WorldWideScience

Sample records for stream cipher design

  1. BLOSTREAM: A HIGH SPEED STREAM CIPHER

    Directory of Open Access Journals (Sweden)

    ALI H. KASHMAR

    2017-04-01

    Full Text Available Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers. This paper presents the design of an improved efficient and secure stream cipher called Blostream, which is more secure than conventional stream ciphers that use XOR for mixing. The proposed cipher comprises two major components: the Pseudo Random Number Generator (PRNG using the Rabbit algorithm and a nonlinear invertible round function (combiner for encryption and decryption. We evaluate its performance in terms of implementation and security, presenting advantages and disadvantages, comparison of the proposed cipher with similar systems and a statistical test for randomness. The analysis shows that the proposed cipher is more efficient, high speed, and secure than current conventional stream ciphers.

  2. A MULTICORE COMPUTER SYSTEM FOR DESIGN OF STREAM CIPHERS BASED ON RANDOM FEEDBACK

    Directory of Open Access Journals (Sweden)

    Borislav BEDZHEV

    2013-01-01

    Full Text Available The stream ciphers are an important tool for providing information security in the present communication and computer networks. Due to this reason our paper describes a multicore computer system for design of stream ciphers based on the so - named random feedback shift registers (RFSRs. The interest to this theme is inspired by the following facts. First, the RFSRs are a relatively new type of stream ciphers which demonstrate a significant enhancement of the crypto - resistance in a comparison with the classical stream ciphers. Second, the studding of the features of the RFSRs is in very initial stage. Third, the theory of the RFSRs seems to be very hard, which leads to the necessity RFSRs to be explored mainly by the means of computer models. The paper is organized as follows. First, the basics of the RFSRs are recalled. After that, our multicore computer system for design of stream ciphers based on RFSRs is presented. Finally, the advantages and possible areas of application of the computer system are discussed.

  3. A chaotic stream cipher and the usage in video protection

    International Nuclear Information System (INIS)

    Lian Shiguo; Sun Jinsheng; Wang Jinwei; Wang Zhiquan

    2007-01-01

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  4. Why IV Setup for Stream Ciphers is Difficult

    DEFF Research Database (Denmark)

    Zenner, Erik

    2007-01-01

    In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.......In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography....

  5. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

    Directory of Open Access Journals (Sweden)

    Vahid Amin Ghafari

    2018-03-01

    Full Text Available In Fast Software Encryption (FSE 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation, Sprout was proposed. Sprout was insecure and an improved version of Sprout was presented in FSE 2017. We introduced Fruit stream cipher informally in 2016 on the web page of IACR (eprint and few cryptanalysis were published on it. Fortunately, the main structure of Fruit was resistant. Now, Fruit-80 is presented as a final version which is easier to implement and is secure. The size of LFSR and NFSR in Fruit-80 is only 80 bits (for 80-bit security level, while for resistance to the classical time-memory-data tradeoff (TMDTO attacks, the internal state size should be at least twice that of the security level. To satisfy this rule and to design a concrete cipher, we used some new design ideas. It seems that the bottleneck of designing an ultra-lightweight stream cipher is TMDTO distinguishing attacks. A countermeasure was suggested, and another countermeasure is proposed here. Fruit-80 is better than other small-state stream ciphers in terms of the initialization speed and area size in hardware. It is possible to redesign many of the stream ciphers and achieve significantly smaller area size by using the new idea.

  6. The Rabbit Stream Cipher

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Vesterager, Mette; Zenner, Erik

    2008-01-01

    The stream cipher Rabbit was first presented at FSE 2003, and no attacks against it have been published until now. With a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor, Rabbit does also provide very high performance. This paper gives a concise...... description of the Rabbit design and some of the cryptanalytic results available....

  7. A Novel Image Stream Cipher Based On Dynamic Substitution

    OpenAIRE

    Elsharkawi, A.; El-Sagheer, R. M.; Akah, H.; Taha, H.

    2016-01-01

    Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution b...

  8. Stream ciphers and number theory

    CERN Document Server

    Cusick, Thomas W; Renvall, Ari R

    2004-01-01

    This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. · Unique book on interactions of stream ciphers and number theory. · Research monograph with many results not available elsewhere. · A revised edition with the most recent advances in this subject. · Over thirty research problems for stimulating interactions between the two areas. · Written by leading researchers in stream ciphers and number theory.

  9. Cryptanalysis of the full Spritz stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Isobe, Takanori

    2016-01-01

    Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on a short-term bias in the first two bytes of a keystream an...

  10. A stream cipher based on a spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Li Ping; Li Zhong; Halang, Wolfgang A.; Chen Guanrong

    2007-01-01

    A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently

  11. A novel chaotic stream cipher and its application to palmprint template protection

    International Nuclear Information System (INIS)

    Heng-Jian, Li; Jia-Shu, Zhang

    2010-01-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. (general)

  12. A novel chaotic stream cipher and its application to palmprint template protection

    Science.gov (United States)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  13. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate the bias from the original chaotic sequence. The proposed stream cipher utilises the processed chaotic output to mask and diffuse input pixels through several stages of XORing and bit permutations. The performance of the cipher is tested with several input images and compared with previously reported systems showing superior security and higher hardware efficiency. The system is experimentally verified on XilinxVirtex 4 field programmable gate array (FPGA) achieving small area utilisation and a throughput of 3.62 Gb/s. © The Institution of Engineering and Technology 2013.

  14. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

    Science.gov (United States)

    Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur

    2017-12-01

    Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.

  15. Stream cipher based on pseudorandom number generation using optical affine transformation

    Science.gov (United States)

    Sasaki, Toru; Togo, Hiroyuki; Tanida, Jun; Ichioka, Yoshiki

    2000-07-01

    We propose a new stream cipher technique for 2D image data which can be implemented by iterative optical transformation. The stream cipher uses a pseudo-random number generator (PRNG) to generate pseudo-random bit sequence. The proposed method for the PRNG is composed of iterative operation of 2D affine transformation achieved by optical components, and modulo-n addition of the transformed images. The method is expected to be executed efficiently by optical parallel processing. We verify performance of the proposed method in terms of security strength and clarify problems on optical implementation by the optical fractal synthesizer.

  16. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Chunlei Fan

    2018-06-01

    Full Text Available In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data. Two-dimensional discrete wavelet transform and Arnold mapping are used to scramble the pixel value of the original image. A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.

  17. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

    Directory of Open Access Journals (Sweden)

    Subhrajyoti Deb

    2018-03-01

    Full Text Available A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a is a family of stream ciphers designed for low-end devices. Similarly, Espresso is a lightweight stream cipher that was developed recently for 5G wireless mobile communication. The randomness of the keystream produced by a stream cipher is a good indicator of its security strength. In this study, we have analyzed the randomness properties of the keystreams produced by both the Grain Family and Espresso ciphers using the statistical packages DieHarder and NIST STS. We also analyzed their performances in two constrained devices (ATmega328P and ESP8266 based on three attainable parameters, namely computation time, memory, and power consumption. Keywords: Stream cipher, Randomness, Dieharder, NIST STS

  18. On the Design of Error-Correcting Ciphers

    Directory of Open Access Journals (Sweden)

    Mathur Chetan Nanjunda

    2006-01-01

    Full Text Available Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless environment. In this paper, we take a joint encryption-error correction approach to ensure secure and robust communication over the wireless link. In particular, we design an error-correcting cipher (called the high diffusion cipher and prove bounds on its error-correcting capacity as well as its security. Towards this end, we propose a new class of error-correcting codes (HD-codes with built-in security features that we use in the diffusion layer of the proposed cipher. We construct an example, 128-bit cipher using the HD-codes, and compare it experimentally with two traditional concatenated systems: (a AES (Rijndael followed by Reed-Solomon codes, (b Rijndael followed by convolutional codes. We show that the HD-cipher is as resistant to linear and differential cryptanalysis as the Rijndael. We also show that any chosen plaintext attack that can be performed on the HD cipher can be transformed into a chosen plaintext attack on the Rijndael cipher. In terms of error correction capacity, the traditional systems using Reed-Solomon codes are comparable to the proposed joint error-correcting cipher and those that use convolutional codes require more data expansion in order to achieve similar error correction as the HD-cipher. The original contributions of this work are (1 design of a new joint error-correction-encryption system, (2 design of a new class of algebraic codes with built-in security criteria, called the high diffusion codes (HD-codes for use in the HD-cipher, (3 mathematical properties of these codes, (4 methods for construction of the codes, (5 bounds on the error-correcting capacity of the HD-cipher, (6 mathematical derivation of the bound on resistance of HD cipher to linear and differential cryptanalysis, (7 experimental comparison

  19. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.; Mansingka, Abhinav S.; Radwan, Ahmed Gomaa; Salama, Khaled N.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate

  20. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    be applied to the AES can be transferred to this block cipher, albeit with a higher attack complexity. The second publication introduces a new block cipher family which is targeted for new applications in fully homomorphic encryption and multi-party computation. We demonstrate the soundness of the design...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...... is an introduction to block ciphers and their cryptanalysis, the second part contains publications written and published during the PhD studies. The first publication evaluates the security of a modification of the AES in which the choice of S-box is unknown to the attacker. We find that some of the attacks that can...

  1. Performance of Сellular Automata-based Stream Ciphers in GPU Implementation

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2016-01-01

    Full Text Available Earlier the author had developed methods to build high-performance generalized cellular automata-based symmetric ciphers, which allow obtaining the encryption algorithms that show extremely high performance in hardware implementation. However, their implementation based on the conventional microprocessors lacks high performance. The mere fact is quite common - it shows a scope of applications for these ciphers. Nevertheless, the use of graphic processors enables achieving an appropriate performance for a software implementation.The article is extension of a series of the articles, which study various aspects to construct and implement cryptographic algorithms based on the generalized cellular automata. The article is aimed at studying the capabilities to implement the GPU-based cryptographic algorithms under consideration.Representing a key generator, the implemented encryption algorithm comprises 2k generalized cellular automata. The cellular automata graphs are Ramanujan’s ones. The cells of produced k gamma streams alternate, thereby allowing the GPU capabilities to be better used.To implement was used OpenCL, as the most universal and platform-independent API. The software written in C ++ was designed so that the user could set various parameters, including the encryption key, the graph structure, the local communication function, various constants, etc. To test were used a variety of graphics processors (NVIDIA GTX 650; NVIDIA GTX 770; AMD R9 280X.Depending on operating conditions, and GPU used, a performance range is from 0.47 to 6.61 Gb / s, which is comparable to the performance of the countertypes.Thus, the article has demonstrated that using the GPU makes it is possible to provide efficient software implementation of stream ciphers based on the generalized cellular automata.This work was supported by the RFBR, the project №16-07-00542.

  2. Quantum-noise randomized ciphers

    International Nuclear Information System (INIS)

    Nair, Ranjith; Yuen, Horace P.; Kumar, Prem; Corndorf, Eric; Eguchi, Takami

    2006-01-01

    We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security. We describe a concrete system known as αη and show that it is equivalent to a random cipher in which the required randomization is affected by coherent-state quantum noise. We describe the currently known security features of αη and similar systems, including lower bounds on the unicity distances against ciphertext-only and known-plaintext attacks. We show how αη used in conjunction with any standard stream cipher such as the Advanced Encryption Standard provides an additional, qualitatively different layer of security from physical encryption against known-plaintext attacks on the key. We refute some claims in the literature that αη is equivalent to a nonrandom stream cipher

  3. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  4. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  5. Cryptanalysis on classical cipher based on Indonesian language

    Science.gov (United States)

    Marwati, R.; Yulianti, K.

    2018-05-01

    Cryptanalysis is a process of breaking a cipher in an illegal decryption. This paper discusses about encryption some classic cryptography, breaking substitution cipher and stream cipher, and increasing its security. Encryption and ciphering based on Indonesian Language text. Microsoft Word and Microsoft Excel were chosen as ciphering and breaking tools.

  6. Experiments of 10 Gbit/sec quantum stream cipher applicable to optical Ethernet and optical satellite link

    Science.gov (United States)

    Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi

    2009-08-01

    The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.

  7. Cryptanalysis of Some Lightweight Symmetric Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed Awadelkareem Mohamed Ahmed

    In recent years, the need for lightweight encryption systems has been increasing as many applications use RFID and sensor networks which have a very low computational power and thus incapable of performing standard cryptographic operations. In response to this problem, the cryptographic community...... on a variant of PRESENT with identical round keys. We propose a new attack named the Invariant Subspace Attack that was specifically mounted against the lightweight block cipher PRINTcipher. Furthermore, we mount several attacks on a recently proposed stream cipher called A2U2....... of the international standards in lightweight cryptography. This thesis aims at analyzing and evaluating the security of some the recently proposed lightweight symmetric ciphers with a focus on PRESENT-like ciphers, namely, the block cipher PRESENT and the block cipher PRINTcipher. We provide an approach to estimate...

  8. A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher

    Science.gov (United States)

    Kumari, Manju; Gupta, Shailender

    2018-03-01

    As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.

  9. Block Cipher Analysis

    DEFF Research Database (Denmark)

    Miolane, Charlotte Vikkelsø

    ensurethat no attack violatesthe securitybounds specifiedbygeneric attack namely exhaustivekey search and table lookup attacks. This thesis contains a general introduction to cryptography with focus on block ciphers and important block cipher designs, in particular the Advanced Encryption Standard(AES...... on small scale variants of AES. In the final part of the thesis we present a new block cipher proposal Present and examine its security against algebraic and differential cryptanalysis in particular....

