with cable-in-conduit conductor
International Nuclear Information System (INIS)
Kim, Sang-ho; Chung, Kie-hyung; Lee, Deok Kyo
2001-01-01
Superconducting magnet coils are essential for steady-state or long-pulse operation of tokamaks. In an advanced tokamak, the central solenoid (CS) coils are usually divided into several pairs of modules to provide for an extra plasma shaping capability in addition to those available from the shaping (poloidal field) coils. In the conventional pancake winding scheme of superconducting coils, each coil consists of separate superconducting 'double-pancake' coils connected together in series; however, such joints are not superconducting, which is one of the major disadvantages, especially in pulsed operations. A new type of winding was adopted for the ITER CS coil, which consists of cylindrical shell 'layers' joined in series. A disadvantage of this layer winding is its inability to yield modular coils that can provide certain degree of plasma shaping. Joints can be removed in a coil winding pack with the conventional pancake winding scheme, if the conductor is sufficiently long and the winding machine is properly equipped. The compactness, however, cannot be preserved with this scheme. The winding compactness is important since the radial build of the CS coils is one of the major parameters that determine the machine size. In this paper, we present a continuous winding scheme that requires no joints, allows coil fabrication at minimum dimension, and meets the flux swing requirement and other practical aspects
Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation
Directory of Open Access Journals (Sweden)
Shu Yang
2016-01-01
Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.
Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.
2018-04-01
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
Communication schemes for centralized and decentralized event-triggered control systems
Kartakis, Sokratis; Fu, A.; Mazo Espinosa, M.; McCann, Julie A.
2017-01-01
Energy constraint long-range wireless sensor/actuator-based solutions are theoretically the perfect choice to support the next generation of city-scale cyber-physical systems. Traditional systems adopt periodic control which increases network congestion and actuations while burdens the energy
Renaissance Architecture of Central Scheme: Jerónimo Quijano and his Immediate Environment
Directory of Open Access Journals (Sweden)
Antonio Luis López González
2015-10-01
As references to Quijano´s architectural approach in his Hispanic environment, it should reflect upon certain reminiscences to Renaissance works in Eastern Andalusia, his direct influence in the Government of Orihuela and subsequently some of his possible influences in the Valencian territory.
A numerical scheme for the generalized Burgers–Huxley equation
Directory of Open Access Journals (Sweden)
Brajesh K. Singh
2016-10-01
Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Directory of Open Access Journals (Sweden)
Jun-Sub Kim
2013-01-01
Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.
Directory of Open Access Journals (Sweden)
Elizaveta V. Kolesnik
2017-10-01
Full Text Available Several schemes of the second-order approximation worked out in the literature for unstructured-grid-based computations of gasdynamic flows are described. The convective fluxes on the control-volume's faces are evaluated using Roe's approximate Riemann solver. The MUSCL approach with the use of various quasi-one-dimensional schemes of reconstruction of gasdynamic variables and limiters making the solution monotonic is applied in order to improve the approximation accuracy. Comparative analysis of the working capacity of the schemes under consideration has been carried out through solving two problems of inviscid gas flow. Namely, the transonic NACA-0012 airfoil flow and the superpersonic flow in a duct with a central ramp were computed. The smoothness of solution, obtained with different schemes, dissipativity features of the schemes and computational process stability were evaluated.
Contamination of Dining Tables with Pesticides in Kibirigwi Irrigation Scheme
International Nuclear Information System (INIS)
Kimani, V.W; McDermont, J.J
1999-01-01
Kibirigwi irrigation scheme is a small holder area in Central Kenya, where the main activity is production of horticultural crops. Pesticides are widely misused. This study investigated the extent of house hold pesticide exposure in 40 randomly selected farms in JUly-August, 1995. Exposure measures collected included pesticide levels on dining table swabs. Fifty coytton clothes measuring 30 cm *30cm were prepared in the laboratory by soaking overnight in methanol. In each of the selected homesteads, the table used for meals was swabbed with the piece of cloth. In the laboratory, the residues chemicals extracted from these swabs using conventional residual analysis procedures and the extracts were analysed by gas liquid chromatography. Information on which pesticide (s) were recently handled in the home and when, were also recorded. Cypermethrin (9/40), malathion (9/40), Diazinon (5/40), dimethoate (4/40), chloropyrifos (4/40) and fenitrothion (1/40) were detected in these samples. The range of individual organophosphate pesticides detected was 0.01-8.7ug/cm 2 of table area and for cypermethrin the range was 0.0024 ng-5.8 ng/cm 2 . It was concluded that farmers and their family members are likely to be contaminated with pesticides from tables either dermally or through contamination of food placed on such tables
Project Politics, Priorities and Participation in Rural Water Schemes
Directory of Open Access Journals (Sweden)
Barbara van Koppen
2012-02-01
Full Text Available Governments, NGOs and financers invest considerable resources in rural domestic water supplies and irrigation development. However, elite capture and underuse, if not complete abandonment, are frequent. While the blame is often put on 'corrupt, lazy and indisciplined' communities, this article explores the question of how the public water sector itself contributes to this state of affairs. Four case studies, which are part of the research project Cooperation and Conflict in Local Water Governance, are examined: two domestic water supply projects (Mali, Vietnam; one participatory multiple use project (Zambia; and one large-scale irrigation project (Bolivia. It was found that accountability of water projects was upward and tended to lie in construction targets for single uses with already allocated funding. This rendered project implementers dependent upon the village elite for timely spending. Yet, the elite appeared hardly motivated to maintain communal schemes, unless they themselves benefited. The dependency of projects on the elite can be reduced by ensuring participatory and inclusive planning that meets the project’s conditions before budget allocation. Although such approaches are common outside the water sector, a barrier in the water sector is that central public funds are negotiated by each sector by profiling unique expertise and single livelihood goals, which trickle down as single use silos. The article concludes with reflections on plausible benefits of participatory multiple use services for equity and sustainability.
Synchronization and a secure communication scheme using optical star network
Jeeva Sathya Theesar, S.; Ariffin, M. R. K.; Banerjee, Santo
2013-12-01
This work aims to show the effect of synchronization phenomena in multi-nodal star optical network topology as well as to develop an efficient symmetric cryptosystem utilizing available parameters. The optical network is based on chaotic semiconductor laser (SL) systems described by dimensionless modified Lang-Kobayashi's (L-K) delay differential equations. The network nodes are mutually connected with a central semiconductor laser hub with bidirectional linear optical feedback. It has been observed that the laser output can be modulated using a star network setup. The laser intensity increases with the number of nodes and its much more higher than the same for solitary laser, keeping all other inputs as constant. So the network topology is an effective way to optimize the output power. The process by each nodes into the network is illustrated graphically for three, five and seven SLs, respectively. Also the whole network can be implemented as an optical communication system for transmission of signals. Each SL can act as a transceiver during communication. The communication process is examined using a chaotic signal as a plaintext connected with the SL hub and successfully provided a symmetrically secure mechanism upon the communication protocol. The result shows the optimization of output power with the increment of the number of nodes. Also the communication scheme can successfully decode the encrypted signal from SL Hub, at each other nodes.
A simple language to script and simulate breeding schemes: the breeding scheme language
It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...
Hinsz
1999-10-01
Group decisions involving responses of a quantitative nature occur frequently in organizations. Although extensive research has considered group decisions involving discrete responses, only recently have responses involving quantities received comparable attention. It is proposed that the group decision processes related to quantities involve compromise and are characteristically different from the consensus processes that occur for discrete choices. The theory of social decision schemes (Davis, 1973) as originally formulated is intractable for quantitative responses because they involve a large number of response alternatives. This paper extends and adapts the theory of social decision schemes to apply it to group decisions of a quantitative nature. The decision schemes considered in modeling group decisions for quantitative responses also differ from those of discrete responses. The classes of decision schemes considered include central tendency, consensus-based, faction-attraction, coalition, distance-influence, dictator, special cases, and other. Unique approaches for evaluating the adequacy of these decision schemes for quantities are considered. An illustration of the theory of social decision schemes for quantities is presented with data from research on group goal decisions (Hinsz, 1991). Copyright 1999 Academic Press.
Is a Multi-Hop Relay Scheme Gainful in an IEEE 802.22-Based Cognitive Radio System?
Shin, Jungchae; Lee, Dong-Kyu; Cho, Ho-Shin
In this paper, we formulate a plan to operate multi-hop relays in IEEE 802.22-based cognitive radio (CR) systems and evaluate system performance to consider the propriety of a multi-hop relay scheme in CR systems. A centralized radio resource management and a simple deployment of relay stations (RSs) are assessed to make relay operations feasible under CR conditions. Simulation results show that the proposed multi-hop relay scheme significantly increases system throughput compared to a no-relay CR system as the incumbent user (IU) traffic gets heavier. Furthermore, the optimal number of hops can be determined given the traffic conditions.
An efficient compression scheme for bitmap indices
Energy Technology Data Exchange (ETDEWEB)
Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie
2004-04-13
When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time
Mapping Mangrove Density from Rapideye Data in Central America
Son, Nguyen-Thanh; Chen, Chi-Farn; Chen, Cheng-Ru
2017-06-01
Mangrove forests provide a wide range of socioeconomic and ecological services for coastal communities. Extensive aquaculture development of mangrove waters in many developing countries has constantly ignored services of mangrove ecosystems, leading to unintended environmental consequences. Monitoring the current status and distribution of mangrove forests is deemed important for evaluating forest management strategies. This study aims to delineate the density distribution of mangrove forests in the Gulf of Fonseca, Central America with Rapideye data using the support vector machines (SVM). The data collected in 2012 for density classification of mangrove forests were processed based on four different band combination schemes: scheme-1 (bands 1-3, 5 excluding the red-edge band 4), scheme-2 (bands 1-5), scheme-3 (bands 1-3, 5 incorporating with the normalized difference vegetation index, NDVI), and scheme-4 (bands 1-3, 5 incorporating with the normalized difference red-edge index, NDRI). We also hypothesized if the obvious contribution of Rapideye red-edge band could improve the classification results. Three main steps of data processing were employed: (1), data pre-processing, (2) image classification, and (3) accuracy assessment to evaluate the contribution of red-edge band in terms of the accuracy of classification results across these four schemes. The classification maps compared with the ground reference data indicated the slightly higher accuracy level observed for schemes 2 and 4. The overall accuracies and Kappa coefficients were 97% and 0.95 for scheme-2 and 96.9% and 0.95 for scheme-4, respectively.
Finite element or Galerkin type semidiscrete schemes
Durgun, K.
1983-01-01
A finite element of Galerkin type semidiscrete method is proposed for numerical solution of a linear hyperbolic partial differential equation. The question of stability is reduced to the stability of a system of ordinary differential equations for which Dahlquist theory applied. Results of separating the part of numerical solution which causes the spurious oscillation near shock-like response of semidiscrete scheme to a step function initial condition are presented. In general all methods produce such oscillatory overshoots on either side of shocks. This overshoot pathology, which displays a behavior similar to Gibb's phenomena of Fourier series, is explained on the basis of dispersion of separated Fourier components which relies on linearized theory to be satisfactory. Expository results represented.