  10. Cryptanalysis of Selected Block Ciphers

    DEFF Research Database (Denmark)

    Alkhzaimi, Hoda A.

    , pseudorandom number generators, and authenticated encryption designs. For this reason a multitude of initiatives over the years has been established to provide a secure and sound designs for block ciphers as in the calls for Data Encryption Standard (DES) and Advanced Encryption Standard (AES), lightweight...... ciphers initiatives, and the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR). In this thesis, we first present cryptanalytic results on different ciphers. We propose attack named the Invariant Subspace Attack. It is utilized to break the full block cipher...

  11. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.; Radwan, Ahmed G.; Salama, Khaled N.

    2011-01-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  12. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  13. Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder

    Science.gov (United States)

    Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz

    2017-11-01

    Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.

  14. Optical stream-cipher-like system for image encryption based on Michelson interferometer.

    Science.gov (United States)

    Yang, Bing; Liu, Zhengjun; Wang, Bo; Zhang, Yan; Liu, Shutian

    2011-01-31

    A novel optical image encryption scheme based on interference is proposed. The original image is digitally encoded into one phase-only mask by employing an improved Gerchberg-Saxton phase retrieval algorithm together with another predefined random phase mask which serves as the encryption key. The decryption process can be implemented optically based on Michelson interferometer by using the same key. The scheme can be regarded as a stream-cipher-like encryption system, the encryption and decryption keys are the same, however the operations are different. The position coordinates and light wavelength can also be used as additional keys during the decryption. Numerical simulations have demonstrated the validity and robustness of the proposed method.

  15. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde

    2012-01-01

    We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream...... with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family...... of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  16. Round Gating for Low Energy Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    design techniques for implementing block ciphers in a low energy fashion. We concentrate on round based implementation and we discuss how gating, applied at round level can affect and improve the energy consumption of the most common lightweight block cipher currently used in the internet of things....... Additionally, we discuss how to needed gating wave can be generated. Experimental results show that our technique is able to reduce the energy consumption in most block ciphers by over 60% while incurring only a minimal overhead in hardware....

  17. Reflection ciphers

    DEFF Research Database (Denmark)

    Boura, Christina; Canteaut, Anne; Knudsen, Lars Ramkilde

    2017-01-01

    study the necessary properties for this coupling permutation. Special care has to be taken of some related-key distinguishers since, in the context of reflection ciphers, they may provide attacks in the single-key setting.We then derive some criteria for constructing secure reflection ciphers...

  18. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  19. A New Substitution Cipher - Random-X

    Directory of Open Access Journals (Sweden)

    Falguni Patel

    2015-08-01

    Full Text Available Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher Random-X that we introduce in this paper can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle the implementation ideas and testing of Random-X cipher.

  20. Progress in Y-00 physical cipher for Giga bit/sec optical data communications (intensity modulation method)

    Science.gov (United States)

    Hirota, Osamu; Futami, Fumio

    2014-10-01

    To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.

  1. Efficient configurations for block ciphers with unified ENC/DEC paths

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2017-01-01

    by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined......Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher......, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin...

  2. Ganzua: A Cryptanalysis Tool for Monoalphabetic and Polyalphabetic Ciphers

    Science.gov (United States)

    Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose

    2006-01-01

    Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…

  3. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  4. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul

    2013-01-01

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general......-purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. Our implementation with Intel AES-NI on a Sandy Bridge CPU architecture shows that both COPE and COPA are about 5 times faster than their closest competition: TC1, TC3, and McOE-G. This high factor of advantage emphasizes the paramount role of parallelizability on up...

  5. Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

    Directory of Open Access Journals (Sweden)

    Hao Chen

    2017-01-01

    Full Text Available HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.

  6. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  7. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  8. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  9. Cipher block based authentication module: A hardware design perspective

    NARCIS (Netherlands)

    Michail, H.E.; Schinianakis, D.; Goutis, C.E.; Kakarountas, A.P.; Selimis, G.

    2011-01-01

    Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the

  10. Hardware Implementation of Artificial Neural Network for Data Ciphering

    Directory of Open Access Journals (Sweden)

    Sahar L. Kadoory

    2016-10-01

    Full Text Available This paper introduces the design and realization of multiple blocks ciphering techniques on the FPGA (Field Programmable Gate Arrays. A back propagation neural networks have been built for substitution, permutation and XOR blocks ciphering using Neural Network Toolbox in MATLAB program. They are trained to encrypt the data, after obtaining the suitable weights, biases, activation function and layout. Afterward, they are described using VHDL and implemented using Xilinx Spartan-3E FPGA using two approaches: serial and parallel versions. The simulation results obtained with Xilinx ISE 9.2i software. The numerical precision is chosen carefully when implementing the Neural Network on FPGA. Obtained results from the hardware designs show accurate numeric values to cipher the data. As expected, the synthesis results indicate that the serial version requires less area resources than the parallel version. As, the data throughput in parallel version is higher than the serial version in rang between (1.13-1.5 times. Also, a slight difference can be observed in the maximum frequency.

  11. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

    DEFF Research Database (Denmark)

    Beierle, Christof; Jovanovic, Philipp; Lauridsen, Martin Mehl

    2015-01-01

    Designing block ciphers and hash functions in a manner that resemble the AES in many aspects has been very popular since Rijndael was adopted as the Advanced Encryption Standard. However, in sharp contrast to the MixColumns operation, the security implications of the way the state is permuted...... by the operation resembling ShiftRows has never been studied in depth. Here, we provide the first structured study of the influence of ShiftRows-like operations, or more generally, word-wise permutations, in AES-like ciphers with respect to diffusion properties and resistance towards differential- and linear...... normal form. Using a mixed-integer linear programming approach, we obtain optimal parameters for a wide range of AES-like ciphers, and show improvements on parameters for Rijndael-192, Rijndael-256, PRIMATEs-80 and Prøst-128. As a separate result, we show for specific cases of the state geometry...

  12. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  13. A fast image encryption algorithm based on only blocks in cipher text

    Science.gov (United States)

    Wang, Xing-Yuan; Wang, Qian

    2014-03-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.

  14. A fast image encryption algorithm based on only blocks in cipher text

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Wang Qian

    2014-01-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks

  15. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  16. Block cipher based on modular arithmetic and methods of information compression

    Science.gov (United States)

    Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.

    2017-10-01

    The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.

  17. Cryptanalysis of PRESENT-like ciphers with secret S-boxes

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor

    2011-01-01

    At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully cryptanalysed two and a half rounds. This paper considers PRESENT-like ciphers in a similar manner. We focus on the settings...... where the S-boxes are key dependent, and repeated for every round. We break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore...

  18. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  19. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  20. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. In this paper, we have identified the candidates of block ciphers

  1. Penerapan CIELab dan Chaos sebagai Cipher pada Aplikasi Kriptografi Citra Digital

    Directory of Open Access Journals (Sweden)

    Linna Oktaviana Sari

    2013-04-01

    Full Text Available The development of Internet supports people to transmit information, such as text, images and other media quickly. However, digital images transmitted over the Internet are very vulnerable to attacks, for examples modification and duplication by unauthorized people. Therefore, cryptography as one of method for data security has been developed. This research proposed a combination of color structure CIELab and key randomization by logistic map from chaos as new cipher in digital image cryptographic applications. Cipher is applied to the encryption and decryption process. Implementation of new cipher in cryptographic digital images application was built with Matlab R2010a. Based on the research that has been done, it was found that combination CIELab and chaos can be applied as a new cipher on the encryption and decryption of digital images for cryptographic applications with processing time less than 1 second. Under possible maximum key range on RGB image by 5,2x 1033, the cipher was sufficiently secure against brute-force attack. Decrypted image has good quality with PSNR greater than 50 dB for digital image formatted in “tiff” and “png”.

  2. Cryptanalysis of a chaotic block cipher with external key and its improved version

    International Nuclear Information System (INIS)

    Li Chengqing; Li Shujun; Alvarez, Gonzalo; Chen Guanrong; Lo, K.-T.

    2008-01-01

    Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: (1) a number of weak keys exist; (2) some important intermediate data of the cipher are not sufficiently random; (3) the whole secret key can be broken by a known-plaintext attack with only 120 consecutive known plain-bytes in one known plaintext. In addition, it is pointed out that an improved version of the chaotic cipher proposed by Wei et al. still suffers from all the same security defects

  3. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...

  4. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  5. Cache Timing Analysis of eStream Finalists

    DEFF Research Database (Denmark)

    Zenner, Erik

    2009-01-01

    Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the AES. However, their applicability to other cryptographic primitives is less well researched. In this talk, we give an overview over our analysis of the stream ciphers that were selected for phase 3...

  6. A new block cipher based on chaotic map and group theory

    International Nuclear Information System (INIS)

    Yang Huaqian; Liao Xiaofeng; Wong Kwokwo; Zhang Wei; Wei Pengcheng

    2009-01-01

    Based on the study of some existing chaotic encryption algorithms, a new block cipher is proposed. In the proposed cipher, two sequences of decimal numbers individually generated by two chaotic piecewise linear maps are used to determine the noise vectors by comparing the element of the two sequences. Then a sequence of decimal numbers is used to define a bijection map. The modular multiplication operation in the group Z 2 8 +1 * and permutations are alternately applied on plaintext with block length of multiples of 64 bits to produce ciphertext blocks of the same length. Analysis show that the proposed block cipher does not suffer from the flaws of pure chaotic cryptosystems.

  7. An enhanced chaotic key-based RC5 block cipher adapted to image encryption

    Science.gov (United States)

    Faragallah, Osama S.

    2012-07-01

    RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.

  8. Stream Deniable-Encryption Algorithms

    Directory of Open Access Journals (Sweden)

    N.A. Moldovyan

    2016-04-01

    Full Text Available A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed with the secret and fake data streams so that the output ciphertext looks like the ciphertext produced by some probabilistic encryption algorithm applied to the fake message, while using the fake key. When the receiver or/and sender of the ciphertext are coerced to open the encryption key and the source message, they open the fake key and the fake message. To disclose their lie the coercer should demonstrate possibility of the alternative decryption of the ciphertext, however this is a computationally hard problem.

  9. Coherent pulse position modulation quantum cipher

    Energy Technology Data Exchange (ETDEWEB)

    Sohma, Masaki; Hirota, Osamu [Quantum ICT Research Institute, Tamagawa University, 6-1-1 Tamagawa-gakuen, Machida, Tokyo 194-8610 (Japan)

    2014-12-04

    On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.

  10. CIPHER: coded imager and polarimeter for high-energy radiation

    CERN Document Server

    Caroli, E; Dusi, W; Bertuccio, G; Sampietro, M

    2000-01-01

    The CIPHER instrument is a hard X- and soft gamma-ray spectroscopic and polarimetric coded mask imager based on an array of cadmium telluride micro-spectrometers. The position-sensitive detector (PSD) will be arranged in 4 modules of 32x32 crystals, each of 2x2 mm sup 2 cross section and 10 mm thickness giving a total active area of about 160 cm sup 2. The micro-spectrometer characteristics allow a wide operating range from approx 10 keV to 1 MeV, while the PSD is actively shielded by CsI crystals on the bottom in order to reduce background. The mask, based on a modified uniformly redundant array (MURA) pattern, is four times the area of the PSD and is situated at about 100 cm from the CdTe array top surface. The CIPHER instrument is proposed for a balloon experiment, both in order to assess the performance of such an instrumental concept for a small/medium-size satellite survey mission and to perform an innovative measurement of the Crab polarisation level. The CIPHER's field of view allows the instrument to...

  11. Observations on the SIMON Block Cipher Family

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge

    2015-01-01

    In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those...

  12. Cracking the Cipher Challenge

    CERN Document Server

    CERN. Geneva. Audiovisual Unit; Singh, Simon

    2002-01-01

    In the back of 'The Code Book', a history of cryptography, Simon Singh included a series of 10 encoded messages, each from a different period of history. The first person to crack all 10 messages would win a prize of £10,000. Now that the prize has been won, Simon can reveal the story behind the Cipher Challenge. Along the way he will show how mathematics can be used to crack codes, the role it played in World War Two and how it helps to guarantee security in the Information Age.

  13. A New Application of Stochastic Transformation

    OpenAIRE

    Nilar Win Kyaw

    2009-01-01

    In cryptography, confusion and diffusion are very important to get confidentiality and privacy of message in block ciphers and stream ciphers. There are two types of network to provide confusion and diffusion properties of message in block ciphers. They are Substitution- Permutation network (S-P network), and Feistel network. NLFS (Non-Linear feedback stream cipher) is a fast and secure stream cipher for software application. NLFS have two modes basic mode that is synchro...

  14. From Greeks to Today: Cipher Trees and Computer Cryptography.

    Science.gov (United States)

    Grady, M. Tim; Brumbaugh, Doug

    1988-01-01

    Explores the use of computers for teaching mathematical models of transposition ciphers. Illustrates the ideas, includes activities and extensions, provides a mathematical model and includes computer programs to implement these topics. (MVL)

  15. Exploring Energy Efficiency of Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arrive at the conclusion that the energy consumed per cycle during the encryption operation of an r-round unrolled architecture of any block cipher is a quadratic function in r. We then apply our model to 9 well known...

  16. A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator

    Science.gov (United States)

    Tong, Xiaojun; Cui, Minggen; Wang, Zhu

    2009-07-01

    The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.

  17. Cryptanalysis of an ergodic chaotic cipher

    International Nuclear Information System (INIS)

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G.

    2003-01-01

    In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we offer our results after having studied the security and possible attacks on a very interesting cipher algorithm based on the logistic map's ergodicity property. This algorithm has become very popular recently, as it has been taken as the development basis of new chaotic cryptosystems

  18. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    Science.gov (United States)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  19. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Energy Technology Data Exchange (ETDEWEB)

    Zacek, Petr; Jasek, Roman; Malanik, David [Faculty of applied Informatics, Tomas Bata University in Zlin, Zlin, Czech Republic zacek@fai.utb.cz, jasek@fai.utb.cz, dmalanik@fai.utb.cz (Czech Republic)

    2016-06-08

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  20. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Science.gov (United States)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-06-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  1. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    International Nuclear Information System (INIS)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-01-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  2. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

    DEFF Research Database (Denmark)

    Beierle, Christof; Jean, Jérémy; Kölbl, Stefan

    2016-01-01

    We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/ software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks. In particular, unlike SIMON, we are able...... to provide strong bounds for all versions, and not only in the single-key model, but also in the related-key or related-tweak model. SKINNY has flexible block/key/tweak sizes and can also benefit from very efficient threshold implementations for sidechannel protection. Regarding performances, it outperforms...

  3. Implementation of Rivest Shamir Adleman Algorithm (RSA and Vigenere Cipher In Web Based Information System

    Directory of Open Access Journals (Sweden)

    Aryanti Aryanti

    2018-01-01

    Full Text Available Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  4. On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers

    DEFF Research Database (Denmark)

    Blondeau, Celine; Bogdanov, Andrey; Wang, Meiqin

    2014-01-01

    or inequivalence has not been formally addressed so far in a constructive practical way.In this paper, we aim to bridge this gap in the understanding of the links between the ID and ZC properties. We tackle this problem at the example of two wide classes of ciphers, namely, Feistel- and Skipjack-type ciphers...

  5. Image Encryption Using a Lightweight Stream Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Saeed Bahrami

    2012-01-01

    Full Text Available Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.

  6. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  7. Pilot-Streaming: Design Considerations for a Stream Processing Framework for High-Performance Computing

    OpenAIRE

    Andre Luckow; Peter Kasson; Shantenu Jha

    2016-01-01

    This White Paper (submitted to STREAM 2016) identifies an approach to integrate streaming data with HPC resources. The paper outlines the design of Pilot-Streaming, which extends the concept of Pilot-abstraction to streaming real-time data.

  8. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time

  9. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  10. Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher

    International Nuclear Information System (INIS)

    Skrobek, Adrian

    2008-01-01

    Many cryptographic schemes based on M.S. Baptista algorithm were created. The original algorithm and some of the versions that based upon it were put to test with various cryptanalytic techniques. This Letter shows the new approach to Baptista's cipher cryptanalysis. The presumption is that the attacker knows the mapping in between the characters of the plaintext and the numbers of the ε-interval. Then, depending on the amount of the knowledge about the key possessed, the estimation of all components of the key requires a different computational complexity, however it is possible. This Letter also takes into consideration, independently, all the components of the key from the M.S. Baptista's original algorithm. The main aim is the use of the approximation of the blurred chaotic orbit's real value in Baptista-type cipher cryptanalysis

  11. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    DEFF Research Database (Denmark)

    Bilgin, Begul; Bogdanov, Andrey; Knezevic, Miroslav

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security...

  12. Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq

    DEFF Research Database (Denmark)

    Courtois, Nicolas T.; Bard, Gregory V.; Bogdanov, Andrey

    2008-01-01

    ]. In this paper we study a unique way of attacking KeeLoq, in which the periodic property of KeeLoq is used in to distinguish 512 rounds of KeeLoq from a random permutation. Our attacks require the knowledge of the entire code-book and are not among the fastest attacks known on this cipher. However one of them...

  13. Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs

    Directory of Open Access Journals (Sweden)

    William Diehl

    2018-04-01

    Full Text Available Lightweight block ciphers are an important topic in the Internet of Things (IoT since they provide moderate security while requiring fewer resources than the Advanced Encryption Standard (AES. Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA, and the ability to apply countermeasures. While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is difficult, since researchers typically use varied architectures, optimization strategies, technologies, and evaluation techniques. In this research, we leverage the Test Vector Leakage Assessment (TVLA methodology and the FOBOS SCA framework to compare FPGA implementations of AES, SIMON, SPECK, PRESENT, LED, and TWINE, using a choice of architecture targeted to optimize throughput-to-area (TP/A ratio and suitable for introducing countermeasures to Differential Power Analysis (DPA. We then apply an equivalent level of protection to the above ciphers using 3-share threshold implementations (TI and verify the improved resistance to DPA. We find that SIMON has the highest absolute TP/A ratio of protected versions, as well as the lowest relative cost of protection in terms of TP/A ratio. Additionally, PRESENT uses the least energy per bit (E/bit of all protected implementations, while AES has the lowest relative cost of protection in terms of increased E/bit.

  14. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher

    Science.gov (United States)

    Panduranga, H. T.; Naveen Kumar, S. K.; Kiran, HASH(0x22c8da0)

    2014-06-01

    In this paper we presented a image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The proposed method consists of permutation and substitution process. In permutation process, plain image is permuted according to chaotic sequence generated using chaotic map. In substitution process, based on secrete key of 256 bit generate a Latin Square Image Cipher (LSIC) and this LSIC is used as key image and perform XOR operation between permuted image and key image. The proposed method can applied to any plain image with unequal width and height as well and also resist statistical attack, differential attack. Experiments carried out for different images of different sizes. The proposed method possesses large key space to resist brute force attack.

  15. Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function

    NARCIS (Netherlands)

    Liu, Bozhong; Gong, Zheng; Chen, Xiaohong; Qiu, Weidong; Zheng, Dong

    2010-01-01

    Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second

  16. Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed

    2012-01-01

    We use large but sparse correlation and transition-difference-probability submatrices to find the best linear and differential approximations respectively on PRESENT-like ciphers. This outperforms the branch and bound algorithm when the number of low-weight differential and linear characteristics...

  17. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  18. Field performance of timber bridges. 17, Ciphers stress-laminated deck bridge

    Science.gov (United States)

    James P. Wacker; James A. Kainz; Michael A. Ritter

    In September 1989, the Ciphers bridge was constructed within the Beltrami Island State Forest in Roseau County, Minnesota. The bridge superstructure is a two-span continuous stress-laminated deck that is approximately 12.19 m long, 5.49 m wide, and 305 mm deep (40 ft long, 18 ft wide, and 12 in. deep). The bridge is one of the first to utilize red pine sawn lumber for...

  19. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Jessica

    2018-03-01

    This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

  20. Implementation of RC5 and RC6 block ciphers on digital images

    International Nuclear Information System (INIS)

    Belhaj Mohamed, A.; Zaibi, G.; Kachouri, A.

    2011-01-01

    With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality, and integrity must be implemented within their community. For this reason, several cryptographic algorithms have been developed to ensure the safety and reliability of this transmission. In this paper, we investigate the encryption efficiency of RC5 and RC6 block cipher applied to digital images by including a statistical and differential analysis then, and also we investigate those two block ciphers against errors in ambient noise. The security analysis shows that RC6 algorithm is more secure than RC5. However, using RC6 to encrypt images in rough environment (low signal to noise ratio) leads to more errors (almost double of RC5) and may increase energy consumption by retransmitting erroneous packets. A compromise security/energy must be taken into account for the good choice of encryption algorithm.

  1. Neutron streaming analysis for shield design of FMIT Facility

    International Nuclear Information System (INIS)

    Carter, L.L.

    1980-12-01

    Applications of the Monte Carlo method have been summarized relevant to neutron streaming problems of interest in the shield design for the FMIT Facility. An improved angular biasing method has been implemented to further optimize the calculation of streaming and this method has been applied to calculate streaming within a double bend pipe

  2. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  3. Breaking teleprinter ciphers at Bletchley Park an edition of I.J. Good, D. Michie and G. Timms : general report on tunny with emphasis on statistical methods (1945)

    CERN Document Server

    Diffie, W; Field, J

    2015-01-01

    This detailed technical account of breaking Tunny is an edition of a report written in 1945, with extensive modern commentary Breaking Teleprinter Ciphers at Bletchley Park gives the full text of the General Report on Tunny (GRT) of 1945, making clear how the ideas, notation and the specially designed machines that were used differ from what was generally accepted in 1945, and, where a modern reader might be misled, from what is understood now. The editors of this book clarify the sometimes slightly strange language of the GRT and explain the text within a variety of contexts in several separate historical story lines, some only implicit in the GRT itself. The first story, told by the authors of the GRT, describes how, using specially designed machines, including from 1944 the "Colossus", the British broke the enciphered teleprinter messages sent by the highest command levels of the Germany Army. The cipher machines the Germans used were the Loren SZ 40 series, called "Tunny" by the British. The second stor...

  4. Political and Economic Geomorphology: The Effect of Market Forces on Stream Restoration Designs

    Science.gov (United States)

    Singh, J.; Doyle, M. W.; Lave, R.; Robertson, M.

    2013-12-01

    Stream restoration in the U.S. is increasingly driven by compensatory mitigation; impacts to streams associated with typical land development activities must be offset via restoration of streams elsewhere. This policy application creates conditions in which restored stream ';credits' are traded under market-like conditions, comparable to wetland mitigation, carbon offsets, or endangered species habitat banking. The effect of this relatively new mechanism to finance stream restoration on design and construction is unknown. This research explores whether the introduction of a credit-based mitigation apparatus results in streams designed to maximize credit yields (i.e., ';credit-chasing') rather than focusing on restoring natural systems or functions. In other words, are market-based restored streams different from those designed for non-market purposes? We quantified geomorphic characteristics (e.g. hydraulic geometry, sinuosity, profile, bed sediment, LWD) of three types of streams: (1) a random sample of non-restored reaches, (2) streams restored for compensatory mitigation, and (3) streams restored under alternative funding sources (e.g., government grant programs, non-profit activities). We also compared the location of the types of stream reaches to determine whether there is a spatiality of restored streams. Physical data were complemented with a series of semi-structured interviews with key personnel in the stream restoration industry to solicit information on the influence of policy interpretation and market-driven factors on the design process. Preliminary analysis suggests that restoration is driving a directional shift in stream morphology in North Carolina. As a simple example, in the Piedmont, non-restored and restored channels had mean sinuosity of 1.17 and 1.23, respectively (p sale of restored stream credits, was seen as critically important rather than the marginal gains to be made by manipulating particular stream designs to glean more credits

  5. PDF file encryption on mobile phone using super-encryption of Variably Modified Permutation Composition (VMPC) and two square cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Atika, F.

    2018-03-01

    Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.

  6. Radiation streaming: the continuing problem of shield design

    International Nuclear Information System (INIS)

    Avery, A.F.

    1977-01-01

    The practical problems of shield design are reviewed and the major difficulties are shown to be those associated with streaming problems. The situations in which streaming occurs in various types of reactor are described including LMFBR's and fusion devices, and examples are given of ways in which the problems have been solved

  7. The (related-key) impossible boomerang attack and its application to the AES block cipher

    NARCIS (Netherlands)

    Lu, J.

    2011-01-01

    The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005. Impossible differential cryptanalysis and

  8. Design tradeoffs in long-term research for stream salamanders

    Science.gov (United States)

    Brand, Adrianne B,; Grant, Evan H. Campbell

    2017-01-01

    Long-term research programs can benefit from early and periodic evaluation of their ability to meet stated objectives. In particular, consideration of the spatial allocation of effort is key. We sampled 4 species of stream salamanders intensively for 2 years (2010–2011) in the Chesapeake and Ohio Canal National Historical Park, Maryland, USA to evaluate alternative distributions of sampling locations within stream networks, and then evaluated via simulation the ability of multiple survey designs to detect declines in occupancy and to estimate dynamic parameters (colonization, extinction) over 5 years for 2 species. We expected that fine-scale microhabitat variables (e.g., cobble, detritus) would be the strongest determinants of occupancy for each of the 4 species; however, we found greater support for all species for models including variables describing position within the stream network, stream size, or stream microhabitat. A monitoring design focused on headwater sections had greater power to detect changes in occupancy and the dynamic parameters in each of 3 scenarios for the dusky salamander (Desmognathus fuscus) and red salamander (Pseudotriton ruber). Results for transect length were more variable, but across all species and scenarios, 25-m transects are most suitable as a balance between maximizing detection probability and describing colonization and extinction. These results inform sampling design and provide a general framework for setting appropriate goals, effort, and duration in the initial planning stages of research programs on stream salamanders in the eastern United States.

  9. A secure transmission scheme of streaming media based on the encrypted control message

    Science.gov (United States)

    Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li

    2007-09-01

    As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.

  10. Two-dimensional Value Stream Mapping: Integrating the design of the MPC system in the value stream map

    DEFF Research Database (Denmark)

    Powell, Daryl; Olesen, Peter Bjerg

    2013-01-01

    Companies use value stream mapping to identify waste, often in the early stages of a lean implementation. Though the tool helps users to visualize material and information flows and to identify improvement opportunities, a limitation of this approach is the lack of an integrated method...... for analysing and re-designing the MPC system in order to support lean improvement. We reflect on the current literature regarding value stream mapping, and use practical insights in order to develop and propose a two-dimensional value stream mapping tool that integrates the design of the MPC system within...... the material and information flow map....