Sellafield Site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. Several categories of emergencies on the Sellafield Site are mentioned; a building emergency which is confined to one building, a Site emergency standby when the effects of a building emergency go outside that building, a Site emergency alert (District Emergency Standby) when a release of activity affects Site operations and could have serious Site effects and a District Emergency Alert when a radioactivity release may interfere with the normal activity of the General Public. A Drigg Emergency Standby situation would operate similarly at the Drigg Site. The detailed arrangements and responsibilities of appointed personnel are set out in this manual. (UK)
New CERN Health Insurance Scheme (CHIS) forms
HR Department
2015-01-01
New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released: form for claiming reimbursement of medical expenses, form for requesting advance reimbursement, and dental estimate form (for treatments foreseen to exceed 800 CHF). The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).
Design of Infusion Schemes for Neuroreceptor Imaging
DEFF Research Database (Denmark)
Feng, Ling; Svarer, Claus; Madsen, Karine
2016-01-01
for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...
An efficient training scheme for supermodels
Schevenhoven, Francine J.; Selten, Frank M.
2017-06-01
Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.
Auction dynamics: A volume constrained MBO scheme
Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim
2018-02-01
We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.
An Improved Overloading Scheme for Downlink CDMA
Directory of Open Access Journals (Sweden)
Marc Moeneclaey
2005-04-01
Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.
Parasitology: United Kingdom National Quality Assessment Scheme.
Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.
1992-01-01
AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791
The PSO support scheme for natural gas - subsidy to industry or environmental policy
International Nuclear Information System (INIS)
Eldegard, Tom
2006-01-01
Some aspects of the PSO scheme for natural gas are examined critically. Two central arguments used for justifying the PSO subsidy scheme of natural gas and its distribution are reviewed; these include the 'smallholder argument' and the 'environmental argument'. The 'smallholder argument' claims that since Norway has the natural gas resources, it should also make use of the natural gas in the country, and not simply send the raw material to other countries. The 'environmental argument' states that natural gas compared to other fossil fuels such as coal and fuel oil, is a far cleaner alternative, thus an environmental-friendly alternative entitled to financial support. The arguments are critically examined by the author (ml)
Variable flavor scheme for final state jets
International Nuclear Information System (INIS)
Pietrulewicz, P.
2014-01-01
In this thesis I describe a setup to treat mass effects from secondary radiation of heavy quark pairs in inclusive hard scattering processes with various dynamical scales. The resulting variable flavor number scheme (VFNS) generalizes a well-known scheme for massive initial state quarks which has been developed for deep inelastic scattering (DIS) in the classical region 1 - x ⁓ O(1) and which will be also discussed here. The setup incorporated in the formalism of Soft-Collinear Effective Theory (SCET) consistently takes into account the effects of massive quark loops and allows to deal with all hierarchies between the mass scale and the involved kinematic scales corresponding to collinear and soft radiation. It resums all large logarithms due to flavor number dependent evolution, achieves both decoupling for very large masses and the correct massless behavior for very small masses, and provides a continuous description in between. In the bulk of this work I will concentrate on DIS in the endpoint region x → 1 serving mainly as a showcase for the concepts and on the thrust distribution for e + e - -collisions in the dijet limit as a phenomenologically relevant example for an event shape. The computations of the corrections to the structures in the factorization theorems are described explicitly for the singular terms at O(α s 2 C F T F ) arising from secondary radiation of massive quarks through gluon splitting. Apart from the soft function for thrust, which requires a dedicated calculation, these results are directly obtained from the corresponding results for the radiation of a massive gauge boson with vector coupling at O(α s ) with the help of dispersion relations, and most of the relevant conceptual and technical issues can be dealt with already at this level. Finally, to estimate the impact of the corrections I carry out a numerical analysis for secondary massive bottom and top quarks on thrust distributions at different center-of-mass energies
A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems.
Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok
2018-03-17
Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target's trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes.
Quantum attack-resistent certificateless multi-receiver signcryption scheme.
Directory of Open Access Journals (Sweden)
Huixian Li
Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
MIMO transmit scheme based on morphological perceptron with competitive learning.
Valente, Raul Ambrozio; Abrão, Taufik
2016-08-01
This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.
Pradhan, P. K.; Liberato, Margarida L. R.; Ferreira, Juan A.; Dasamsetti, S.; Vijaya Bhaskara Rao, S.
2018-01-01
The role of the convective parameterization schemes (CPSs) in the ARW-WRF (WRF) mesoscale model is examined for extratropical cyclones (ETCs) over the North Atlantic Ocean. The simulation of very severe winter storms such as Xynthia (2010) and Gong (2013) are considered in this study. Most popular CPSs within WRF model, along with Yonsei University (YSU) planetary boundary layer (PBL) and WSM6 microphysical parameterization schemes are incorporated for the model experiments. For each storm, four numerical experiments were carried out using New Kain Fritsch (NKF), Betts-Miller-Janjic (BMJ), Grell 3D Ensemble (Gr3D) and no convection scheme (NCS) respectively. The prime objectives of these experiments were to recognize the best CPS that can forecast the intensity, track, and landfall over the Iberian Peninsula in advance of two days. The WRF model results such as central sea level pressure (CSLP), wind field, moisture flux convergence, geopotential height, jet stream, track and precipitation have shown sensitivity CPSs. The 48-hour lead simulations with BMJ schemes produce the best simulations both regarding ETCs intensity and track than Gr3D and NKF schemes. The average MAE and RMSE of intensities are least that (6.5 hPa in CSLP and 3.4 ms- 1 in the 10-m wind) found in BMJ scheme. The MAE and RMSE for and intensity and track error have revealed that NCS produces large errors than other CPSs experiments. However, for track simulation of these ETCs, at 72-, 48- and 24-hour means track errors were 440, 390 and 158 km respectively. In brevity, BMJ and Gr3D schemes can be used for short and medium range predictions of the ETCs over North Atlantic. For the evaluation of precipitation distributions using Gr3D scheme are good agreement with TRMM satellite than other CPSs.
International Nuclear Information System (INIS)
Lutz, J.H.
1978-01-01
Difficulties occurring in the observation of central stars of planetary nebulae are reviewed with emphasis on spectral classifications and population types, and temperature determination. Binary and peculiar central stars are discussed. (U.M.G.)
U.S. Department of Health & Human Services — The NIDDK Central Repository stores biosamples, genetic and other data collected in designated NIDDK-funded clinical studies. The purpose of the NIDDK Central...
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
Directory of Open Access Journals (Sweden)
Xingbing Fu
2015-08-01
Full Text Available In the existing attribute-based encryption (ABE scheme, the authority (i.e., private key generator (PKG is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE scheme. To mitigate this problem, we propose the black box traceable ciphertext policy attribute-based encryption (T-CP-ABE scheme in which if the PKG re-distributes the users’ private keys for malicious uses, it might be caught and sued. We provide a construction to realize the T-CP-ABE scheme in a black box model. Our scheme is based on the decisional bilinear Diffie-Hellman (DBDH assumption in the standard model. In our scheme, we employ a pair (ID, S to identify a user, where ID denotes the identity of a user and S denotes the attribute set associated with her.
TVD schemes in one and two space dimensions
International Nuclear Information System (INIS)
Leveque, R.J.; Goodman, J.B.; New York Univ., NY)
1985-01-01
The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references
A novel quantum group signature scheme without using entangled states
Xu, Guang-Bao; Zhang, Ke-Jia
2015-07-01
In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.
Schemes of neutrino mixings (oscillations) and their mixing matrices
International Nuclear Information System (INIS)
Beshtoev, Kh.M.
2004-01-01
Three schemes of neutrino mixings (oscillations) together with their mixing matrices (analogous to Kabibbo-Kobayashi-Maskawa matrices) are considered. In these schemes neutrino transitions are virtual if neutrino masses are different. Two of them belong to the so-called mass mixing schemes (mixing parameters are expressed by elements of mass matrices) and the third scheme belongs to the charge mixing one (mixing parameters are expressed through charges). In the first scheme, six equations for determination of all the elements of the mass matrix (neutrino masses and transition widths) are given using experimental data. In the second and third ones the mixing angles are equal or close to maximal angles (π/4). It is obvious that the experiment must give an answer to the following question: Which of these schemes is realized indeed?
A high-fidelity memory scheme for quantum data buses
International Nuclear Information System (INIS)
Liu Bo-Yang; Chen Xi; Zhang Ming; Cui Wei; Dai Hong-Yi
2017-01-01
A novel quantum memory scheme is proposed for quantum data buses in scalable quantum computers by using adjustable interaction. Our investigation focuses on a hybrid quantum system including coupled flux qubits and a nitrogen–vacancy center ensemble. In our scheme, the transmission and storage (retrieval) of quantum state are performed in two separated steps, which can be controlled by adjusting the coupling strength between the computing unit and the quantum memory. The scheme can be used not only to reduce the time of quantum state transmission, but also to increase the robustness of the system with respect to detuning caused by magnetic noises. In comparison with the previous memory scheme, about 80% of the transmission time is saved. Moreover, it is exemplified that in our scheme the fidelity could achieve 0.99 even when there exists detuning, while the one in the previous scheme is 0.75. (paper)
A hybrid pi control scheme for airship hovering
International Nuclear Information System (INIS)
Ashraf, Z.; Choudhry, M.A.; Hanif, A.
2012-01-01
Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)
Cost-Prioritized Droop Schemes for Autonomous AC Microgrids
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng
2015-01-01
This paper presents two cost-prioritized droop sche- mes for distributed generators (DGs) in a rural or islanded microgrid. Dispatch prioritization of the schemes allows autonomous identification of the appropriate DGs for generation, in accordance to the overall load conditions of the microgrid....... The result is a lower total generation cost for the microgrid when compared to other droop schemes. An experimental system has been implemented and tested with results showing a higher saving achieved by the proposed schemes....
Symplectic and multisymplectic schemes with the simple finite element method
International Nuclear Information System (INIS)
Zhen Liu; Bai Yongqiang; Li Qisheng; Wu Ke
2003-01-01
We study the numerical scheme of elliptic equations by the finite element method. With the special finite element domain, we can find that the scheme can keep a preserved symplectic structure in one-dimensional case and a preserved multisymplectic structure in two-dimensional case. Then we consider the discrete variational principle with the finite element method in the corresponding Lagrangian formalism for classical mechanics and field theory and get the symplectic or multisymplectic scheme of the Euler-Lagrangian equation
Optimized variational analysis scheme of single Doppler radar wind data
Sasaki, Yoshi K.; Allen, Steve; Mizuno, Koki; Whitehead, Victor; Wilk, Kenneth E.
1989-01-01
A computer scheme for extracting singularities has been developed and applied to single Doppler radar wind data. The scheme is planned for use in real-time wind and singularity analysis and forecasting. The method, known as Doppler Operational Variational Extraction of Singularities is outlined, focusing on the principle of local symmetry. Results are presented from the application of the scheme to a storm-generated gust front in Oklahoma on May 28, 1987.
Two Conservative Difference Schemes for Rosenau-Kawahara Equation
Directory of Open Access Journals (Sweden)
Jinsong Hu
2014-01-01
Full Text Available Two conservative finite difference schemes for the numerical solution of the initialboundary value problem of Rosenau-Kawahara equation are proposed. The difference schemes simulate two conservative quantities of the problem well. The existence and uniqueness of the difference solution are proved. It is shown that the finite difference schemes are of second-order convergence and unconditionally stable. Numerical experiments verify the theoretical results.