  11. Some security results of the RC4+ stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Jha, Sonu

    2015-01-01

    to any even 8-bit constant other than 0xAA. Therefore, the question that naturally arises is whether the design of RC4+ can be protected by fixing the pad parameter to some constant odd value. In this paper, we try to answer this very question. We show that the design is still vulnerable by mounting...... in terms of number of faults required and the computational complexity. In fact, we reduce the number of faults by around 11264 on average, and our algorithm is around 26 times faster....

  12. Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis

    Science.gov (United States)

    Lu, Jiqiang; Kim, Jongsung

    SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. It is a NESSIE selected block cipher algorithm. In this paper, we observe that, when checking whether a candidate quartet is useful in a (related-key) rectangle attack, we can check the two pairs from the quartet one after the other, instead of checking them simultaneously; if the first pair does not meet the expected conditions, we can discard the quartet immediately. We next exploit a 35-round related-key rectangle distinguisher with probability 2-460 for the first 35 rounds of SHACAL-2, which is built on an existing 24-round related-key differential and a new 10-round differential. Finally, taking advantage of the above observation, we use the distinguisher to mount a related-key rectangle attack on the first 44 rounds of SHACAL-2. The attack requires 2233 related-key chosen plaintexts, and has a time complexity of 2497.2 computations. This is better than any previously published cryptanalytic results on SHACAL-2 in terms of the numbers of attacked rounds.

  13. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  14. Improved cryptanalysis of the block cipher KASUMI

    DEFF Research Database (Denmark)

    Jia, Keting; Li, Leibo; Rechberger, Christian

    2013-01-01

    KASUMI is a block cipher which consists of eight Feistel rounds with a 128-bit key. Proposed more than 10 years ago, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. In the practically interesting single key setting, only up to 6 rounds have...... been attacked so far. In this paper we use some observations on the FL and FO functions. Combining these observations with a key schedule weakness, we select some special input and output values to refine the general 5-round impossible differentials and propose the first 7-round attack on KASUMI...... with time and data complexities similar to the previously best 6-round attacks. This leaves now only a single round of security margin. The new impossible differential attack on the last 7 rounds needs 2114.3 encryptions with 252.5 chosen plaintexts. For the attack on the first 7 rounds, the data complexity...

  15. Red River Stream Improvement Final Design Nez Perce National Forest.

    Energy Technology Data Exchange (ETDEWEB)

    Watershed Consulting, LLC

    2007-03-15

    This report details the final stream improvement design along the reach of Red River between the bridge below Dawson Creek, upstream for approximately 2 miles, Idaho County, Idaho. Geomorphic mapping, hydrologic profiles and cross-sections were presented along with existing fish habitat maps in the conceptual design report. This information is used to develop a stream improvement design intended to improve aquatic habitat and restore riparian health in the reach. The area was placer mined using large bucket dredges between 1938 and 1957. This activity removed most of the riparian vegetation in the stream corridor and obliterated the channel bed and banks. The reach was also cut-off from most valley margin tributaries. In the 50 years since large-scale dredging ceased, the channel has been re-established and parts of the riparian zone have grown in. However, the recruitment of large woody debris to the stream has been extremely low and overhead cover is poor. Pool habitat makes up more than 37% of the reach, and habitat diversity is much better than the project reach on Crooked River. There is little large woody debris in the stream to provide cover for spawning and juvenile rearing, because the majority of the woody debris does not span a significant part of the channel, but is mainly on the side slopes of the stream. Most of the riparian zone has very little soil or subsoil left after the mining and so now consists primarily of unconsolidated cobble tailings or heavily compacted gravel tailings. Knapweed and lodgepole pine are the most successful colonizers of these post mining landforms. Tributary fans which add complexity to many other streams in the region, have been isolated from the main reach due to placer mining and road building.

  16. Design methods of Coanda effect nozzle with two streams

    Directory of Open Access Journals (Sweden)

    Michele TRANCOSSI

    2014-03-01

    Full Text Available This paper continues recent research of the authors about the ACHEON Coanda effect two streams nozzle. This nozzle aims to produce an effective deflection of a propulsive jet with a correspondent deviation of the thrust vector in a 2D plane. On the basis of a previously published mathematical model, based on integral equations, it tries to produce an effective design guideline, which can be adopted for design activities of the nozzle for aeronautic propulsion. The presented model allows defining a governing method for this innovative two stream synthetic jet nozzle. The uncertainness level of the model are discussed and novel aircraft architectures based on it are presented. A CFD validation campaign is produced focusing on validating the model and the designs produced.

  17. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  18. Layer-based buffer aware rate adaptation design for SHVC video streaming

    Science.gov (United States)

    Gudumasu, Srinivas; Hamza, Ahmed; Asbun, Eduardo; He, Yong; Ye, Yan

    2016-09-01

    This paper proposes a layer based buffer aware rate adaptation design which is able to avoid abrupt video quality fluctuation, reduce re-buffering latency and improve bandwidth utilization when compared to a conventional simulcast based adaptive streaming system. The proposed adaptation design schedules DASH segment requests based on the estimated bandwidth, dependencies among video layers and layer buffer fullness. Scalable HEVC video coding is the latest state-of-art video coding technique that can alleviate various issues caused by simulcast based adaptive video streaming. With scalable coded video streams, the video is encoded once into a number of layers representing different qualities and/or resolutions: a base layer (BL) and one or more enhancement layers (EL), each incrementally enhancing the quality of the lower layers. Such layer based coding structure allows fine granularity rate adaptation for the video streaming applications. Two video streaming use cases are presented in this paper. The first use case is to stream HD SHVC video over a wireless network where available bandwidth varies, and the performance comparison between proposed layer-based streaming approach and conventional simulcast streaming approach is provided. The second use case is to stream 4K/UHD SHVC video over a hybrid access network that consists of a 5G millimeter wave high-speed wireless link and a conventional wired or WiFi network. The simulation results verify that the proposed layer based rate adaptation approach is able to utilize the bandwidth more efficiently. As a result, a more consistent viewing experience with higher quality video content and minimal video quality fluctuations can be presented to the user.

  19. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  20. Application and Misapplication of the Czechoslovak STP Cipher During WWII – Report on an Unpublished Manuscript

    Czech Academy of Sciences Publication Activity Database

    Porubský, Štefan

    2017-01-01

    Roč. 70, č. 1 (2017), s. 41-91 ISSN 1210-3195 Institutional support: RVO:67985807 Keywords : STP cipher * Josef Růžek * Karol Cigáň * František Moravec * Czechoslovak military cryptography * Word War II Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) https://tatra.mat.savba.sk/paper.php?id_paper=1412

  1. Design and methods of the Southeast Stream Quality Assessment (SESQA), 2014

    Science.gov (United States)

    Journey, Celeste A.; Van Metre, Peter C.; Bell, Amanda H.; Button, Daniel T.; Garrett, Jessica D.; Nakagaki, Naomi; Qi, Sharon L.; Bradley, Paul M.

    2015-07-15

    During 2014, the U.S. Geological Survey (USGS) National Water-Quality Assessment Program (NAWQA) assessed stream quality across the Piedmont and southern Appalachian Mountain regions of the southeastern United States. This Southeast Stream Quality Assessment (SESQA) simultaneously characterized watershed and stream-reach water-quality stressors along with instream biological conditions, in order to better understand regional stressor-effects relations. The goal of SESQA is to provide communities and policymakers with information about those human and environmental factors that have the greatest impact on stream quality across the region. The SESQA design focused on hydrologic alteration and urbanization because of their importance as ecological stressors of particular concern to Southeast region resource managers.

  2. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  3. Route 66: Passively Breaking All GSM Channels

    DEFF Research Database (Denmark)

    Vejre, Philip S.; Bogdanov, Andrey

    2014-01-01

    The A5/2 stream cipher used for encryption in the GSM mobile phone standard has previously been shown to have serious weaknesses. Due to a lack of key separation and flaws in the security protocols, these vulnerabilities can also compromise the stronger GSM ciphers A5/1 and A5/3. Despite GSM's huge...

  4. The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

    Directory of Open Access Journals (Sweden)

    Jun Choi

    2015-06-01

    Full Text Available Since Advanced Encryption Standard (AES in stream modes, such as counter (CTR, output feedback (OFB and cipher feedback (CFB, can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are many attack results using algebraic properties and side channel information against stream ciphers for hardware applications. Al-Hinai et al. presented an algebraic attack approach to a family of irregularly clock-controlled linear feedback shift register systems: the stop and go generator, self-decimated generator and alternating step generator. Other clock-controlled systems, such as shrinking and cascade generators, are indeed vulnerable against side channel attacks. To overcome these threats, new clock-controlled systems were presented, e.g., the generalized alternating step generator, cascade jump-controlled generator and mutual clock-controlled generator. However, the algebraic attack could be applied directly on these new systems. In this paper, we propose a new clock-controlled generator: the switching generator, which has resistance to algebraic and side channel attacks. This generator also preserves both security properties and the efficiency of existing clock-controlled generators.

  5. A thermal design method for the performance optimization of multi-stream plate-fin heat exchangers

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Zhe; Li, Yanzhong [Xi’an Jiaotong University, Xi’an (China); Sunden, Bengt [Lund University, Lund (Sweden); Han, Fenghui [Dalian Maritime University, Dalian (China)

    2017-06-15

    An optimization design method based on field synergy principle is developed for Multi-stream plate-fin heat exchangers (MPHEs) with a segmented differential model. The heat exchanger is divided into a number of sub-exchangers along the main stream, and each sub-exchanger consists of N passages along the height of the exchanger. Compared with the traditional heat exchanger design, this method allows temperature and pressure fields to be obtained via coupling calculation with consideration of variable physical properties and the axial heat loss of the heat exchanger. Finally, the heat exchanger is optimally designed using a temperature-difference uniformity optimization factor based on field synergy principle. This design model can provide an accurate temperature field and pressure field, because the stream properties are determined by the mean temperature and pressure of each local sub-exchanger. Optimum results indicate that the temperature distribution on the cross section of the heat exchanger is relatively uniform and that the temperature difference of heat transfer for each stream is always a small value. These characteristics prove the feasibility and effectiveness of this design model. In this paper, a case of five stream plate-fin heat exchangers for an ethylene plant is designed under a practical cold box operating condition with the proposed model, the structure and heat transfer of which are optimally determined. The design model and optimization method proposed in this work can provide theoretical and technical support to the optimization design of MPHEs.

  6. Extended substitution-diffusion based image cipher using chaotic standard map

    Science.gov (United States)

    Kumar, Anil; Ghose, M. K.

    2011-01-01

    This paper proposes an extended substitution-diffusion based image cipher using chaotic standard map [1] and linear feedback shift register to overcome the weakness of previous technique by adding nonlinearity. The first stage consists of row and column rotation and permutation which is controlled by the pseudo-random sequences which is generated by standard chaotic map and linear feedback shift register, second stage further diffusion and confusion is obtained in the horizontal and vertical pixels by mixing the properties of the horizontally and vertically adjacent pixels, respectively, with the help of chaotic standard map. The number of rounds in both stage are controlled by combination of pseudo-random sequence and original image. The performance is evaluated from various types of analysis such as entropy analysis, difference analysis, statistical analysis, key sensitivity analysis, key space analysis and speed analysis. The experimental results illustrate that performance of this is highly secured and fast.

  7. Cryptanalysis of a chaos block cipher for wireless sensor network

    Science.gov (United States)

    Yang, Jiyun; Xiao, Di; Xiang, Tao

    2011-02-01

    Based on the analysis of a chaos block cipher for wireless sensor network (WSN), it is found that there is a fatal flaw in its security because the number of rounds is too small and the calculation precision of round function is too short. The scheme could be cryptanalyzed by utilizing differential cryptanalysis theory. First, the third round key is recovered by chosen plaintext attack according to the characteristics of the round function. Then, the second round key can be deduced from the relationship of the sub-keys between the second and the third rounds. Based on the above successful attacks, the first round key could also be broken by brute-force attack. Finally, by employing the characteristics of Feistel structure, the fourth round key could also be obtained. Since all round keys have been cryptanalyzed, the plaintext can then be decrypted. The encryption scheme is proven to be insecure consequently.

  8. IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

    Directory of Open Access Journals (Sweden)

    KARAM M. Z. OTHMAN

    2011-08-01

    Full Text Available Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. The design of the cryptography system is a conventional cryptography that uses one key for encryption and decryption process. The chosen cryptography algorithm is stream cipher algorithm that encrypt one bit at a time. The central problem in the stream-cipher cryptography is the difficulty of generating a long unpredictable sequence of binary signals from short and random key. Pseudo random number generators (PRNG have been widely used to construct this key sequence. The pseudo random number generator was designed using the Artificial Neural Networks (ANN. The Artificial Neural Networks (ANN providing the required nonlinearity properties that increases the randomness statistical properties of the pseudo random generator. The learning algorithm of this neural network is backpropagation learning algorithm. The learning process was done by software program in Matlab (software implementation to get the efficient weights. Then, the learned neural network was implemented using field programmable gate array (FPGA.

  9. Toward Design Guidelines for Stream Restoration Structures: Measuring and Modeling Unsteady Turbulent Flows in Natural Streams with Complex Hydraulic Structures

    Science.gov (United States)

    Lightbody, A.; Sotiropoulos, F.; Kang, S.; Diplas, P.