An efficient parallel computing scheme for Monte Carlo criticality calculations
International Nuclear Information System (INIS)
Dufek, Jan; Gudowski, Waclaw
2009-01-01
The existing parallel computing schemes for Monte Carlo criticality calculations suffer from a low efficiency when applied on many processors. We suggest a new fission matrix based scheme for efficient parallel computing. The results are derived from the fission matrix that is combined from all parallel simulations. The scheme allows for a practically ideal parallel scaling as no communication among the parallel simulations is required, and inactive cycles are not needed.
Sound classification of dwellings - Comparison of schemes in Europe
DEFF Research Database (Denmark)
Rasmussen, Birgit
2009-01-01
National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwelling....... The current variety of descriptors and classes also causes trade barriers. Thus, there is a need to harmonize concepts and other characteristics of the schemes....
Theory analysis and simple calculation of travelling wave burnup scheme
International Nuclear Information System (INIS)
Zhang Jian; Yu Hong; Gang Zhi
2012-01-01
Travelling wave burnup scheme is a new burnup scheme that breeds fuel locally just before it burns. Based on the preliminary theory analysis, the physical imagine was found. Through the calculation of a R-z cylinder travelling wave reactor core with ERANOS code system, the basic physical characteristics of this new burnup scheme were concluded. The results show that travelling wave reactor is feasible in physics, and there are some good features in the reactor physics. (authors)
Two IP Protection Schemes for Multi-FPGA Systems
Gaspar, Lubos; Fischer, Viktor; Guneysu, Tim; Cherif, Zouha
2012-01-01
International audience; This paper proposes two novel protection schemes for multi-FPGA systems providing high security of IP designs licensed by IP vendors to system integrators and installed remotely in a hostile environment. In the first scheme, these useful properties are achieved by storing two different configuration keys inside an FPGA, while in the second scheme, they are obtained using a hardware white-box cipher for creating a trusted environment. Thanks to the proposed principles, ...
A repeat-until-success quantum computing scheme
Energy Technology Data Exchange (ETDEWEB)
Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)
2007-06-15
Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.
A repeat-until-success quantum computing scheme
International Nuclear Information System (INIS)
Beige, A; Lim, Y L; Kwek, L C
2007-01-01
Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes
Type monotonic allocation schemes for multi-glove games
Brânzei, R.; Solymosi, T.; Tijs, S.H.
2007-01-01
Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...
Scanning schemes in white light Photoelasticity - Part I: Critical assessment of existing schemes
Ramakrishnan, Vivek; Ramesh, K.
2017-05-01
The use of white light based Three Fringe Photoelasticity (TFP)/RGB Photoelasticity has gained importance in the recent years. With recent advances in TFP, it is possible to resolve fringe orders upto twelve. The main advantage of this technique is that it requires only a single image for isochromatic demodulation, which makes it suitable especially for problems where recording multiple images is difficult. The accuracy of isochromatic data obtained using TFP/RGB Photoelasticity is dependent on the scanning scheme used to refine the data, which is necessary to incorporate fringe order continuity. In this paper, the existing scanning schemes are critically evaluated for their ability to scan the entire model domain, influence of seed point selection and noise propagation. The scanning schemes are assessed using four problems of increasing level of geometric complexity - Circular disc under compression (simply connected), bi-axially loaded cruciform specimen with an inclined crack, a thick ring subjected to internal pressure and a finite plate with a hole (multiply connected).
SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users
Directory of Open Access Journals (Sweden)
Fenghua Li
2018-02-01
Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics
International Nuclear Information System (INIS)
Brodsky, Stanley J.
1998-01-01
Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed
Computerized calculation scheme for toric intraocular lenses.
Langenbucher, Achim; Seitz, Berthold
2004-06-01
While a number of intraocular lens (IOL) power prediction formulae are well established for determination of spherical lenses, no common strategy has been published for the computation of toric IOLs. The purpose of this study is to describe a paraxial computing scheme for tracing an axial pencil of rays through the 'optical system eye' containing astigmatic refractive surfaces with their axes at random. The capabilities of this computing scheme are demonstrated with clinical examples. Based on a schematic model eye with spherocylindric surfaces, we use two alternative notations for description of vergences or prescriptions: (1) standard notation (refraction in both cardinal meridians and axis), and (2) component notation (spherical equivalent and cylindric component in 0 degrees and 45 degrees. Refractive surfaces are added to the vergence in component notation, whereas the transformation of the vergence through media is performed in the standard notation for both cardinal meridians. For calculation of the toric lens implant, a pencil of rays is traced through the spectacle and the cornea to the estimated lens position as well as backwards from the retina to the estimated lens position. For calculation of residual spectacle refraction, a pencil of rays is traced backwards from the retina through the toric lens implant and the cornea to the spectacle plane. In example 1 we calculate a 'thin toric lens' for compensation of a corneal astigmatism to achieve a spherical target refraction. In example 2 we compute a 'thick toric lens', which has to compensate for an oblique corneal astigmatism and rotate the spectacle cylinder to the against the rule position to enhance near vision. In example 3 we estimate the residual refraction at the corneal plane after implantation of a thick toric lens, when the cylinder of the lens implant is compensating the corneal cylinder in part and the axis of implantation is not fully aligned with the axis of the corneal astigmatism. This
Nested Hilbert schemes on surfaces: Virtual fundamental class
DEFF Research Database (Denmark)
Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung
We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...
Adaptive transmission schemes for MISO spectrum sharing systems
Bouida, Zied
2013-06-01
We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.
A Digital Signature Scheme Based on MST3 Cryptosystems
Directory of Open Access Journals (Sweden)
Haibo Hong
2014-01-01
Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.
Additive Difference Schemes for Filtration Problems in Multilayer Systems
Ayrjan, E A; Pavlush, M; Fedorov, A V
2000-01-01
In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.
Scheme for achieving coherent perfect absorption by anisotropic metamaterials
Zhang, Xiujuan
2017-02-22
We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.
Two adaptive radiative transfer schemes for numerical weather prediction models
Directory of Open Access Journals (Sweden)
V. Venema
2007-11-01
Full Text Available Radiative transfer calculations in atmospheric models are computationally expensive, even if based on simplifications such as the δ-two-stream approximation. In most weather prediction models these parameterisation schemes are therefore called infrequently, accepting additional model error due to the persistence assumption between calls. This paper presents two so-called adaptive parameterisation schemes for radiative transfer in a limited area model: A perturbation scheme that exploits temporal correlations and a local-search scheme that mainly takes advantage of spatial correlations. Utilising these correlations and with similar computational resources, the schemes are able to predict the surface net radiative fluxes more accurately than a scheme based on the persistence assumption. An important property of these adaptive schemes is that their accuracy does not decrease much in case of strong reductions in the number of calls to the δ-two-stream scheme. It is hypothesised that the core idea can also be employed in parameterisation schemes for other processes and in other dynamical models.
Scheme and scale dependences of leading electroweak corrections
International Nuclear Information System (INIS)
Kniehl, B.A.; Sirlin, A.
1996-01-01
The scheme and scale dependences of leading M t -dependent contributions to Δρ, Δr, and τ, which arise because of the truncation of the perturbative series, are investigated by comparing expressions in the on-shell and MS schemes of renormalization, and studying their scale variations. Starting from the conventional on-shell formulae, we find rather large scheme and scale dependences. We then propose a simple, physically motivated modification of the conventional expressions and show that it leads to a sharp reduction in the scheme and scale dependences. Implications for electroweak physics are discussed. (orig.)
DEFF Research Database (Denmark)
Savaghebi, Mehdi; Jalilian, Alireza; Vasquez, Juan Carlos
2012-01-01
The concept of microgrid hierarchical control is presented recently. In this paper, a hierarchical scheme is proposed which includes primary and secondary control levels. The primary level comprises distributed generators (DGs) local controllers. The local controllers mainly consist of power......, voltage and current controllers, and virtual impedance control loop. The central secondary controller is designed to manage the compensation of voltage unbalance at the point of common coupling (PCC) in an islanded microgrid. Unbalance compensation is achieved by sending proper control signals to the DGs...
Jha, Pradeep Kumar
Capturing the effects of detailed-chemistry on turbulent combustion processes is a central challenge faced by the numerical combustion community. However, the inherent complexity and non-linear nature of both turbulence and chemistry require that combustion models rely heavily on engineering approximations to remain computationally tractable. This thesis proposes a computationally efficient algorithm for modelling detailed-chemistry effects in turbulent diffusion flames and numerically predicting the associated flame properties. The cornerstone of this combustion modelling tool is the use of parallel Adaptive Mesh Refinement (AMR) scheme with the recently proposed Flame Prolongation of Intrinsic low-dimensional manifold (FPI) tabulated-chemistry approach for modelling complex chemistry. The effect of turbulence on the mean chemistry is incorporated using a Presumed Conditional Moment (PCM) approach based on a beta-probability density function (PDF). The two-equation k-w turbulence model is used for modelling the effects of the unresolved turbulence on the mean flow field. The finite-rate of methane-air combustion is represented here by using the GRI-Mech 3.0 scheme. This detailed mechanism is used to build the FPI tables. A state of the art numerical scheme based on a parallel block-based solution-adaptive algorithm has been developed to solve the Favre-averaged Navier-Stokes (FANS) and other governing partial-differential equations using a second-order accurate, fully-coupled finite-volume formulation on body-fitted, multi-block, quadrilateral/hexahedral mesh for two-dimensional and three-dimensional flow geometries, respectively. A standard fourth-order Runge-Kutta time-marching scheme is used for time-accurate temporal discretizations. Numerical predictions of three different diffusion flames configurations are considered in the present work: a laminar counter-flow flame; a laminar co-flow diffusion flame; and a Sydney bluff-body turbulent reacting flow
Date attachable offline electronic cash scheme.
Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung
2014-01-01
Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.
Radiation Protection Officer certification scheme. Malaysian experience
International Nuclear Information System (INIS)
Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah
2011-01-01
In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)
Combination of scoring schemes for protein docking
Directory of Open Access Journals (Sweden)
Schomburg Dietmar
2007-08-01
Full Text Available Abstract Background Docking algorithms are developed to predict in which orientation two proteins are likely to bind under natural conditions. The currently used methods usually consist of a sampling step followed by a scoring step. We developed a weighted geometric correlation based on optimised atom specific weighting factors and combined them with our previously published amino acid specific scoring and with a comprehensive SVM-based scoring function. Results The scoring with the atom specific weighting factors yields better results than the amino acid specific scoring. In combination with SVM-based scoring functions the percentage of complexes for which a near native structure can be predicted within the top 100 ranks increased from 14% with the geometric scoring to 54% with the combination of all scoring functions. Especially for the enzyme-inhibitor complexes the results of the ranking are excellent. For half of these complexes a near-native structure can be predicted within the first 10 proposed structures and for more than 86% of all enzyme-inhibitor complexes within the first 50 predicted structures. Conclusion We were able to develop a combination of different scoring schemes which considers a series of previously described and some new scoring criteria yielding a remarkable improvement of prediction quality.
Innovative ICF scheme-impact fast ignition
International Nuclear Information System (INIS)
Murakami, M.; Nagatomo, H.; Sakaiya, T.; Karasik, M.; Gardner, J.; Bates, J.
2007-01-01
A totally new ignition scheme for ICF, impact fast ignition (IFI), is proposed [1], in which the compressed DT main fuel is to be ignited by impact collision of another fraction of separately imploded DT fuel, which is accelerated in the hollow conical target. Two-dimensional hydrodynamic simulation results in full geometry are presented, in which some key physical parameters for the impact shell dynamics such as 10 8 cm/s of the implosion velocity, 200- 300 g/cm 3 of the compressed density, and the converted temperature beyond 5 keV are demonstrated. As the first step toward the proof-of-principle of IFI, we have conducted preliminary experiments under the operation of GEKKO XII/HYPER laser system to achieve a hyper-velocity of the order of 108 cm/s. As a result we have observed a highest velocity, 6.5 x 10 7 cm/s, ever achieved. Furthermore, we have also done the first integrated experiments using the target and observed substantial amount of neutron yields. Reference: [1] M. Murakami and Nagatomo, Nucl. Instrum. Meth. Phys. Res. A 544(2005) 67
Adaptive Scheme for the CLIC Orbit Feedback
Pfingstner, J; Hofbaur, M
2010-01-01
One of the major challenges of the CLIC main linac is the preservation of the ultra-low beam emittance. The dynamic effect of ground motion would lead to a rapid emittance increase. have to be counteracted by using orbit feedback (FB) systems. Orbit feedback systems (FB) have to be optimized to optimally attenuate ground motion (disturbance), in spite of drifts of accelerator parameters (imperfect system knowledge). This paper presents a new FB strategy for the main linac of CLIC. It addresses the above mentioned issues, with the help of an adaptive control scheme. The rst part of this system is a system identication unit. It delivers an estimate of the time-varying system behavior. The second part is a control algorithm, which uses the most recent system estimate of the identication unit. It uses H2 control theory to deliver an optimal prediction of the ground motion. This approach takes into account the frequency and spacial properties of the ground motion, as well as their impact on the emittance growth.
Date Attachable Offline Electronic Cash Scheme
Directory of Open Access Journals (Sweden)
Chun-I Fan
2014-01-01
Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.
Password Authentication Scheme with Secured Login Interface
Directory of Open Access Journals (Sweden)
AKINWALE A. Taofiki
2009-12-01
Full Text Available This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his password, and then enter these code in place of his actual password characters. This approach does not require the input code to be hidden from anyone or converted to placeholder characters for security reasons. Our solution engine regenerates new code for each character each time the carriage return key is struck, producing a hardened password that is convincingly more secure than conventional password entry system against both online and offline attackers. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance.
Appraisal of bio-hydrogen production schemes
International Nuclear Information System (INIS)
Bent Sorensen
2006-01-01
Work is ongoing on several schemes of biological hydrogen production. At one end is the genetic modification of biological systems (such as algae or cyanobacteria) to produce hydrogen from photosynthesis, instead of the energy-rich compounds (such as NADPH 2 ) normally constituting the endpoint of the transformations through the photo-systems. A second route is to collect and use the biomass produced by normal plant growth processes in a separate step that produces hydrogen. This may be done similar to biogas production by fermentation, where the endpoint is methane (plus CO 2 and minor constituents). Hydrogen could be the outcome of a secondary process starting from methane, involving any of the conventional methods of hydrogen production from natural gas. An alternative to fermentation is gasification of the biomass, followed by a shift-reaction leading to hydrogen. I compare advantages and disadvantages of these three routes, notably factors such as system efficiency, cost and environmental impacts, and also compare them to liquid biofuels. (author)
Quantifying the morphodynamics of river restoration schemes using Unmanned Aerial Vehicles (UAVs)
Williams, Richard; Byrne, Patrick; Gilles, Eric; Hart, John; Hoey, Trevor; Maniatis, George; Moir, Hamish; Reid, Helen; Ves, Nikolas
2017-04-01
from a SenseFly Swinglet CAM UAV with a Canon IXUS 240 HS camera. Results indicate that if targets were distributed centrally then vertical distortions would be most notable in outer region of the processing domain; if an edge pattern was used then vertical errors were greatest in the central region of the processing domain; if targets were distributed randomly then errors were more evenly distributed. For this optimal random layout, vertical errors were lowest when 15 to 23 targets were used as GCPs. The best solution achieved planimetric (XY) errors of 0.006 m and vertical (Z) errors of 0.05 m. This result was used to determine target density and distribution for repeat surveys on two other restoration schemes, Whit Beck (Cumbria, England) and Allt Lorgy (Highlands, Scotland). These repeat surveys have been processed to produce DEMs of Difference (DoDs). The DoDs have been used to quantify the spatial distribution of erosion and deposition of these schemes due to high-flow events. Broader interpretation enables insight into patterns of morphological sensitivity that are related to scheme design.
A parametrisation scheme for effective interactions
International Nuclear Information System (INIS)
Geramb, H.V. von; Amos, K.; Berge, L.
1991-01-01
An algorithm is developed by which two nucleon effective interactions are constructed to fit on- and off-shell t- and/or g-matrix elements. The effective interaction is defined as plane wave matrix elements of local operators that may have explicit energy and medium dependencies. It comprises central, tensor, spin-orbit, quadratic spin-orbit and angular momentum square operators, all with Yukawa form factors. As examples, the Paris and Bonn potentials are used to construct t-matrices for projection onto chosen forms of effective interactions. 23 refs., 3 tabs., 5 figs
Design and comparison of gene-pyramiding schemes in animals.
Zhao, F P; Jiang, L; Gao, H J; Ding, X D; Zhang, Q
2009-08-01
Marker-assisted gene pyramiding provides a promising way to develop new animal breeds or lines, in which genes responsible for certain favorable characters identified in different breeds or lines are incorporated. In consideration of features of animal populations, we proposed five schemes for pyramiding three genes, denoted Scheme A-E, and five schemes for pyramiding four genes, denoted Scheme F-J. These schemes are representative of the possible alternatives. We also provided an algorithm to compute the population sizes needed in each generation. We compared these schemes with respect to the total population size and the number of generations required under different situations. The results show that there is no scheme that is optimal in all cases. Among the schemes for pyramiding three genes from three lines (L1, L2 and L3), Scheme D (a three-way cross between the three lines are first performed, followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) has a significant advantage over the other schemes when the recombination rate between adjacent genes ranges from 0.1 to 0.4, while Scheme A (a two-way cross between L1 and L2 and a subsequent intercross are performed, followed by a cross with L3 and a subsequent intercross to obtain the desired genotype) is optimal when recombination rate is 0.5. Among schemes for pyramiding four genes from four lines (L1, L2, L3 and L4), Scheme I (seperately, a two-way cross between L1 and L2 (L3 and L4) followed by a backcross to L1 (L3) and a subsequent intercross are performed, then the offspring from the two sides are crossed and followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) is optimal when the recombination rate ranges from 0.1 to 0.4, while Scheme F (cross and subsequent intercross between the four lines are performed successively) is the optimal when the recombination rate is 0.5. We also disscuss how the animals' reproductive capacity, the
Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes
Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.
2018-03-01
Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.
Gizaw, S; Getachew, T; Tibbo, M; Haile, A; Dessie, T
2011-05-01
Designing breeding schemes suitable for smallholder livestock production systems in developing regions has hitherto been a challenge. The suggested schemes either do not address farmers' breeding goals (centralized station-based nucleus schemes) or yield slow genetic progress (village-based schemes). A new breeding scheme that integrates the merits of previously suggested schemes has been designed for Menz sheep improvement in Ethiopia. It involves selection based on breeding values in nucleus flocks to produce elite rams, a one-time only provision of improved rams to villagers and a follow-up village-based selection to sustain genetic progress in village flocks. Here, we assessed whether conventional selection of breeding rams based on breeding values for production traits, which is the practice in station-based nucleus flocks, meets farmers' breeding objectives. We also elicited determinants of farmers' ram choice. Low but significant correlations were found between rankings of rams based on farmers' selection criteria, estimated breeding values (EBV) and body weight (BW). Appearance traits (such as color and horn) and meat production traits (BW and linear size traits) significantly determined farmers' breeding ram choice. The results imply that conventional selection criteria based solely on EBV for production traits do not address farmers' trait preferences fully, but only partially. Thus, a two-stage selection procedure involving selection on breeding values in nucleus centers followed by farmers' selection among top- ranking candidate rams is recommended. This approach accommodates farmers' preferences and speeds up genetic progress in village-based selection. The Menz sheep scheme could be applied elsewhere with similar situations to transform conventional station-based nucleus breeding activities into participatory breeding programs.
Awareness and Coverage of the National Health Insurance Scheme ...
African Journals Online (AJOL)
Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of coverage of the scheme among the formal sector workers in Nigeria as a proxy to gauge the extent of coverage of the scheme and derive suitable lessons that could be used in its expansion.
Abelianization of the F-divided fundamental group scheme
Indian Academy of Sciences (India)
INDRANIL BISWAS
[6] Kleiman S, The Picard Scheme, in: Fundamental algebraic geometry, Mathematical Sur- veys and Monographs (2005) (Providence, RI: American Mathematical Society) vol. 123. [7] Langer A, On the S-fundamental group scheme. II, J. Inst. Math. Jussieu 11 (2012) 835–. 854. [8] Mumford D, Abelian Varieties, Second ...
Settlement Schemes as Centres of Socio-Economic Change: The ...
African Journals Online (AJOL)
settlement scheme, population pressure, Abagusii, traditional land reserves, systematic random sampling,extension worker, mass socio-economic transformation, household, Nyansiongo settelement scheme, Nyamira, Kenya Résumé Des travaux sur le terrain pour cette étude ont été conduits entre les mois de novembre ...
Design Scheme of Remote Monitoring System Based on Qt
Directory of Open Access Journals (Sweden)
Xu Dawei
2015-01-01
Full Text Available This paper introduces a design scheme of remote monitoring system based on Qt, the scheme of remote monitoring system based on S3C2410 and Qt, with the aid of cross platform development tools Qt and powerful ARM platform design and implementation. The development of remote video surveillance system based on embedded terminal has practical significance and value.
The Defunct Rivers State 'School to Land' Scheme: A Dream ...
African Journals Online (AJOL)
Ensuring food security and self-reliance through farming made many countries to embark on farming schemes such as the Gezira in Sudan, Alto Beni in Bolivia, Nyakashaka of Uganda, farming settlements of Eastern and Western Nigeria and the ―School to Land‖ scheme. The initial euphoria that welcomed these ...
Smallholder irrigation schemes in South Africa: A review of ...
African Journals Online (AJOL)
The status and characteristics of the 302 smallholder irrigation schemes found in South Africa are discussed and knowledge on South African smallholder irrigation schemes generated by the Water Research Commission (WRC) over a period of nearly 20 years is reviewed. Themes covered include planning, design and ...
Construction of Association Scheme Using Some (123)-avoiding ...
African Journals Online (AJOL)
This paper presents some backgrounds research on association scheme using a class of (123)-avoiding pattern of Aunu numbers as an application area. It also attempts to highlight some further applications ... concept of association scheme. This research also shows us that the Aunu patterns can be used in design theory.