    2009-12-01

    Despite their widespread application to prevent lateral river migration, stabilize banks, and promote aquatic habitat, shallow transverse flow training structures such as rock vanes and stream barbs lack quantitative design guidelines. Due to the lack of fundamental knowledge about the interaction of the flow field with the sediment bed, existing engineering standards are typically based on various subjective criteria or on cross-sectionally-averaged shear stresses rather than local values. Here, we examine the performance and stability of in-stream structures within a field-scale single-threaded sand-bed meandering stream channel in the newly developed Outdoor StreamLab (OSL) at the St. Anthony Falls Laboratory (SAFL). Before and after the installation of a rock vane along the outer bank of the middle meander bend, high-resolution topography data were obtained for the entire 50-m-long reach at 1-cm spatial scale in the horizontal and sub-millimeter spatial scale in the vertical. In addition, detailed measurements of flow and turbulence were obtained using acoustic Doppler velocimetry at twelve cross-sections focused on the vicinity of the structure. Measurements were repeated at a range of extreme events, including in-bank flows with an approximate flow rate of 44 L/s (1.4 cfs) and bankfull floods with an approximate flow rate of 280 L/s (10 cfs). Under both flow rates, the structure reduced near-bank shear stresses and resulted in both a deeper thalweg and near-bank aggradation. The resulting comprehensive dataset has been used to validate a large eddy simulation carried out by SAFL’s computational fluid dynamics model, the Virtual StreamLab (VSL). This versatile computational framework is able to efficiently simulate 3D unsteady turbulent flows in natural streams with complex in-stream structures and as a result holds promise for the development of much-needed quantitative design guidelines.

  10. An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

    Science.gov (United States)

    Budiman, M. A.; Amalia; Chayanie, N. I.

    2018-03-01

    Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.

  11. Experimental design for estimating parameters of rate-limited mass transfer: Analysis of stream tracer studies

    Science.gov (United States)

    Wagner, Brian J.; Harvey, Judson W.

    1997-01-01

    Tracer experiments are valuable tools for analyzing the transport characteristics of streams and their interactions with shallow groundwater. The focus of this work is the design of tracer studies in high-gradient stream systems subject to advection, dispersion, groundwater inflow, and exchange between the active channel and zones in surface or subsurface water where flow is stagnant or slow moving. We present a methodology for (1) evaluating and comparing alternative stream tracer experiment designs and (2) identifying those combinations of stream transport properties that pose limitations to parameter estimation and therefore a challenge to tracer test design. The methodology uses the concept of global parameter uncertainty analysis, which couples solute transport simulation with parameter uncertainty analysis in a Monte Carlo framework. Two general conclusions resulted from this work. First, the solute injection and sampling strategy has an important effect on the reliability of transport parameter estimates. We found that constant injection with sampling through concentration rise, plateau, and fall provided considerably more reliable parameter estimates than a pulse injection across the spectrum of transport scenarios likely encountered in high-gradient streams. Second, for a given tracer test design, the uncertainties in mass transfer and storage-zone parameter estimates are strongly dependent on the experimental Damkohler number, DaI, which is a dimensionless combination of the rates of exchange between the stream and storage zones, the stream-water velocity, and the stream reach length of the experiment. Parameter uncertainties are lowest at DaI values on the order of 1.0. When DaI values are much less than 1.0 (owing to high velocity, long exchange timescale, and/or short reach length), parameter uncertainties are high because only a small amount of tracer interacts with storage zones in the reach. For the opposite conditions (DaI ≫ 1.0), solute

  12. Identifying Watershed, Landscape, and Engineering Design Factors that Influence the Biotic Condition of Restored Streams

    Directory of Open Access Journals (Sweden)

    Barbara Doll

    2016-04-01

    Full Text Available Restored stream reaches at 79 sites across North Carolina were sampled for aquatic macroinvertebrates using a rapid bioassessment protocol. Morphological design parameters and geographic factors, including watershed and landscape parameters (e.g., valley slope, substrate, were also compiled for these streams. Principal component regression analyses revealed correlations between design and landscape variables with macroinvertebrate metrics. The correlations were strengthened by adding watershed variables. Ridge regression was used to find the best-fit model for predicting dominant taxa from the “pollution sensitive” orders of Ephemeroptera (mayflies, Plecoptera (stoneflies, and Trichoptera (caddisflies, or EPT taxa, resulting in coefficient weights that were most interpretable relative to site selection and design parameters. Results indicate that larger (wider streams located in the mountains and foothills where there are steeper valleys, larger substrate, and undeveloped watersheds are expected to have higher numbers of dominant EPT taxa. In addition, EPT taxa numbers are positively correlated with accessible floodplain width and negatively correlated with width-to-depth ratio and sinuosity. This study indicates that both site selection and design should be carefully considered in order to maximize the resulting biotic condition and associated potential ecological uplift of the stream.

  13. Cross-Layer Design of Source Rate Control and Congestion Control for Wireless Video Streaming

    Directory of Open Access Journals (Sweden)

    Peng Zhu

    2007-01-01

    Full Text Available Cross-layer design has been used in streaming video over the wireless channels to optimize the overall system performance. In this paper, we extend our previous work on joint design of source rate control and congestion control for video streaming over the wired channel, and propose a cross-layer design approach for wireless video streaming. First, we extend the QoS-aware congestion control mechanism (TFRCC proposed in our previous work to the wireless scenario, and provide a detailed discussion about how to enhance the overall performance in terms of rate smoothness and responsiveness of the transport protocol. Then, we extend our previous joint design work to the wireless scenario, and a thorough performance evaluation is conducted to investigate its performance. Simulation results show that by cross-layer design of source rate control at application layer and congestion control at transport layer, and by taking advantage of the MAC layer information, our approach can avoid the throughput degradation caused by wireless link error, and better support the QoS requirements of the application. Thus, the playback quality is significantly improved, while good performance of the transport protocol is still preserved.

  14. Effects of natural-channel-design restoration on habitat quality in Catskill Mountain streams, New York

    Science.gov (United States)

    Ernst, Anne G.; Baldigo, Barry P.; Mulvihill, Christiane; Vian, Mark

    2010-01-01

    Stream restoration has received much attention in recent years, yet there has been little effort to evaluate its impacts on physical habitat, stability, and biota. A popular but controversial stream restoration approach is natural channel design (NCD), which cannot be adequately evaluated without a long-term, independent assessment of its effects on stream habitat. Six reaches of five Catskill Mountain streams in southeastern New York were restored during 2000–2003 following NCD techniques to decrease bed and bank degradation, decrease sediment loads, and improve water quality. Habitat surveys were conducted during summer low flows from 2001 to 2007. The effects of the NCD projects on stream condition were assessed via a before–after–control–impact study design to quantify the net changes in stream and bank habitat variables relative to those in unaltered control reaches. Analysis of variance tests of three different measures of bank stability show that on average stream stability increased at treatment sites for 2–5 years after restoration. Mean channel depth, thalweg depth, and the pool–riffle ratio generally increased, whereas mean channel width, percent streambank coverage by trees, and shade decreased. Habitat suitability indices for local salmonid species increased at four of six reaches after restoration. The changes in channel dimensions rendered them generally more characteristic of stabler stream forms in the given valley settings. Although these studies were done relatively soon after project completion, our findings demonstrate that habitat conditions can be improved in degraded Catskill Mountain streams through NCD restoration.

  15. Design for real-time data acquisition based on streaming technology

    International Nuclear Information System (INIS)

    Nakanishi, Hideya; Kojima, Mamoru

    2001-04-01

    For the LHD project a long-pulse plasma experiment of one-hour duration is planned. In this quasi steady-state operation, the data acquisition system will be required to continuously transfer the diagnostic data from the digitizer front-end and display them in real-time. The Compact PCI standard is used to replace the conventional CAMAC digitizers in LHD, because it provides good functionality for real-time data streaming and also a connectivity with modern PC technology. The digitizer scheme, interface to the host computer, adoption of data compression, and downstream applications are discussed in detail to design and implement this new real-time data streaming system for LHD plasma diagnostics. (author)

  16. Development of Ecogeomorphological (EGM Stream Design and Assessment Tools for the Piedmont of Alabama, USA

    Directory of Open Access Journals (Sweden)

    Brian Helms

    2016-04-01

    Full Text Available Regional data needed for effective stream restoration include hydraulic geometry relationships (i.e., regional curves and reference channel morphology parameters. Increasingly ecological conditions are being considered when designing, implementing, and assessing restoration efforts. We provide morphology relationships and associated ecological endpoint curves for reference streams in the Alabama piedmont. Twenty-one reference stream reaches were identified in the Tallapoosa drainage of Alabama, ranging from 0.2 to 242 km2 drainage area. Geomorphic surveys were conducted in each stream to measure riffle cross-sections and longitudinal profiles and related to drainage area to develop regional curves. Fish, crayfish, and benthic macroinvertebrates were collected from each surveyed reach and related to drainage area and geomorphic data to provide associated biological community endpoints. Bankfull channel cross-section area, width, mean depth, and estimated discharge were strongly correlated to watershed drainage area, similar to efforts in other areas of the Piedmont ecoregion. Multiple measures of fish assemblages and crayfish size were strongly predicted by drainage area and geomorphic dimensions. Macroinvertebrates showed no taxonomic and limited functional relationships with drainage area and geomorphic dimension. These tools, which integrate geomorphological and ecological conditions, can result in improved stream evaluations and designs increasing the effectiveness of stream restoration projects.

  17. Cipher image damage and decisions in real time

    Science.gov (United States)

    Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David

    2015-01-01

    This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.

  18. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  19. Use of Ecohydraulic-Based Mesohabitat Classification and Fish Species Traits for Stream Restoration Design

    Directory of Open Access Journals (Sweden)

    John S. Schwartz

    2016-11-01

    Full Text Available Stream restoration practice typically relies on a geomorphological design approach in which the integration of ecological criteria is limited and generally qualitative, although the most commonly stated project objective is to restore biological integrity by enhancing habitat and water quality. Restoration has achieved mixed results in terms of ecological successes and it is evident that improved methodologies for assessment and design are needed. A design approach is suggested for mesohabitat restoration based on a review and integration of fundamental processes associated with: (1 lotic ecological concepts; (2 applied geomorphic processes for mesohabitat self-maintenance; (3 multidimensional hydraulics and habitat suitability modeling; (4 species functional traits correlated with fish mesohabitat use; and (5 multi-stage ecohydraulics-based mesohabitat classification. Classification of mesohabitat units demonstrated in this article were based on fish preferences specifically linked to functional trait strategies (i.e., feeding resting, evasion, spawning, and flow refugia, recognizing that habitat preferences shift by season and flow stage. A multi-stage classification scheme developed under this premise provides the basic “building blocks” for ecological design criteria for stream restoration. The scheme was developed for Midwest US prairie streams, but the conceptual framework for mesohabitat classification and functional traits analysis can be applied to other ecoregions.

  20. An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard

    Science.gov (United States)

    Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi

    H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.

  1. Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2017-01-01

    Full Text Available The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF is presented. Proposed modification avoids discrete logarithm attack (DLA which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ system of equations, which is a system representing a subclass of multivariate quadratic (MQ systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA and chosen ciphertext attack (CCA is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.

  2. Co-creation, Prevailing Streams and a Future Design Trajectory

    DEFF Research Database (Denmark)

    Degnegaard, Rex

    2014-01-01

    of the literature on co-creation to explore what the existing literature relates to and indeed to pinpoint if any patterns or streams can be identified. The paper illustrates how the use of the concept of co-creation suggests a necessity for focusing further on specific co-creation-related issues and challenges...... of significance to business and society. The paper highlights new co-creation-related issues and challenges. Further, the paper crystallises an emerging design trajectory in theory and practice....

  3. Output channel design for collecting closely-spaced particle streams from spiral inertial separation devices

    Directory of Open Access Journals (Sweden)

    Caffiyar Mohamed Yousuff

    2017-08-01

    Full Text Available Recent advances in inertial microfluidics designs have enabled high throughput, label-free separation of cells for a variety of bioanalytical applications. Various device configurations have been proposed for binary separation with a focus on enhancing the separation distance between particle streams to improve the efficiency of separate particle collection. These configurations have not demonstrated scaling beyond 3 particle streams either because the channel width is a constraint at the collection outlets or particle streams would be too closely spaced to be collected separately. We propose a method to design collection outlets for inertial focusing and separation devices which can collect closely-spaced particle streams and easily scale to an arbitrary number of collection channels without constraining the outlet channel width, which is the usual cause of clogging or cell damage. According to our approach, collection outlets are a series of side-branching channels perpendicular to the main channel of egress. The width and length of the outlets can be chosen subject to constraints from the position of the particle streams and fluidic resistance ratio computed from fluid dynamics simulations. We show the efficacy of this approach by demonstrating a successful collection of upto 3 particle streams of 7μm, 10μm and 15μm fluorescent beads which have been focused and separated by a spiral inertial device with a separation distance of only 10μm -15μm. With a throughput of 1.8mL/min, we achieved collection efficiency exceeding 90% for each particle at the respective collection outlet. The flexibility to use wide collection channels also enabled us to fabricate the microfluidic device with an epoxy mold that was created using xurography, a low cost, and imprecise fabrication technique.

  4. Streaming Pool: reuse, combine and create reactive streams with pleasure

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    When connecting together heterogeneous and complex systems, it is not easy to exchange data between components. Streams of data are successfully used in industry in order to overcome this problem, especially in the case of "live" data. Streams are a specialization of the Observer design pattern and they provide asynchronous and non-blocking data flow. The ongoing effort of the ReactiveX initiative is one example that demonstrates how demanding this technology is even for big companies. Bridging the discrepancies of different technologies with common interfaces is already done by the Reactive Streams initiative and, in the JVM world, via reactive-streams-jvm interfaces. Streaming Pool is a framework for providing and discovering reactive streams. Through the mechanism of dependency injection provided by the Spring Framework, Streaming Pool provides a so called Discovery Service. This object can discover and chain streams of data that are technologically agnostic, through the use of Stream IDs. The stream to ...