Conserving GW scheme for nonequilibrium quantum transport in molecular contacts
DEFF Research Database (Denmark)
Thygesen, Kristian Sommer; Rubio, Angel
2008-01-01
We give a detailed presentation of our recent scheme to include correlation effects in molecular transport calculations using the nonequilibrium Keldysh formalism. The scheme is general and can be used with any quasiparticle self-energy, but for practical reasons, we mainly specialize to the so-c...
An efficient entire chaos-based scheme for deniable authentication
International Nuclear Information System (INIS)
Xiao Di; Liao Xiaofeng; Wong, K.W.
2005-01-01
By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce
PI controller scheme for charge balance in implantable electrical ...
Indian Academy of Sciences (India)
parator and an FIR filter, and the scheme was validated in simulation by studying the step responses of the system. In a similar scheme in [11], a P-I controller was used ...... [6] Sooksood K, Stieglitz T and Ortmanns M 2009 An experimen- tal study on passive charge balancing. Adv. Radio Sci. 7(15):. 197–200. [7] Lee E K F ...
Convexity-preserving Bernstein–Bézier quartic scheme
Directory of Open Access Journals (Sweden)
Maria Hussain
2014-07-01
Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.
A novel chaotic encryption scheme based on arithmetic coding
International Nuclear Information System (INIS)
Mi Bo; Liao Xiaofeng; Chen Yong
2008-01-01
In this paper, under the combination of arithmetic coding and logistic map, a novel chaotic encryption scheme is presented. The plaintexts are encrypted and compressed by using an arithmetic coder whose mapping intervals are changed irregularly according to a keystream derived from chaotic map and plaintext. Performance and security of the scheme are also studied experimentally and theoretically in detail
The Impact of Lake Gerio Irrigation Scheme on the Farming ...
African Journals Online (AJOL)
This study assesses the impact of the Gerio irrigation scheme on the registered farming communities of Yola metropolitan area. Data for the study was obtained through a questionnaire survey administered randomly to 183 out of the total of 610 farmers that operated under the scheme. Personal interviews were also ...
Gaps in the implementation of Uganda's students' loan scheme ...
African Journals Online (AJOL)
This study was conducted to examine the performance of the student loan scheme in Uganda. Making reference to related literature, views of selected stakeholders, and the performance of government's earlier lending programmes, the study identifies gaps in the performance of the scheme. These are in the areas of ...
Sensor scheme design for active structural acoustic control
Berkhoff, Arthur P.
Efficient sensing schemes for the active reduction of sound radiation from plates are presented based on error signals derived from spatially weighted plate velocity or near-field pressure. The schemes result in near-optimal reductions as compared to weighting procedures derived from eigenvector or
A scheme for designing extreme multistable discrete dynamical ...
Indian Academy of Sciences (India)
We demonstrate the applicability of our scheme in two-dimensional (2D) as well as threedimensional (3D) discrete dynamical systems. In particular, we discuss our scheme taking coupled 2D Hénon maps, coupled 2D Duffing maps and coupled 3D Hénon maps. We have analytically shown the existence of fixed points and ...
Distance tracking scheme for seamless handover in IMS-based ...
African Journals Online (AJOL)
This paper proposes a fast and seamless handover scheme for systems based on IP Multimedia Subsystem (IMS) architectural framework with Universal Mobile Telecommunications System (UMTS) access network. In the scheme the location, direction and movement pattern of a Mobile Node (MN) in a network cell are ...
Valuation and Hedging of Variable Annuities in Pension Schemes
Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.
2018-01-01
This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable
Scheme on the Web and in the Classroom
DEFF Research Database (Denmark)
Nørmark, Kurt
2012-01-01
LAML is a software system that brings XML languages into Scheme as a collection of Scheme functions. The XML languages are defined by XML document type definitions (DTDs). We review the development of LAML during more than a decade, and we collect the experiences from these efforts. The paper des...
Hybrid Modulation Scheme for Cascaded H-Bridge Inverter Cells ...
African Journals Online (AJOL)
This work proposes a switching technique for cascaded H-Bridge (CHB) cells. Single carrier Sinusoidal PWM (SCSPWM) scheme is employed in the generation of the gating signals. A sequential switching and base PWM circulation schemes are presented for this fundamental cascaded multilevel inverter topology.
The political economy of International Emissions Trading Scheme Choice
DEFF Research Database (Denmark)
Boom, J.T.; Svendsen, Gert Tinggaard
2000-01-01
The Kyoto Protocol allows emission trade between the Annex B countries. We consider three schemes of emissions trading: government trading, permit trading and credit trading. The schemes are compared in a public choice setting focusing on group size and rent-seeking from interest groups. We find ...
Near-optimal labeling schemes for nearest common ancestors
DEFF Research Database (Denmark)
Alstrup, Stephen; Halvorsen, Esben Bistrup; Larsen, Kasper Green
2014-01-01
and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even...
Enrolment on Health Insurance Scheme in Ghana: Evidence from ...
African Journals Online (AJOL)
Enrolment on Health Insurance Scheme in Ghana: Evidence from Mfantseman Municipality. S Sekyi, Peter B Aglobitse, Johnson Addai-Asante. Abstract. The study aimed at analysing the determinants of enrolment in the Ghana's national health insurance scheme. This survey was carried out to collect cross-sectional ...
A New Quantum Communication Scheme by Using Bell States
International Nuclear Information System (INIS)
Cao Haijing; Chen Jing; Song Heshan
2006-01-01
A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).
A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY
The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...
Efficient Client Puzzle Schemes to Mitigate DoS Attacks
Tang, Qiang; Jeckmans, Arjan
2010-01-01
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. In a number of different scenarios, researchers have applied client puzzle schemes to mitigate DoS
Efficient schemes for deterministic joint remote preparation of an ...
Indian Academy of Sciences (India)
We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...
Efficient schemes for deterministic joint remote preparation of an ...
Indian Academy of Sciences (India)
Hao Fu
2017-06-02
Jun 2, 2017 ... We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W- type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help ...
PI controller scheme for charge balance in implantable electrical ...
Indian Academy of Sciences (India)
In this communication, simulation studies on the effectiveness of using Proportional Integral (P-I) control schemes for managing charge balance in electrical stimulation are presented. The adaptation of the P-I control scheme to implant circuits leads to two possible circuit realizations in the analog domain. The governing ...
Bayelsa, in search of a sustainable health financing scheme ...
African Journals Online (AJOL)
Background: A sustainable health care financing scheme has been difficult to establish in Bayelsa State. This is evident in the different attempts at fashioning an effective health financing scheme by subsequent governments. Objectives: This study sought to identify principles that would guide the effective implementation of ...
State of the Art in the Cramer Classification Scheme and ...
Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD. Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD.
Review of pension schemes of Ukraine and Argentina in ...
African Journals Online (AJOL)
The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004 Pension Reform Act ...
Extricating Justification Scheme Theory in Middle School Mathematical Problem Solving
Matteson, Shirley; Capraro, Mary Margaret; Capraro, Robert M.; Lincoln, Yvonna S.
2012-01-01
Twenty middle grades students were interviewed to gain insights into their reasoning about problem-solving strategies using a Problem Solving Justification Scheme as our theoretical lens and the basis for our analysis. The scheme was modified from the work of Harel and Sowder (1998) making it more broadly applicable and accounting for research…
Kadoura, Ahmad Salim
2014-03-17
Molecular simulation could provide detailed description of fluid systems when compared to experimental techniques. They can also replace equations of state; however, molecular simulation usually costs considerable computational efforts. Several techniques have been developed to overcome such high computational costs. In this paper, two early rejection schemes, a conservative and a hybrid one, are introduced. In these two methods, undesired configurations generated by the Monte Carlo trials are rejected earlier than it would when using conventional algorithms. The methods are tested for structureless single-component Lennard-Jones particles in both canonical and NVT-Gibbs ensembles. The computational time reduction for both ensembles is observed at a wide range of thermodynamic conditions. Results show that computational time savings are directly proportional to the rejection rate of Monte Carlo trials. The proposed conservative scheme has shown to be successful in saving up to 40% of the computational time in the canonical ensemble and up to 30% in the NVT-Gibbs ensemble when compared to standard algorithms. In addition, it preserves the exact Markov chains produced by the Metropolis scheme. Further enhancement for NVT-Gibbs ensemble is achieved by combining this technique with the bond formation early rejection one. The hybrid method achieves more than 50% saving of the central processing unit (CPU) time.
Directory of Open Access Journals (Sweden)
M. Huang
2015-09-01
Full Text Available The planetary boundary layer (PBL is the lowest part of the atmosphere and where its character is directly affected by its contact with the underlying planetary surface. The PBL is responsible for vertical sub-grid-scale fluxes due to eddy transport in the whole atmospheric column. It determines the flux profiles within the well-mixed boundary layer and the more stable layer above. It thus provides an evolutionary model of atmospheric temperature, moisture (including clouds, and horizontal momentum in the entire atmospheric column. For such purposes, several PBL models have been proposed and employed in the weather research and forecasting (WRF model of which the Yonsei University (YSU scheme is one. To expedite weather research and prediction, we have put tremendous effort into developing an accelerated implementation of the entire WRF model using graphics processing unit (GPU massive parallel computing architecture whilst maintaining its accuracy as compared to its central processing unit (CPU-based implementation. This paper presents our efficient GPU-based design on a WRF YSU PBL scheme. Using one NVIDIA Tesla K40 GPU, the GPU-based YSU PBL scheme achieves a speedup of 193× with respect to its CPU counterpart running on one CPU core, whereas the speedup for one CPU socket (4 cores with respect to 1 CPU core is only 3.5×. We can even boost the speedup to 360× with respect to 1 CPU core as two K40 GPUs are applied.
Coordination Scheme for Restructuring Business Operation of the Single Period Newsvendor Problem
Directory of Open Access Journals (Sweden)
Chiuh-Cheng Chyu
2013-01-01
Full Text Available This paper presents a coordination scheme for a single period newsvendor problem when both supplier and retailer of the supply chain agree to change the business operation from a market decision power sharing system (Model 1 to a unique decision maker system (Model 2. The supplier is assumed to be a risk-averse decision maker and he will undertake the product quality risk in both models. Model 1 is game theoretic, where the supplier controls the wholesale price, but the retailer controls the order quantity and market price. The bargaining process ends when the supplier has found a wholesale price that maximizes the value of his sales revenue minus the product quality cost. Model 2 is a centralized system where the supplier possesses all decision powers of the market. In general, Model 2 will generate higher total revenue than Model 1. The aim of this research is to propose a satisfying compromise based on consignment policy to resolve the revenue-sharing conflict in Model 2 due to the additional revenue. An example is provided to illustrate the two models and the proposed coordination scheme, along with managerial insights on the models’ benefits. The impacts of several parameters on the scheme are also presented and discussed.
An Efficient V2I Authentication Scheme for VANETs
Directory of Open Access Journals (Sweden)
Yousheng Zhou
2018-01-01
Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.
Receptivity of a TVD Scheme in Incompressible Flow Analysis
Shin, Byeong Rog
A TVD upwind scheme originally designed for compressible flow is applied to the SMAC finite-difference method for incompressible flow analysis. The receptivity and validity of this application are investigated by an evaluation of the accuracy, stability and convergence rate for the SMAC method combined with the TVD scheme. Using this method, three-dimensional developing entry flows through a square-curved duct are calculated and compared with available experimental data as well as some computational results obtained by QUICKs and third-order upwind schemes. Such comparisons show that the numerical method applying the TVD scheme has the highest computational efficiency without a sharp loss of accuracy, resulting in confidence in the application this scheme to incompressible flow computations.
An efficient certificateless blind signature scheme without bilinear pairing
Directory of Open Access Journals (Sweden)
GUOFAGN DONG
2014-06-01
Full Text Available Recently, the certificateless public key cryptography (CLPKC has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC and the key escrow problem in the identity-based public key cryptography (ID-based PKC. To satisfy requirements of different applications, many certificateless blind signature (CLBS schemes using bilinear pairing for the CLPKC setting have been proposed. However, the bilinear pairing operation is very complicated. Therefore, the performance of those CLBS schemes is not very satisfactory. To solve the problem, we propose an efficient CLBS scheme without bilinear pairing. Performance analysis shows that the proposed scheme could reduce costs of computation and storage. Security analysis shows the proposed scheme is provably secure against both of two types of adversaries.
Adoption of Crop Insurance Schemes in Tamil Nadu
Directory of Open Access Journals (Sweden)
V Karthick
2017-12-01
Full Text Available The study was conducted in Southern zone of Tamil Nadu a constituent state of India. One hundred and eighty farmers who had adopted crop insurance schemes were selected through random sampling procedure. The respondents were interviewed using a pre-tested questionnaire for identifying factors influencing and constraints in adoption of crop insurance schemes. The study revealed that lack of scope for crop diversification and definite crop loss due to adverse climatic condition were the major factors influencing the adoption of crop insurance schemes. The study inferred that lack of compensation from the crop insurance scheme, delayed payment of indemnity, lack of awareness about the scheme and lengthy procedure to avail crop insurance were the major constraints.
Wind power and market integration, comparative study of financing schemes
International Nuclear Information System (INIS)
2013-10-01
The financing scheme of renewable energies is a key factor for their development pace and cost. As some countries like France, Germany or Spain have chosen a Feed-in Tariff (FiT) scheme, there are in fact four possible financing schemes: FiT, ex-post prime, ex-ante prime, and quotas (green certificates). A market convergence is then supposed to meet two main objectives: the control of market distortions related to wind energy development, and the optimization of wind energy production with respect to market signals. The authors analyse the underlying economic challenges and the ability of financing schemes to meet these objectives within a short term horizon (2015). They present the different financing schemes, analyse the impact of three key economic factors (market distortion, production optimization, financing costs)
A New Quantum Gray-Scale Image Encoding Scheme
Naseri, Mosayeb; Abdolmaleky, Mona; Parandin, Fariborz; Fatahi, Negin; Farouk, Ahmed; Nazari, Reza
2018-02-01
In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the original one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images. Supported by Kermanshah Branch, Islamic Azad University, Kermanshah, IRAN
Evaluation of the Norwegian R&D Tax Credit Scheme
Directory of Open Access Journals (Sweden)
Ådne Cappelen
2010-11-01
Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.
A fast iterative scheme for the linearized Boltzmann equation
Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.
2017-06-01
Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference
Oncoplastic central quadrantectomies
Pasta, Vittorio; D’Orazi, Valerio; Merola, Raffaele; Frusone, Federico; Amabile, Maria Ida; Buè, Rosanna; Monti, Marco
2016-01-01
Tumors localized in the central quadrant (centrally located breast tumors) have always represented a challenge for the surgeon because of the critical aesthetical matters related to the nipple-areola complex (NAC). Many years of experience with breast cancer patients treated by using various oncoplastic techniques, has allowed us to develop the modified hemibatwing for the treatment of central breast tumors, where the NAC is involved. Modified hemibatwing—along with the removal of the NAC—is a useful oncoplastic technique and it represents an ideal option for the treatment of central tumors because it assures oncological safety, a reduced surgical timetable and greater aesthetical results. PMID:27563564
Federal Laboratory Consortium — The TVA Central Laboratories Services is a comprehensive technical support center, offering you a complete range of scientific, engineering, and technical services....
Building Trust in Emissions Reporting. Global Trends in Emissions Trading Schemes
International Nuclear Information System (INIS)
Kruijd, J.; Walrecht, A.; Laseur, J.; Schoolderman, H.; Gledhill, R.
2007-02-01
This report highlights the key characteristics of the world's main emission trading schemes, presents a new vision for compliance in emissions trading and calls for global action to develop this. Climate change is now at the top of the political and business agenda. Al Gore's 'An Inconvenient Truth', the Stern Review and the now almost daily press coverage of climate change science and impacts have engaged many of the global leaders in government and in business. Emissions trading is increasingly seen as a central plank in the response to climate change. But market mechanisms like this depend on trust and confidence. Any widespread or systemic failure, as a result of deficient monitoring and reporting, flawed compliance processes or fraud, could undermine confidence in markets and regulation and jeopardise the crucial policy goals that they are designed to address. Key to this trust are the three central criteria of transparency, accountability and integrity. The PricewaterhouseCoopers report looks at how the patchwork of trading schemes that are emerging around the globe stacks up against these criteria. Despite good intentions across the board, the general picture is one of new and immature markets, inconsistent and complex compliance frameworks and risk. PricewaterhouseCoopers make the case for urgent and coordinated action to develop a framework of generally accepted principles and practice that will underpin trust and efficiency in these new markets - in effect, a new Global Emissions Compliance Language
The Medicare Chronic Disease Dental Scheme: Historical, Scientific, Socio-political Origins.
Akers, Harry Francis; Weerakoon, Arosha Tania; Foley, Michael Anthony; McAuliffe, Andrew James
While evidence and expert opinion are the foundations of effective policy, the politics, economics, and timing of a proposal can affect outcome. Australian government involvement in the planning, funding and delivery of dental services has been minimal and inconsistent. Many believe that the hybrid dispersal model of shared constitutional power has intermittently led to poor administration of national health policy. Throughout the decade-long prelude to the introduction of the Chronic Disease Dental Scheme, a landmark health policy in Australia, Parliamentarians moved responsibility for public dental services of disadvantaged Australians into an impasse between the Federal, State, and Territorial Governments. Developments throughout the era confirm the influence of administrative intrigue, centralized authority, competing priorities, funding pressures, political strategy, public opinion, scientific evidence and the timing of a proposal on the formulation and implementation of oral health policy. Synchronized inter-governmental collaboration was also absent. Moreover, the impasse and its resolution immediately before a national election demonstrate the bipolar roles of centralized political authority and political resolve in either obstructing or implementing policy. The historical, scientific, and socio-political contexts undermining the preamble to the Chronic Disease Dental Scheme lend weight to concerns about the hybrid dispersal model of constitutional power. Copyright American Academy of the History of Dentistry.
Sparse Reconstruction Schemes for Nonlinear Electromagnetic Imaging
Desmal, Abdulla
2016-03-01
Electromagnetic imaging is the problem of determining material properties from scattered fields measured away from the domain under investigation. Solving this inverse problem is a challenging task because (i) it is ill-posed due to the presence of (smoothing) integral operators used in the representation of scattered fields in terms of material properties, and scattered fields are obtained at a finite set of points through noisy measurements; and (ii) it is nonlinear simply due the fact that scattered fields are nonlinear functions of the material properties. The work described in this thesis tackles the ill-posedness of the electromagnetic imaging problem using sparsity-based regularization techniques, which assume that the scatterer(s) occupy only a small fraction of the investigation domain. More specifically, four novel imaging methods are formulated and implemented. (i) Sparsity-regularized Born iterative method iteratively linearizes the nonlinear inverse scattering problem and each linear problem is regularized using an improved iterative shrinkage algorithm enforcing the sparsity constraint. (ii) Sparsity-regularized nonlinear inexact Newton method calls for the solution of a linear system involving the Frechet derivative matrix of the forward scattering operator at every iteration step. For faster convergence, the solution of this matrix system is regularized under the sparsity constraint and preconditioned by leveling the matrix singular values. (iii) Sparsity-regularized nonlinear Tikhonov method directly solves the nonlinear minimization problem using Landweber iterations, where a thresholding function is applied at every iteration step to enforce the sparsity constraint. (iv) This last scheme is accelerated using a projected steepest descent method when it is applied to three-dimensional investigation domains. Projection replaces the thresholding operation and enforces the sparsity constraint. Numerical experiments, which are carried out using
Alqerm, Ismail
2018-01-23
5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.
Li, Haifeng; Cui, Guixiang; Zhang, Zhaoshun
2018-04-01
A coupling scheme is proposed for the simulation of microscale flow and dispersion in which both the mesoscale field and small-scale turbulence are specified at the boundary of a microscale model. The small-scale turbulence is obtained individually in the inner and outer layers by the transformation of pre-computed databases, and then combined in a weighted sum. Validation of the results of a flow over a cluster of model buildings shows that the inner- and outer-layer transition height should be located in the roughness sublayer. Both the new scheme and the previous scheme are applied in the simulation of the flow over the central business district of Oklahoma City (a point source during intensive observation period 3 of the Joint Urban 2003 experimental campaign), with results showing that the wind speed is well predicted in the canopy layer. Compared with the previous scheme, the new scheme improves the prediction of the wind direction and turbulent kinetic energy (TKE) in the canopy layer. The flow field influences the scalar plume in two ways, i.e. the averaged flow field determines the advective flux and the TKE field determines the turbulent flux. Thus, the mean, root-mean-square and maximum of the concentration agree better with the observations with the new scheme. These results indicate that the new scheme is an effective means of simulating the complex flow and dispersion in urban canopies.
Abramopoulos, Frank
1988-01-01
The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.
Design of an extensive information representation scheme for clinical narratives.
Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie
2017-09-11
Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.
Comparative evaluation of remote maintenance schemes for fusion DEMO reactor
International Nuclear Information System (INIS)
Utoh, Hiroyasu; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto
2015-01-01
Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.
Payment schemes and cost efficiency: evidence from Swiss public hospitals.
Meyer, Stefan
2015-03-01
This paper aims at analysing the impact of prospective payment schemes on cost efficiency of acute care hospitals in Switzerland. We study a panel of 121 public hospitals subject to one of four payment schemes. While several hospitals are still reimbursed on a per diem basis for the treatment of patients, most face flat per-case rates-or mixed schemes, which combine both elements of reimbursement. Thus, unlike previous studies, we are able to simultaneously analyse and isolate the cost-efficiency effects of different payment schemes. By means of stochastic frontier analysis, we first estimate a hospital cost frontier. Using the two-stage approach proposed by Battese and Coelli (Empir Econ 20:325-332, 1995), we then analyse the impact of these payment schemes on the cost efficiency of hospitals. Controlling for hospital characteristics, local market conditions in the 26 Swiss states (cantons), and a time trend, we show that, compared to per diem, hospitals which are reimbursed by flat payment schemes perform better in terms of cost efficiency. Our results suggest that mixed schemes create incentives for cost containment as well, although to a lesser extent. In addition, our findings indicate that cost-efficient hospitals are primarily located in cantons with competitive markets, as measured by the Herfindahl-Hirschman index in inpatient care. Furthermore, our econometric model shows that we obtain biased estimates from frontier analysis if we do not account for heteroscedasticity in the inefficiency term.