  5. A Design of Experiments Investigation of Offset Streams for Supersonic Jet Noise Reduction

    Science.gov (United States)

    Henderson, Brenda; Papamoschou, Dimitri

    2014-01-01

    An experimental investigation into the noise characteristics of a dual-stream jet with four airfoils inserted in the fan nozzle was conducted. The intent of the airfoils was to deflect the fan stream relative to the core stream and, therefore, impact the development of the secondary potential core and noise radiated in the peak jet-noise direction. The experiments used a full-factorial Design of Experiments (DoE) approach to identify parameters and parameter interactions impacting noise radiation at two azimuthal microphone array locations, one of which represented a sideline viewing angle. The parameters studied included airfoil angle-of-attack, airfoil azimuthal location within the fan nozzle, and airfoil axial location relative to the fan-nozzle trailing edge. Jet conditions included subsonic and supersonic fan-stream Mach numbers. Heated jets conditions were simulated with a mixture of helium and air to replicate the exhaust velocity and density of the hot jets. The introduction of the airfoils was shown to impact noise radiated at polar angles in peak-jet noise direction and to have no impact on noise radiated at small and broadside polar angles and to have no impact on broadband-shock-associated noise. The DoE analysis showed the main effects impacting noise radiation at sideline-azimuthal-viewing angles included airfoil azimuthal angle for the airfoils on the lower side of the jet near the sideline array and airfoil trailing edge distance (with airfoils located at the nozzle trailing edge produced the lowest sound pressure levels). For an array located directly beneath the jet (and on the side of the jet from which the fan stream was deflected), the main effects impacting noise radiation included airfoil angle-of-attack and airfoil azimuthal angle for the airfoils located on the observation side of the jet as well and trailing edge distance. Interaction terms between multiple configuration parameters were shown to have significant impact on the radiated

  6. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  7. Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.

    Science.gov (United States)

    Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao

    2016-06-01

    Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost.

  8. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  9. InSTREAM: the individual-based stream trout research and environmental assessment model

    Science.gov (United States)

    Steven F. Railsback; Bret C. Harvey; Stephen K. Jackson; Roland H. Lamberson

    2009-01-01

    This report documents Version 4.2 of InSTREAM, including its formulation, software, and application to research and management problems. InSTREAM is a simulation model designed to understand how stream and river salmonid populations respond to habitat alteration, including altered flow, temperature, and turbidity regimes and changes in channel morphology. The model...

  10. Digital dashboard design using multiple data streams for disease surveillance with influenza surveillance as an example.

    Science.gov (United States)

    Cheng, Calvin K Y; Ip, Dennis K M; Cowling, Benjamin J; Ho, Lai Ming; Leung, Gabriel M; Lau, Eric H Y

    2011-10-14

    Great strides have been made exploring and exploiting new and different sources of disease surveillance data and developing robust statistical methods for analyzing the collected data. However, there has been less research in the area of dissemination. Proper dissemination of surveillance data can facilitate the end user's taking of appropriate actions, thus maximizing the utility of effort taken from upstream of the surveillance-to-action loop. The aims of the study were to develop a generic framework for a digital dashboard incorporating features of efficient dashboard design and to demonstrate this framework by specific application to influenza surveillance in Hong Kong. Based on the merits of the national websites and principles of efficient dashboard design, we designed an automated influenza surveillance digital dashboard as a demonstration of efficient dissemination of surveillance data. We developed the system to synthesize and display multiple sources of influenza surveillance data streams in the dashboard. Different algorithms can be implemented in the dashboard for incorporating all surveillance data streams to describe the overall influenza activity. We designed and implemented an influenza surveillance dashboard that utilized self-explanatory figures to display multiple surveillance data streams in panels. Indicators for individual data streams as well as for overall influenza activity were summarized in the main page, which can be read at a glance. Data retrieval function was also incorporated to allow data sharing in standard format. The influenza surveillance dashboard serves as a template to illustrate the efficient synthesization and dissemination of multiple-source surveillance data, which may also be applied to other diseases. Surveillance data from multiple sources can be disseminated efficiently using a dashboard design that facilitates the translation of surveillance information to public health actions.

  11. Design and methods of the Midwest Stream Quality Assessment (MSQA), 2013

    Science.gov (United States)

    Garrett, Jessica D.; Frey, Jeffrey W.; Van Metre, Peter C.; Journey, Celeste A.; Nakagaki, Naomi; Button, Daniel T.; Nowell, Lisa H.

    2017-10-18

    During 2013, the U.S. Geological Survey (USGS) National Water-Quality Assessment Project (NAWQA), in collaboration with the USGS Columbia Environmental Research Center, the U.S. Environmental Protection Agency (EPA) National Rivers and Streams Assessment (NRSA), and the EPA Office of Pesticide Programs assessed stream quality across the Midwestern United States. This Midwest Stream Quality Assessment (MSQA) simultaneously characterized watershed and stream-reach water-quality stressors along with instream biological conditions, to better understand regional stressor-effects relations. The MSQA design focused on effects from the widespread agriculture in the region and urban development because of their importance as ecological stressors of particular concern to Midwest region resource managers.A combined random stratified selection and a targeted selection based on land-use data were used to identify and select sites representing gradients in agricultural intensity across the region. During a 14-week period from May through August 2013, 100 sites were selected and sampled 12 times for contaminants, nutrients, and sediment. This 14-week water-quality “index” period culminated with an ecological survey of habitat, periphyton, benthic macroinvertebrates, and fish at all sites. Sediment was collected during the ecological survey for analysis of sediment chemistry and toxicity testing. Of the 100 sites, 50 were selected for the MSQA random stratified group from 154 NRSA sites planned for the region, and the other 50 MSQA sites were selected as targeted sites to more evenly cover agricultural and urban stressor gradients in the study area. Of the 50 targeted sites, 12 were in urbanized watersheds and 21 represented “good” biological conditions or “least disturbed” conditions. The remaining 17 targeted sites were selected to improve coverage of the agricultural intensity gradient or because of historical data collection to provide temporal context for the

  12. StreamMap: Smooth Dynamic Visualization of High-Density Streaming Points.

    Science.gov (United States)

    Li, Chenhui; Baciu, George; Han, Yu

    2018-03-01

    Interactive visualization of streaming points for real-time scatterplots and linear blending of correlation patterns is increasingly becoming the dominant mode of visual analytics for both big data and streaming data from active sensors and broadcasting media. To better visualize and interact with inter-stream patterns, it is generally necessary to smooth out gaps or distortions in the streaming data. Previous approaches either animate the points directly or present a sampled static heat-map. We propose a new approach, called StreamMap, to smoothly blend high-density streaming points and create a visual flow that emphasizes the density pattern distributions. In essence, we present three new contributions for the visualization of high-density streaming points. The first contribution is a density-based method called super kernel density estimation that aggregates streaming points using an adaptive kernel to solve the overlapping problem. The second contribution is a robust density morphing algorithm that generates several smooth intermediate frames for a given pair of frames. The third contribution is a trend representation design that can help convey the flow directions of the streaming points. The experimental results on three datasets demonstrate the effectiveness of StreamMap when dynamic visualization and visual analysis of trend patterns on streaming points are required.

  13. Structural Responses of a Stream Community to a Channel Relocation Using a Natural Channel Design Approach

    Science.gov (United States)

    Jack, J.; Word, D.; Daniel, W.; Pritchard, S.; Parola, A.; Vesely, B.

    2005-05-01

    Streams have been heavily impacted by historical and contemporary management practices. Restorations are seen as a way to enhance stream ecosystem integrity, but there are few restoration sites where pre- and post-restoration data are available to assess "success." In 2003, a channelized reach of Wilson Creek (Kentucky, USA) was relocated using a natural channel design approach. We compared the structural and functional responses of the stream pre- and post restoration/relocation at sites within Wilson and two reference streams. Despite the construction disturbance, water chemistry parameters such as nitrate and turbidity were nearly identical at sampling stations above and below the relocation for 2003-2004. Macroinvertebrate colonization of the relocation sites was rapid, with communities dominated by Cheumatopsyche, Perlesta and Baetis. Assessments of CPOM transport indicated that the new stream channel is more retentive of leaf and woody debris material than the pre-restoration Wilson sites or unrestored reference stream sites. The restoration of suitable habitat and the presence of "source populations" for colonization may compensate for even large-scale (but short-term) construction disturbance. More research is needed to assess the balance between the disturbance impacts of restoration installation and the long term benefits of stream ecological improvement.

  14. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

    Science.gov (United States)

    Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi

    2018-01-01

    Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.

  15. Bridge scour and stream instability countermeasures : experience, selection, and design guidance : third edition. Volume 1

    Science.gov (United States)

    2009-09-01

    This document identifies and provides design guidelines for bridge scour and stream instability countermeasures that have been implemented by various State departments of transportation (DOTs) in the United States. Countermeasure experience, selectio...

  16. Bridge scour and stream instability countermeasures : experience, selection, and design guidance : third edition. Volume 2

    Science.gov (United States)

    2009-09-01

    This document identifies and provides design guidelines for bridge scour and stream instability countermeasures that have been implemented by various State departments of transportation (DOTs) in the United States. Countermeasure experience, selectio...

  17. A morphological comparison of narrow, low-gradient streams traversing wetland environments to alluvial streams.

    Science.gov (United States)

    Jurmu, Michael C

    2002-12-01

    Twelve morphological features from research on alluvial streams are compared in four narrow, low-gradient wetland streams located in different geographic regions (Connecticut, Indiana, and Wisconsin, USA). All four reaches differed in morphological characteristics in five of the features compared (consistent bend width, bend cross-sectional shape, riffle width compared to pool width, greatest width directly downstream of riffles, and thalweg location), while three reaches differed in two comparisons (mean radius of curvature to width ratio and axial wavelength to width ratio). The remaining five features compared had at least one reach where different characteristics existed. This indicates the possibility of varying morphology for streams traversing wetland areas further supporting the concept that the unique qualities of wetland environments might also influence the controls on fluvial dynamics and the development of streams. If certain morphological features found in streams traversing wetland areas differ from current fluvial principles, then these varying features should be incorporated into future wetland stream design and creation projects. The results warrant further research on other streams traversing wetlands to determine if streams in these environments contain unique morphology and further investigation of the impact of low-energy fluvial processes on morphological development. Possible explanations for the morphology deviations in the study streams and some suggestions for stream design in wetland areas based upon the results and field observations are also presented.

  18. Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

    International Nuclear Information System (INIS)

    Khalaf, Rifaat Zaidan; Abdullah, Alharith Abdulkareem

    2014-01-01

    Based on a quantum shift register, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. The message is encoded and decoded by using a code generated by the quantum shift register. The security of this algorithm is analysed in detail. It is shown that, in the quantum block cryptographic algorithm, two keys can be used. One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept of digital signature for the authentication of the two communicating parties and so eliminate the man-in-the-middle attack. The other key is generated by the quantum shift register and used for the coding of the encryption message, where Alice and Bob share the key by using the BB84 protocol. The novel algorithm can prevent a quantum attack strategy as well as a classical attack strategy. The problem of key management is discussed and circuits for the encryption and the decryption are suggested

  19. Cache Timing Analysis of LFSR-based Stream Ciphers

    DEFF Research Database (Denmark)

    Zenner, Erik; Leander, Gregor; Hawkes, Philip

    2009-01-01

    Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated against the Advanced Encryption Standard (AES), but have more recently also been applied against other cryptographic...

  20. ASC-1

    DEFF Research Database (Denmark)

    Jakimoski, Goce; Khajuria, Samant

    2011-01-01

    uses leak extraction from diÆerent AES rounds to compute the key material that is XOR-ed with the message to compute the ciphertext. Unlike LEX, the ASC-1 operates in a CFB fashion to compute an authentication tag over the encrypted message. We argue that ASC-1 is secure by reducingits (IND-CCA , INT......The goal of the modes of operation for authenticated encryption is to achieve faster encryption and message authentication by performing both the encryption and the message authentication in a single pass as opposed to the traditional encrypt-then-mac approach, which requires two passes....... Unfortunately, the use of a block cipher as a building block limits the performance of the authenticated encryption schemes to at most one message block per block cipher evaluation. In this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly to LEX, ASC-1...

  1. Morphology of a Wetland Stream

    Science.gov (United States)

    Jurmu; Andrle

    1997-11-01

    / Little attention has been paid to wetland stream morphology in the geomorphological and environmental literature, and in the recently expanding wetland reconstruction field, stream design has been based primarily on stream morphologies typical of nonwetland alluvial environments. Field investigation of a wetland reach of Roaring Brook, Stafford, Connecticut, USA, revealed several significant differences between the morphology of this stream and the typical morphology of nonwetland alluvial streams. Six morphological features of the study reach were examined: bankfull flow, meanders, pools and riffles, thalweg location, straight reaches, and cross-sectional shape. It was found that bankfull flow definitions originating from streams in nonwetland environments did not apply. Unusual features observed in the wetland reach include tight bends and a large axial wavelength to width ratio. A lengthy straight reach exists that exceeds what is typically found in nonwetland alluvial streams. The lack of convex bank point bars in the bends, a greater channel width at riffle locations, an unusual thalweg location, and small form ratios (a deep and narrow channel) were also differences identified. Further study is needed on wetland streams of various regions to determine if differences in morphology between alluvial and wetland environments can be applied in order to improve future designs of wetland channels.KEY WORDS: Stream morphology; Wetland restoration; Wetland creation; Bankfull; Pools and riffles; Meanders; Thalweg

  2. Design of an image encryption scheme based on a multiple chaotic map

    Science.gov (United States)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  3. WorkStream-- A Design Pattern for Multicore-Enabled Finite Element Computations

    KAUST Repository

    Turcksin, Bruno

    2016-08-31

    Many operations that need to be performed in modern finite element codes can be described as an operation that needs to be done independently on every cell, followed by a reduction of these local results into a global data structure. For example, matrix assembly, estimating discretization errors, or converting nodal values into data structures that can be output in visualization file formats all fall into this class of operations. Using this realization, we identify a software design pattern that we callWorkStream and that can be used to model such operations and enables the use of multicore shared memory parallel processing. We also describe in detail how this design pattern can be efficiently implemented, and we provide numerical scalability results from its use in the DEAL.II software library.