Comparative evaluation of remote maintenance schemes for fusion DEMO reactor
Energy Technology Data Exchange (ETDEWEB)
Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto
2015-10-15
Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
Verifiable Rational Secret Sharing Scheme in Mobile Networks
Directory of Open Access Journals (Sweden)
En Zhang
2015-01-01
Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
Evaluation of classical spatial-analysis schemes of extreme rainfall
Directory of Open Access Journals (Sweden)
D. Ceresetti
2012-11-01
Full Text Available Extreme rainfall is classically estimated using raingauge data at raingauge locations. An important related issue is to assess return levels of extreme rainfall at ungauged sites. Classical methods consist in interpolating extreme-value models. In this paper, such methods are referred to as regionalization schemes. Our goal is to evaluate three classical regionalization schemes. Each scheme consists of an extreme-value model (block maxima, peaks over threshold taken from extreme-value theory plus a method to interpolate the parameters of the statistical model throughout the Cévennes-Vivarais region. From the interpolated parameters, the 100-yr quantile level can be estimated over this whole region. A reference regionalization scheme is made of the couple block maxima/kriging, where kriging is an optimal interpolation method. The two other schemes differ from the reference by replacing either the extreme-value model block maxima by peaks over threshold or kriging by a neural network interpolation procedure. Hyper-parameters are selected by cross-validation and the three regionalization schemes are compared by double cross-validation. Our evaluation criteria are based on the ability to interpolate the 100-yr return level both in terms of precision and spatial distribution. It turns out that the best results are obtained by the regionalization scheme combining the peaks-over-threshold method with kriging.
Lämsä, Jerry W
2011-01-01
The ALICE experiment is shown to be well suited for studies of exclusive final states from central diffractive reactions. The gluon-rich environment of the central system allows detailed QCD studies and searches for exotic meson states, such as glueballs, hybrids and new charmonium-like states. It would also provide a good testing ground for detailed studies of heavy quarkonia. Due to its central barrel performance, ALICE can accurately measure the low-mass central systems with good purity. The efficiency of the Forward Multiplicity Detector (FMD) and the Forward Shower Counter (FSC) system for detecting rapidity gaps is shown to be adequate for the proposed studies. With this detector arrangement, valuable new data can be obtained by tagging central diffractive processes.
Dynamic droop scheme considering effect of intermittent renewable energy source
DEFF Research Database (Denmark)
Wang, Yanbo; Chen, Zhe; Deng, Fujin
2016-01-01
This paper presents a dynamic droop control scheme for islanded microgrids dominated by intermittent renewable energy sources, which is able to perform desirable power sharing in the presence of renewable energy source fluctuation. First, allowable maximum power points of wind generator and PV...... flexibility and effectiveness in the presence of the renewable energy sources fluctuation....... controller of each DG unit is activated through local logic variable inferred by wind speed and solar insolation information. Simulation results are given for validating the droop control scheme. The proposed dynamic droop scheme preserves the advantage of conventional droop control method, and provides...
The Study of Reservation Scheme for Managing Parking Cruising
Directory of Open Access Journals (Sweden)
Xu Duo
2017-01-01
Full Text Available Cruising for parking is a main contributor to traffic jam while the related researches are few. Assume travelers are well-informed, this paper first analyses user equilibrium (UE in no parking fee scheme with different scarcity of parking spaces. We get a conclusion that information fails to solve traffic problems effectively in absent of control. Followed by the principle of cape and trade, the paper proposes parking reservation scheme which combining guidance (information with tolling (control. Example shows that system cost reduces significantly after the implementation of the parking reservation scheme.
A robust cloud access scheme with mutual authentication
Directory of Open Access Journals (Sweden)
Chen Chin-Ling
2016-01-01
Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.
Achieving bifunctional cloak via combination of passive and active schemes
Lan, Chuwen; Bi, Ke; Gao, Zehua; Li, Bo; Zhou, Ji
2016-11-01
In this study, a simple and delicate approach to realizing manipulation of multi-physics field simultaneously through combination of passive and active schemes is proposed. In the design, one physical field is manipulated with passive scheme while the other with active scheme. As a proof of this concept, a bifunctional device is designed and fabricated to behave as electric and thermal invisibility cloak simultaneously. It is found that the experimental results are consistent with the simulated ones well, confirming the feasibility of our method. Furthermore, the proposed method could also be extended to other multi-physics fields, which might lead to potential applications in thermal, electric, and acoustic areas.
Security of Linear Secret-Sharing Schemes Against Mass Surveillance
DEFF Research Database (Denmark)
Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel
2015-01-01
by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....
Numerical Comparison of Optimal Charging Schemes for Electric Vehicles
DEFF Research Database (Denmark)
You, Shi; Hu, Junjie; Pedersen, Anders Bro
2012-01-01
The optimal charging schemes for Electric vehicles (EV) generally differ from each other in the choice of charging periods and the possibility of performing vehicle-to-grid (V2G), and have different impacts on EV economics. Regarding these variations, this paper presents a numerical comparison...... of four different charging schemes, namely night charging, night charging with V2G, 24 hour charging and 24 hour charging with V2G, on the basis of real driving data and electricity price of Denmark in 2003. For all schemes, optimal charging plans with 5 minute resolution are derived through the solving...
Performance comparison of binary modulation schemes for visible light communication
Park, Kihong
2015-09-11
In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.
A simple scheme for injection and extraction in compact rings
International Nuclear Information System (INIS)
Xu, H. S.; Huang, W. H.; Tang, C. X.
2014-01-01
There has been great interest in building compact synchrotrons for various applications, for example, inverse Compton scattering X-ray sources. However, the beam injection and extraction in compact rings require careful design for the lack of space. In this paper, we propose a simple combined injection-extraction scheme exploiting the fringe field of existing dipole magnets instead of additional septum magnets. This scheme is illustrated by using the 4.8 m ring proposed for Tsinghua Thomson scattering X-ray source as an example. Particle tracking is applied to demonstrate the validity of this scheme
AUS - the Australian modular scheme for reactor neutronics computations
International Nuclear Information System (INIS)
Robinson, G.S.
1975-12-01
A general description is given of the AUS modular scheme for reactor neutronics calculations. The scheme currently includes modules which provide the capacity for lattice calculations, 1D transport calculations, 1 and 2D diffusion calculations (with feedback-free kinetics), and burnup calculations. Details are provided of all system aspects of AUS, but individual modules are only outlined. A complete specification is given of that part of user input which controls the calculation sequence. The report also provides sufficient details of the supervisor program and of the interface data sets to enable additional modules to be incorporated in the scheme. (author)
A progressive diagonalization scheme for the Rabi Hamiltonian
International Nuclear Information System (INIS)
Pan, Feng; Guan, Xin; Wang, Yin; Draayer, J P
2010-01-01
A diagonalization scheme for the Rabi Hamiltonian, which describes a qubit interacting with a single-mode radiation field via a dipole interaction, is proposed. It is shown that the Rabi Hamiltonian can be solved almost exactly using a progressive scheme that involves a finite set of one variable polynomial equations. The scheme is especially efficient for the lower part of the spectrum. Some low-lying energy levels of the model with several sets of parameters are calculated and compared to those provided by the recently proposed generalized rotating-wave approximation and a full matrix diagonalization.
Design of a Secure RFID Authentication Scheme Preceding Market Transactions
Directory of Open Access Journals (Sweden)
Chin-Ling Chen
2011-01-01
Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.
A new MV bus transfer scheme for nuclear power plants
Directory of Open Access Journals (Sweden)
Chang Choong-Koo
2015-01-01
Full Text Available Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, uninterruptible bus transfer scheme utilizing the state of the art medium voltage UPS is discussed and elaborated.
Four-Point n-Ary Interpolating Subdivision Schemes
Directory of Open Access Journals (Sweden)
Ghulam Mustafa
2013-01-01
Full Text Available We present an efficient and simple algorithm to generate 4-point n-ary interpolating schemes. Our algorithm is based on three simple steps: second divided differences, determination of position of vertices by using second divided differences, and computation of new vertices. It is observed that 4-point n-ary interpolating schemes generated by completely different frameworks (i.e., Lagrange interpolant and wavelet theory can also be generated by the proposed algorithm. Furthermore, we have discussed continuity, Hölder regularity, degree of polynomial generation, polynomial reproduction, and approximation order of the schemes.
A quantization scheme for scale-invariant pure gauge theories
International Nuclear Information System (INIS)
Hortacsu, M.
1988-01-01
A scheme is suggested for the quantization of the recently proposed scale-invariant gauge theories in higher dimensions. The model is minimally coupled to a spinor field. Regularization algorithms are proposed. (orig.)
Assessment of Growth Enhancement Support Scheme among Rice ...
African Journals Online (AJOL)
USER
Assessment of Growth Enhancement Support Scheme among. Rice Farmers in Anambra State, Nigeria. Nwalieji H.U.. Department of Agricultural Economics and Extension,. Chukwuemeka Odumegwu Ojukwu University,. Igbariam campus, Anambra State, Nigeria. Email nwalieji73@yahoo.com. Phone: 07033994751.
Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems
Directory of Open Access Journals (Sweden)
Nasir Salh Almisbah
2012-06-01
Full Text Available Abstract: Orthogonal Frequency Division Multiplexing (OFDM is an emerging multi-carrier modulation scheme, which has been adopted for several wireless standards such as IEEE 802.11a and HiperLAN2. In OFDM systems, the performance is very sensitive to subcarrier frequency errors (offset. This paper shows the analysis and derivations of intercarrier interference (ICI complex gain that used in self-cancellation scheme and its dependence on subcarrier frequency offset. Simulation shows that better improvement in performance is achieved for systems that use this cancellation scheme. Moreover, analysis and simulation show that theoretical carrier-to-interference ratio (CIR for OFDM with cancellation scheme is greater than conventional one by more than 14dB.
Power-pulsing schemes for vertex detectors at CLIC
Blanchot, G; Fuentes, C
2014-01-01
The principal aim is to achieve significant power reduction without compromising the power integrity supplied to the front-end electronics. A current based powerpulsing scheme is proposed and its electrical features are discussed on the basis of measurements.
Factorizable Schemes for the Equations of Fluid Flow
Sidilkover, David
1999-01-01
We present an upwind high-resolution factorizable (UHF) discrete scheme for the compressible Euler equations that allows to distinguish between full-potential and advection factors at the discrete level. The scheme approximates equations in their general conservative form and is related to the family of genuinely multidimensional upwind schemes developed previously and demonstrated to have good shock-capturing capabilities. A unique property of this scheme is that in addition to the aforementioned features it is also factorizable, i.e., it allows to distinguish between full-potential and advection factors at the discrete level. The latter property facilitates the construction of optimally efficient multigrid solvers. This is done through a relaxation procedure that utilizes the factorizability property.
Progress with multigrid schemes for hypersonic flow problems
International Nuclear Information System (INIS)
Radespiel, R.; Swanson, R.C.
1995-01-01
Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10 6 and Mach numbers up to 25. 32 refs., 31 figs., 1 tab
A digital memories based user authentication scheme with privacy preservation.
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
A Bypass-Ring Scheme for a Fault Tolerant Multicast
Directory of Open Access Journals (Sweden)
V. Dynda
2003-01-01
Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.
A New Graph Drawing Scheme for Social Network
Directory of Open Access Journals (Sweden)
Eric Ke Wang
2014-01-01
visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.