  4. A new simple technique for improving the random properties of chaos-based cryptosystems

    Science.gov (United States)

    Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.

    2018-03-01

    A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.

  5. Web Audio/Video Streaming Tool

    Science.gov (United States)

    Guruvadoo, Eranna K.

    2003-01-01

    In order to promote NASA-wide educational outreach program to educate and inform the public of space exploration, NASA, at Kennedy Space Center, is seeking efficient ways to add more contents to the web by streaming audio/video files. This project proposes a high level overview of a framework for the creation, management, and scheduling of audio/video assets over the web. To support short-term goals, the prototype of a web-based tool is designed and demonstrated to automate the process of streaming audio/video files. The tool provides web-enabled users interfaces to manage video assets, create publishable schedules of video assets for streaming, and schedule the streaming events. These operations are performed on user-defined and system-derived metadata of audio/video assets stored in a relational database while the assets reside on separate repository. The prototype tool is designed using ColdFusion 5.0.

  6. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  7. Design and methods of the Pacific Northwest Stream Quality Assessment (PNSQA), 2015

    Science.gov (United States)

    Sheibley, Rich W.; Morace, Jennifer L.; Journey, Celeste A.; Van Metre, Peter C.; Bell, Amanda H.; Nakagaki, Naomi; Button, Daniel T.; Qi, Sharon L.

    2017-08-25

    In 2015, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) project conducted the Pacific Northwest Stream Quality Assessment (PNSQA) to investigate stream quality across the western part of the Pacific Northwest. The goal of the PNSQA was to assess the health of streams in the region by characterizing multiple water-quality factors that are stressors to in-stream aquatic life and by evaluating the relation between these stressors and the condition of biological communities. The effects of urbanization and agriculture on stream quality for the Puget Lowland and Willamette Valley Level III Ecoregions were the focus of this regional study. Findings will help inform the public and policymakers about human and environmental factors that are the most critical in affecting stream quality and, thus, provide insights into possible strategies to protect or improve the health of streams in the region.Land-use data were used in the study to identify and select sites within the region that ranged in levels of urban and agricultural development. A total of 88 sites were selected across the region—69 were on streams that explicitly spanned a range of urban land use in their watersheds, 8 were on streams in agricultural watersheds, and 11 were reference sites with little or no development in their watersheds. Depending on the type of land use, sites were sampled for contaminants, nutrients, and sediment for either a 4- or 10-week period during April, May, and June 2015. This water-quality “index period” was immediately followed with an ecological survey of all sites that included stream habitat, benthic algae, benthic macroinvertebrates, and fish. Additionally, streambed sediment was collected during the ecological survey for analysis of sediment chemistry and toxicity testing.This report provides a detailed description of the specific study components and methods of the PNSQA, including (1) surveys of stream habitat and aquatic biota, (2) discrete

  8. Communication and control by listening: towards optimal design of a two-class auditory streaming brain-computer interface

    Directory of Open Access Journals (Sweden)

    N. Jeremy Hill

    2012-12-01

    Full Text Available Most brain-computer interface (BCI systems require users to modulate brain signals in response to visual stimuli. Thus, they may not be useful to people with limited vision, such as those with severe paralysis. One important approach for overcoming this issue is auditory streaming, an approach whereby a BCI system is driven by shifts of attention between two dichotically presented auditory stimulus streams. Motivated by the long-term goal of translating such a system into a reliable, simple yes-no interface for clinical usage, we aim to answer two main questions. First, we asked which of two previously-published variants provides superior performance: a fixed-phase (FP design in which the streams have equal period and opposite phase, or a drifting-phase (DP design where the periods are unequal. We found FP to be superior to DP (p = 0.002: average performance levels were 80% and 72% correct, respectively. We were also able to show, in a pilot with one subject, that auditory streaming can support continuous control and neurofeedback applications: by shifting attention between ongoing left and right auditory streams, the subject was able to control the position of a paddle in a computer game. Second, we examined whether the system is dependent on eye movements, since it is known that eye movements and auditory attention may influence each other, and any dependence on the ability to move one’s eyes would be a barrier to translation to paralyzed users. We discovered that, despite instructions, some subjects did make eye movements that were indicative of the direction of attention. However, there was no correlation, across subjects, between the reliability of the eye movement signal and the reliability of the BCI system, indicating that our system was configured to work independently of eye movement. Together, these findings are an encouraging step forward toward BCIs that provide practical communication and control options for the most severely

  9. Communication and control by listening: toward optimal design of a two-class auditory streaming brain-computer interface.

    Science.gov (United States)

    Hill, N Jeremy; Moinuddin, Aisha; Häuser, Ann-Katrin; Kienzle, Stephan; Schalk, Gerwin

    2012-01-01

    Most brain-computer interface (BCI) systems require users to modulate brain signals in response to visual stimuli. Thus, they may not be useful to people with limited vision, such as those with severe paralysis. One important approach for overcoming this issue is auditory streaming, an approach whereby a BCI system is driven by shifts of attention between two simultaneously presented auditory stimulus streams. Motivated by the long-term goal of translating such a system into a reliable, simple yes-no interface for clinical usage, we aim to answer two main questions. First, we asked which of two previously published variants provides superior performance: a fixed-phase (FP) design in which the streams have equal period and opposite phase, or a drifting-phase (DP) design where the periods are unequal. We found FP to be superior to DP (p = 0.002): average performance levels were 80 and 72% correct, respectively. We were also able to show, in a pilot with one subject, that auditory streaming can support continuous control and neurofeedback applications: by shifting attention between ongoing left and right auditory streams, the subject was able to control the position of a paddle in a computer game. Second, we examined whether the system is dependent on eye movements, since it is known that eye movements and auditory attention may influence each other, and any dependence on the ability to move one's eyes would be a barrier to translation to paralyzed users. We discovered that, despite instructions, some subjects did make eye movements that were indicative of the direction of attention. However, there was no correlation, across subjects, between the reliability of the eye movement signal and the reliability of the BCI system, indicating that our system was configured to work independently of eye movement. Together, these findings are an encouraging step forward toward BCIs that provide practical communication and control options for the most severely paralyzed users.

  10. Circular causality and indeterminism in machines for design

    Directory of Open Access Journals (Sweden)

    Thomas Fischer

    2014-12-01

    Full Text Available Presenting a hard-to-predict typography-varying system predicated on Nazi-era cryptography, the Enigma cipher machine, this paper illustrates conditions under which unrepeatable phenomena can arise, even from straight-forward mechanisms. Such conditions arise where systems are observed from outside of boundaries that arise through their observation, and where such systems refer to themselves in a circular fashion. It argues that the Enigma cipher machine is isomorphous with Heinz von Foersters portrayals of non-triviality in his non-trivial machine (NTM, but not with surprising human behaviour, and it demonstrates that the NTM does not account for spontaneity as it is observed in humans in general.

  11. The Effects of the Impedance of the Flow Source on the Design of Tidal Stream Generators

    Science.gov (United States)

    Salter, S.

    2011-12-01

    The maximum performance of a wind turbine is set by the well-known Betz limit. If the designer of a wind turbine uses too fast a rotation, too large a blade chord or too high an angle of blade pitch, the air flow can take an easier path over or around the rotor. Most estimates of the tidal stream resource use equations borrowed from wind and would be reasonably accurate for a single unit. But water cannot flow through the seabed or over rotors which reach to the surface. If contra-rotating, vertical-axis turbines with a rectangular flow-window are placed close to one another and reach from the surface close to the seabed, the leakage path is blocked and they become more like turbines in a closed duct. Instead of an equation with area times velocity-cubed we should use the first power of volume flow rate though the rotor times the pressure difference across it. A long channel with a rough bed will already be losing lots of energy and will behave more like a high impedance flow. Attempts to block it with closely-packed turbines will increase the head across the turbines with only a small effect on flow rate. The same thing will occur if a close-packed line of turbines is built out to sea from a headland. It is necessary to understand the impedance of the flow source all the way out to mid-ocean. In deep seas where the current velocities at the seabed are too slow to disturb the ooze the friction coefficients will be similar to those of gloss paint, perhaps 0.0025. But the higher velocities in shallow water will remove ooze and quite large sediments leaving rough, bare rock and leading to higher friction-coefficients. Energy dissipation will be set by the higher friction coefficients and the cube of the higher velocities. The presence of turbines will reduce seabed losses and about one third of the present loss can be converted to electricity. The velocity reduction would be about 10%. In many sites the energy output will be far higher than the wind turbine equations

  12. Knowledge discovery from data streams

    CERN Document Server

    Gama, Joao

    2010-01-01

    Since the beginning of the Internet age and the increased use of ubiquitous computing devices, the large volume and continuous flow of distributed data have imposed new constraints on the design of learning algorithms. Exploring how to extract knowledge structures from evolving and time-changing data, Knowledge Discovery from Data Streams presents a coherent overview of state-of-the-art research in learning from data streams.The book covers the fundamentals that are imperative to understanding data streams and describes important applications, such as TCP/IP traffic, GPS data, sensor networks,

  13. Human Factors in Streaming Data Analysis: Challenges and Opportunities for Information Visualization: Human Factors in Streaming Data Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Dasgupta, Aritra [Pacific Northwest National Laboratory, Richland Washington USA; Arendt, Dustin L. [Pacific Northwest National Laboratory, Richland Washington USA; Franklin, Lyndsey R. [Pacific Northwest National Laboratory, Richland Washington USA; Wong, Pak Chung [Pacific Northwest National Laboratory, Richland Washington USA; Cook, Kristin A. [Pacific Northwest National Laboratory, Richland Washington USA

    2017-09-01

    Real-world systems change continuously and across domains like traffic monitoring, cyber security, etc., such changes occur within short time scales. This leads to a streaming data problem and produces unique challenges for the human in the loop, as analysts have to ingest and make sense of dynamic patterns in real time. In this paper, our goal is to study how the state-of-the-art in streaming data visualization handles these challenges and reflect on the gaps and opportunities. To this end, we have three contributions: i) problem characterization for identifying domain-specific goals and challenges for handling streaming data, ii) a survey and analysis of the state-of-the-art in streaming data visualization research with a focus on the visualization design space, and iii) reflections on the perceptually motivated design challenges and potential research directions for addressing them.

  14. DEVELOPMENT OF A NEW ALGORITHM FOR KEY AND S-BOX GENERATION IN BLOWFISH ALGORITHM

    Directory of Open Access Journals (Sweden)

    TAYSEER S. ATIA

    2014-08-01

    Full Text Available Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

  15. Analysis of selected methods for the recovery of encrypted WEP key

    Science.gov (United States)

    Wójtowicz, Sebastian; Belka, Radosław

    2014-11-01

    This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.

  16. About the theory of congested transport streams

    OpenAIRE

    Valeriy GUK

    2009-01-01

    Talked about a theory, based on integrity of continuous motion of a transport stream. Placing of car and its speed is in a stream - second. Principle of application of the generalized methods of design and new descriptions of the states of transport streams opens up. Travelling and transport potentials are set, and also external capacity of the system a «transport stream» is an exergy, that allows to make differential equation and decide the applied tasks of organization of travelling motion....

  17. Design and implementation of streaming media server cluster based on FFMpeg.

    Science.gov (United States)

    Zhao, Hong; Zhou, Chun-long; Jin, Bao-zhao

    2015-01-01

    Poor performance and network congestion are commonly observed in the streaming media single server system. This paper proposes a scheme to construct a streaming media server cluster system based on FFMpeg. In this scheme, different users are distributed to different servers according to their locations and the balance among servers is maintained by the dynamic load-balancing algorithm based on active feedback. Furthermore, a service redirection algorithm is proposed to improve the transmission efficiency of streaming media data. The experiment results show that the server cluster system has significantly alleviated the network congestion and improved the performance in comparison with the single server system.

  18. Design and Implementation of Streaming Media Server Cluster Based on FFMpeg

    Science.gov (United States)

    Zhao, Hong; Zhou, Chun-long; Jin, Bao-zhao

    2015-01-01

    Poor performance and network congestion are commonly observed in the streaming media single server system. This paper proposes a scheme to construct a streaming media server cluster system based on FFMpeg. In this scheme, different users are distributed to different servers according to their locations and the balance among servers is maintained by the dynamic load-balancing algorithm based on active feedback. Furthermore, a service redirection algorithm is proposed to improve the transmission efficiency of streaming media data. The experiment results show that the server cluster system has significantly alleviated the network congestion and improved the performance in comparison with the single server system. PMID:25734187

  19. A survey on Big Data Stream Mining

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... huge amount of stream like telecommunication systems. So, there ... streams have many challenges for data mining algorithm design like using of ..... A. Bifet and R. Gavalda, "Learning from Time-Changing Data with. Adaptive ...