Explicit TE/TM scheme for particle beam simulations
International Nuclear Information System (INIS)
Dohlus, M.; Zagorodnov, I.
2008-10-01
In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)
Optimal sampling schemes for vegetation and geological field visits
CSIR Research Space (South Africa)
Debba, Pravesh
2012-07-01
Full Text Available The presentation made to Wits Statistics Department was on common classification methods used in the field of remote sensing, and the use of remote sensing to design optimal sampling schemes for field visits with applications in vegetation...
The performance of different cumulus parameterization schemes in ...
Indian Academy of Sciences (India)
. The loss has been estimated around USD 500 million in economy and. Keywords. Modelling; acuity–fidelity; cumulus parameterization scheme; southern peninsular Malaysia; rainfall. J. Earth Syst. Sci. 121, No. 2, April 2012, pp. 317–327.
Efficient scheme for parametric fitting of data in arbitrary dimensions.
Pang, Ning-Ning; Tzeng, Wen-Jer; Kao, Hisen-Ching
2008-07-01
We propose an efficient scheme for parametric fitting expressed in terms of the Legendre polynomials. For continuous systems, our scheme is exact and the derived explicit expression is very helpful for further analytical studies. For discrete systems, our scheme is almost as accurate as the method of singular value decomposition. Through a few numerical examples, we show that our algorithm costs much less CPU time and memory space than the method of singular value decomposition. Thus, our algorithm is very suitable for a large amount of data fitting. In addition, the proposed scheme can also be used to extract the global structure of fluctuating systems. We then derive the exact relation between the correlation function and the detrended variance function of fluctuating systems in arbitrary dimensions and give a general scaling analysis.
33 CFR 83.10 - Traffic separation schemes (Rule 10).
2010-07-01
... submarine cable. A vessel restricted in her ability to maneuver when engaged in an operation for the laying, servicing, or picking up of a submarine cable, within a traffic separation scheme, is exempted from...
Requirements for multimedia metadata schemes in surveillance applications for security
Rest, J.H.C. van; Grootjen, F.A.; Grootjen, M.; Wijn, R.; Aarts, O.A.J.; Roelofs, M.L.; Burghouts, G.J.; Bouma, H.; Alic, L.; Kraaij, W.
2013-01-01
Surveillance for security requires communication between systems and humans, involves behavioural and multimedia research, and demands an objective benchmarking for the performance of system components.Metadata representation schemes are extremely important to facilitate (system) interoperability
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity
Directory of Open Access Journals (Sweden)
Ya-Fen Chang
2017-12-01
Full Text Available With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper, a mobility network authentication scheme based on elliptic curve cryptography is proposed. In the proposed scheme, a mobile user can be authenticated without revealing who he is for user anonymity, and a session key is also negotiated to protect the following communications. The proposed mobility network authentication scheme is analyzed to show that it can ensure security, user anonymity, and convenience. Moreover, Burrows-Abadi-Needham logic (BAN logic is used to deduce the completeness of the proposed authentication scheme.
A Secure and Efficient Certificateless Short Signature Scheme
Directory of Open Access Journals (Sweden)
Lin Cheng
2013-07-01
Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.
An Improvement on Remote User Authentication Schemes Using Smart Cards
Directory of Open Access Journals (Sweden)
Chin-Ling Chen
2018-01-01
Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.
A generalization of the Z expansion scheme in atoms
International Nuclear Information System (INIS)
Horak, Z.J.; Maca, F.
1979-01-01
A perturbation theory is described which recovers the ordinary Z-expansion scheme in the limit Z → infinity. It introduces nonintegral principal quantum numbers and orbitals of analytical form which is more realistic than hydrogen-like orbitals. (Auth.)
Exact renormalization group as a scheme for calculations
International Nuclear Information System (INIS)
Mack, G.
1985-10-01
In this lecture I report on recent work to use exact renormalization group methods to construct a scheme for calculations in quantum field theory and classical statistical mechanics on the continuum. (orig./HSI)
An assessment of Nigeria's agricultural credit guarantee scheme fund
African Journals Online (AJOL)
, after twenty-seven years, were subjected to macro econometric analysis, presumably the first quantitative approach to the scheme, with the objective of providing useful results, deducing policy implications, and perhaps, policy options.
A digital memories based user authentication scheme with privacy preservation.
Directory of Open Access Journals (Sweden)
JunLiang Liu
Full Text Available The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key, which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
Applying regional planning schemes in East Jutland, Denmark
DEFF Research Database (Denmark)
Grunfelder, Julien; Fertner, Christian
2010-01-01
landscapes. A common regional planning scheme is discussed for a while, but nothing is agreed on yet. Our objective is to apply three interesting spatial schemes to our case study region. The three planning schemes are well known for their simple and clear approach: The Fingerplan of Copenhagen urban region...... 2000 and 2006, documented by CORINE. The Fingerplan was elaborated in 1947 but became first in 2007 a legal planning document. However, its simple principles of development along the commuter rail lines and the protection of green wedges in between them guided spatial development in Copenhagen since...... a development aligned along mass-transport corridors. In the Montpellier case, the planning scheme has the particularity of having a “sight inversion”. Thus, the landscape is presented as an integrated part of the reflection on regional development. In other words, it protects natural and agricultural areas...
Carbon Leakage, Free Allocation and Linking Emissions Trading Schemes
Tiche, Fitsum G.; Weishaar, Stefan E.; Couwenberg, Oscar
2014-01-01
A sub-global emissions trading scheme (ETS) risks harming competitiveness and causing carbon leakage. These concerns cast doubt on the efficiency and environmental effectiveness of unilateral climate policies. ETSs implemented thus far include measures to address competitiveness and leakage
A New Hybrid Channel Access Scheme for Ad Hoc Networks
National Research Council Canada - National Science Library
Wang, Yu; Garcia-Luna-Aceves, J. J
2002-01-01
Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...
Foundations of Grothendieck duality for diagrams of schemes
Lipman, Joseph
2009-01-01
The first part written by Joseph Lipman, accessible to mid-level graduate students, is a full exposition of the abstract foundations of Grothendieck duality theory for schemes (twisted inverse image, tor-independent base change,...), in part without noetherian hypotheses, and with some refinements for maps of finite tor-dimension. The ground is prepared by a lengthy treatment of the rich formalism of relations among the derived functors, for unbounded complexes over ringed spaces, of the sheaf functors tensor, hom, direct and inverse image. Included are enhancements, for quasi-compact quasi-separated schemes, of classical results such as the projection and Künneth isomorphisms. In the second part, written independently by Mitsuyasu Hashimoto, the theory is extended to the context of diagrams of schemes. This includes, as a special case, an equivariant theory for schemes with group actions. In particular, after various basic operations on sheaves such as (derived) direct images and inverse images are set up, ...
Searle on External Realism and "Privileged Conceptual Scheme"
Czech Academy of Sciences Publication Activity Database
Marvan, Tomáš
2012-01-01
Roč. 19, Supp.2 (2012), s. 31-39 ISSN 1335-0668 Institutional support: RVO:67985955 Keywords : John Searle * external realism * constructivism * conceptual relativity * Privilege Conceptual Scheme Subject RIV: AA - Philosophy ; Religion
Factors affecting sustainability of rural water schemes in Swaziland
Peter, Graciana; Nkambule, Sizwe E.
The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and
Maity, S.; Satyanarayana, A. N. V.; Mandal, M.; Nayak, S.
2017-11-01
In this study, an attempt has been made to investigate the sensitivity of land surface models (LSM) and cumulus convection schemes (CCS) using a regional climate model, RegCM Version-4.1 in simulating the Indian Summer Monsoon (ISM). Numerical experiments were conducted in seasonal scale (May-September) for three consecutive years: 2007, 2008, 2009 with two LSMs (Biosphere Atmosphere Transfer Scheme (BATS), Community Land Model (CLM 3.5) and five CCSs (MIT, KUO, GRELL, GRELL over land and MIT over ocean (GL_MO), GRELL over ocean and MIT over land (GO_ML)). Important synoptic features are validated using various reanalysis datasets and satellite derived products from TRMM and CRU data. Seasonally averaged surface temperature is reasonably well simulated by the model using both the LSMs along with CCSs namely, MIT, GO_ML and GL_MO schemes. Model simulations reveal slight warm bias using these schemes whereas significant cold bias is seen with KUO and GRELL schemes during all three years. It is noticed that the simulated Somali Jet (SJ) is weak in all simulations except MIT scheme in the simulations with (both BATS and CLM) in which the strength of SJ reasonably well captured. Although the model is able to simulate the Tropical Easterly Jet (TEJ) and Sub-Tropical Westerly Jet (STWJ) with all the CCSs in terms of their location and strength, the performance of MIT scheme seems to be better than the rest of the CCSs. Seasonal rainfall is not well simulated by the model. Significant underestimation of Indian Summer Monsoon Rainfall (ISMR) is observed over Central and North West India. Spatial distribution of seasonal ISMR is comparatively better simulated by the model with MIT followed by GO_ML scheme in combination with CLM although it overestimates rainfall over heavy precipitation zones. On overall statistical analysis, it is noticed that RegCM4 shows better skill in simulating ISM with MIT scheme using CLM.
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
Douik, Ahmed S.
2015-05-01
From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.
Four-state discrimination scheme beyond the heterodyne limit
DEFF Research Database (Denmark)
Muller, C. R.; Castaneda, Mario A. Usuga; Wittmann, C.
2012-01-01
We propose and experimentally demonstrate a hybrid discrimination scheme for the quadrature phase shift keying protocol, which outperforms heterodyne detection for any signal power. The discrimination is composed of a quadrature measurement, feed forward and photon detection.......We propose and experimentally demonstrate a hybrid discrimination scheme for the quadrature phase shift keying protocol, which outperforms heterodyne detection for any signal power. The discrimination is composed of a quadrature measurement, feed forward and photon detection....
Introduction to powering schemes for the CLIC detectors
Blanchot, G
2011-01-01
The CLIC detector designs together with the CLIC beam properties impose strong constraints in terms of power distribution for the front-end electronics. The definition of periodic active and idle times in the detector operation allows implementing a pulsed powering scheme that will result in a significant reduction of dissipated power. This note provides an introduction to the different power pulsing schemes applicable to the CLIC detectors electronics.
Implementing Language-Dependent Lexicographic Orders in Scheme
Hufflen, Jean-Michel
2007-01-01
International audience; The lexicographical order relations used within dictionaries are language-dependent, and we explain how we implemented such orders in Scheme. We show how our sorting orders are derived from the Unicode collation algorithm. Since the result of a Scheme function can be itself a function, we use generators of sorting orders. Specifying a sorting order for a new natural language has been made as easy as possible and can be done by a programmer who just has basic knowledge ...
Hybrid subband image coding scheme using DWT, DPCM, and ADPCM
Oh, Kyung-Seak; Kim, Sung-Jin; Joo, Chang-Bok
1998-07-01
Subband image coding techniques have received considerable attention as a powerful source coding ones. These techniques provide good compression results, and also can be extended for progressive transmission and multiresolution analysis. In this paper, we propose a hybrid subband image coding scheme using DWT (discrete wavelet transform), DPCM (differential pulse code modulation), and ADPCM (adaptive DPCM). This scheme produces both simple, but significant, image compression and transmission coding.