  20. Impact of stream restoration on flood waves

    Science.gov (United States)

    Sholtes, J.; Doyle, M.

    2008-12-01

    Restoration of channelized or incised streams has the potential to reduce downstream flooding via storing and dissipating the energy of flood waves. Restoration design elements such as restoring meanders, reducing slope, restoring floodplain connectivity, re-introducing in-channel woody debris, and re-vegetating banks and the floodplain have the capacity to attenuate flood waves via energy dissipation and channel and floodplain storage. Flood discharge hydrographs measured up and downstream of several restored reaches of varying stream order and located in both urban and rural catchments are coupled with direct measurements of stream roughness at various stages to directly measure changes to peak discharge, flood wave celerity, and dispersion. A one-dimensional unsteady flow routing model, HEC-RAS, is calibrated and used to compare attenuation characteristics between pre and post restoration conditions. Modeled sensitivity results indicate that a restoration project placed on a smaller order stream demonstrates the highest relative reduction in peak discharge of routed flood waves compared to one of equal length on a higher order stream. Reductions in bed slope, extensions in channel length, and increases in channel and floodplain roughness follow restoration placement with the watershed in relative importance. By better understanding how design, scale, and location of restored reaches within a catchment hydraulically impact flood flows, this study contributes both to restoration design and site decision making. It also quantifies the effect of reach scale stream restoration on flood wave attenuation.

  1. The Northeast Stream Quality Assessment

    Science.gov (United States)

    Van Metre, Peter C.; Riva-Murray, Karen; Coles, James F.

    2016-04-22

    In 2016, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) is assessing stream quality in the northeastern United States. The goal of the Northeast Stream Quality Assessment (NESQA) is to assess the quality of streams in the region by characterizing multiple water-quality factors that are stressors to aquatic life and evaluating the relation between these stressors and biological communities. The focus of NESQA in 2016 will be on the effects of urbanization and agriculture on stream quality in all or parts of eight states: Connecticut, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, and Vermont.Findings will provide the public and policymakers with information about the most critical factors affecting stream quality, thus providing insights about possible approaches to protect the health of streams in the region. The NESQA study will be the fourth regional study conducted as part of NAWQA and will be of similar design and scope to the first three, in the Midwest in 2013, the Southeast in 2014, and the Pacific Northwest in 2015 (http://txpub.usgs.gov/RSQA/).

  2. Checking for Circular Dependencies in Distributed Stream Programs

    Science.gov (United States)

    2011-08-29

    extensions to express new complexities more conve- nient. Teleport messaging ( TMG ) in the StreamIt language [30] is an example. 1.1 StreamIt Language...dynamicities to an FIR computation Thies et al. in [30] give a TMG model for distributed stream pro- grams. TMG is a mechanism that implements control...messages for stream graphs. The TMG mechanism is designed not to interfere with original dataflow graphs’ structures and scheduling, therefore a key

  3. Selecting the optimum plot size for a California design-based stream and wetland mapping program.

    Science.gov (United States)

    Lackey, Leila G; Stein, Eric D

    2014-04-01

    Accurate estimates of the extent and distribution of wetlands and streams are the foundation of wetland monitoring, management, restoration, and regulatory programs. Traditionally, these estimates have relied on comprehensive mapping. However, this approach is prohibitively resource-intensive over large areas, making it both impractical and statistically unreliable. Probabilistic (design-based) approaches to evaluating status and trends provide a more cost-effective alternative because, compared with comprehensive mapping, overall extent is inferred from mapping a statistically representative, randomly selected subset of the target area. In this type of design, the size of sample plots has a significant impact on program costs and on statistical precision and accuracy; however, no consensus exists on the appropriate plot size for remote monitoring of stream and wetland extent. This study utilized simulated sampling to assess the performance of four plot sizes (1, 4, 9, and 16 km(2)) for three geographic regions of California. Simulation results showed smaller plot sizes (1 and 4 km(2)) were most efficient for achieving desired levels of statistical accuracy and precision. However, larger plot sizes were more likely to contain rare and spatially limited wetland subtypes. Balancing these considerations led to selection of 4 km(2) for the California status and trends program.

  4. Streams with Strahler Stream Order

    Data.gov (United States)

    Minnesota Department of Natural Resources — Stream segments with Strahler stream order values assigned. As of 01/08/08 the linework is from the DNR24K stream coverages and will not match the updated...

  5. The effects of road crossings on prairie stream habitat and function

    Science.gov (United States)

    Bouska, Wesley W.; Keane, Timothy; Paukert, Craig P.

    2010-01-01

    Improperly designed stream crossing structures may alter the form and function of stream ecosystems and habitat and prohibit the movement of aquatic organisms. Stream sections adjoining five concrete box culverts, five low-water crossings (concrete slabs vented by one or multiple culverts), and two large, single corrugated culvert vehicle crossings in eastern Kansas streams were compared to reference reaches using a geomorphologic survey and stream classification. Stream reaches were also compared upstream and downstream of crossings, and crossing measurements were used to determine which crossing design best mimicked the natural dimensions of the adjoining stream. Four of five low-water crossings, three of five box culverts, and one of two large, single corrugated pipe culverts changed classification from upstream to downstream of the crossings. Mean riffle spacing upstream at low-water crossings (8.6 bankfull widths) was double that of downstream reaches (mean 4.4 bankfull widths) but was similar upstream and downstream of box and corrugated pipe culverts. There also appeared to be greater deposition of fine sediments directly upstream of these designs. Box and corrugated culverts were more similar to natural streams than low-water crossings at transporting water, sediments, and debris during bankfull flows.

  6. The role of remediation, natural alkalinity sources and physical stream parameters in stream recovery.

    Science.gov (United States)

    Kruse, Natalie A; DeRose, Lisa; Korenowsky, Rebekah; Bowman, Jennifer R; Lopez, Dina; Johnson, Kelly; Rankin, Edward

    2013-10-15

    Acid mine drainage (AMD) negatively impacts not only stream chemistry, but also aquatic biology. The ultimate goal of AMD treatment is restoration of the biological community, but that goal is rarely explicit in treatment system design. Hewett Fork in Raccoon Creek Watershed, Ohio, has been impacted by historic coal mining and has been treated with a calcium oxide doser in the headwaters of the watershed since 2004. All of the acidic inputs are isolated to a 1.5 km stretch of stream in the headwaters of the Hewett Fork watershed. The macroinvertebrate and fish communities have begun to recover and it is possible to distinguish three zones downstream of the doser: an impaired zone, a transition zone and a recovered zone. Alkalinity from both the doser and natural sources and physical stream parameters play a role in stream restoration. In Hewett Fork, natural alkaline additions downstream are higher than those from the doser. Both, alkaline additions and stream velocity drive sediment and metal deposition. Metal deposition occurs in several patterns; aluminum tends to deposit in regions of low stream velocity, while iron tends to deposit once sufficient alkalinity is added to the system downstream of mining inputs. The majority of metal deposition occurs upstream of the recovered zone. Both the physical stream parameters and natural alkalinity sources influence biological recovery in treated AMD streams and should be considered in remediation plans. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Frequency-Dependent Streaming Potential of Porous Media—Part 1: Experimental Approaches and Apparatus Design

    Directory of Open Access Journals (Sweden)

    P. W. J. Glover

    2012-01-01

    Full Text Available Electrokinetic phenomena link fluid flow and electrical flow in porous and fractured media such that a hydraulic flow will generate an electrical current and vice versa. Such a link is likely to be extremely useful, especially in the development of the electroseismic method. However, surprisingly few experimental measurements have been carried out, particularly as a function of frequency because of their difficulty. Here we have considered six different approaches to make laboratory determinations of the frequency-dependent streaming potential coefficient. In each case, we have analyzed the mechanical, electrical, and other technical difficulties involved in each method. We conclude that the electromagnetic drive is currently the only approach that is practicable, while the piezoelectric drive may be useful for low permeability samples and at specified high frequencies. We have used the electro-magnetic drive approach to design, build, and test an apparatus for measuring the streaming potential coefficient of unconsolidated and disaggregated samples such as sands, gravels, and soils with a diameter of 25.4 mm and lengths between 50 mm and 300 mm.

  8. Exploiting the Power of Relational Databases for Efficient Stream Processing

    NARCIS (Netherlands)

    E. Liarou (Erietta); R.A. Goncalves (Romulo); S. Idreos (Stratos)

    2009-01-01

    textabstractStream applications gained significant popularity over the last years that lead to the development of specialized stream engines. These systems are designed from scratch with a different philosophy than nowadays database engines in order to cope with the stream applications

  9. Characterization of HIFU transducers designed for sonochemistry application: Acoustic streaming.

    Science.gov (United States)

    Hallez, L; Touyeras, F; Hihn, J-Y; Bailly, Y

    2016-03-01

    Cavitation distribution in a High Intensity Focused Ultrasound sonoreactors (HIFU) has been extensively described in the recent literature, including quantification by an optical method (Sonochemiluminescence SCL). The present paper provides complementary measurements through the study of acoustic streaming generated by the same kind of HIFU transducers. To this end, results of mass transfer measurements (electrodiffusional method) were compared to optical method ones (Particle Image Velocimetry). This last one was used in various configurations: with or without an electrode in the acoustic field in order to have the same perturbation of the wave propagation. Results show that the maximum velocity is not located at the focal but shifted near the transducer, and that this shift is greater for high powers. The two cavitation modes (stationary and moving bubbles) are greatly affect the hydrodynamic behavior of our sonoreactors: acoustic streaming and the fluid generated by bubble motion. The results obtained by electrochemical measurements show the same low hydrodynamic activity in the transducer vicinity, the same shift of the active focal toward the transducer, and the same absence of activity in the post-focal axial zone. The comparison with theoretical Eckart's velocities (acoustic streaming in non-cavitating media) confirms a very high activity at the "sonochemical focal", accounted for by wave distortion, which induced greater absorption coefficients. Moreover, the equivalent liquid velocities are one order of magnitude larger than the ones measured by PIV, confirming the enhancement of mass transfer by bubbles oscillation and collapse close to the surface, rather than from a pure streaming effect. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Finite automata over magmas: models and some applications in Cryptography

    Directory of Open Access Journals (Sweden)

    Volodymyr V. Skobelev

    2018-05-01

    Full Text Available In the paper the families of finite semi-automata and reversible finite Mealy and Moore automata over finite magmas are defined and analyzed in detail. On the base of these models it is established that the set of finite quasigroups is the most acceptable subset of the set of finite magmas at resolving model problems in Cryptography, such as design of iterated hash functions and stream ciphers. Defined families of finite semi-automata and reversible finite automata over finite $T$-quasigroups are investigated in detail. It is established that in this case models time and space complexity for simulation of the functioning during one instant of automaton time can be much lower than in general case.

  11. CovertCast: Using Live Streaming to Evade Internet Censorship

    Directory of Open Access Journals (Sweden)

    McPherson Richard

    2016-07-01

    Full Text Available We design, implement, and evaluate CovertCast, a censorship circumvention system that broadcasts the content of popular websites in real-time, encrypted video streams on common live-streaming services such as YouTube. CovertCast does not require any modifications to the streaming service and employs the same protocols, servers, and streaming software as any other user of the service. Therefore, CovertCast cannot be distinguished from other live streams by IP address filtering or protocol fingerprinting, raising the bar for censors.

  12. Design of a static mixer reactor for copper recovery from waste streams

    NARCIS (Netherlands)

    Van Wageningen, W.F.C.

    2005-01-01

    The main goal of the project was the development of a plug flow reactor for the reduction of heavy metals (Cu2+) from industrial waste streams. Potential application of the reduction process inside The Netherlands lies in the IC and galvanic industry, where small waste streams containing aqueous

  13. VoIP Speech Encryption System Using Stream Cipher with Chaotic ...

    African Journals Online (AJOL)

    pc

    2018-03-22

    Mar 22, 2018 ... The technologies of Internet doesn't give any security mechanism and there is ... VoIP system, both digital (e.g., PC, PDA) and analog (e.g., telephone) devices ... the protection to speech through traditional encryption schemes ...

  14. Lorenz's attractor applied to the stream cipher (Ali-Pacha generator)

    International Nuclear Information System (INIS)

    Ali-Pacha, Adda; Hadj-Said, Naima; M'Hamed, A.; Belgoraf, A.

    2007-01-01

    The safety of information is primarily founded today on the calculation of algorithms whose confidentiality depends on the number of the necessary bits for the definition of a cryptographic key. If this type of system has proved reliable, then the increasing power of the means of calculation threatens the confidentiality of these methods. The powerful computers are certainly able to quantify and decipher information quickly, but their computing speed allows parallel cryptanalysis, which aims 'to break' a code by discovering the key, for example, by testing all the possible keys. The only evocation of the principle of the quantum computer, with the potentially colossal capacities of calculation, has started a shock, even in the most savaged who are convinced of algorithmic cryptography. To mitigate this concern, we will introduce in this article a new cryptographic system based on chaotic concepts

  15. ThermoData Engine: Extension to Solvent Design and Multi-component Process Stream Property Calculations with Uncertainty Analysis

    DEFF Research Database (Denmark)

    Diky, Vladimir; Chirico, Robert D.; Muzny, Chris

    ThermoData Engine (TDE, NIST Standard Reference Databases 103a and 103b) is the first product that implements the concept of Dynamic Data Evaluation in the fields of thermophysics and thermochemistry, which includes maintaining the comprehensive and up-to-date database of experimentally measured...... property values and expert system for data analysis and generation of recommended property values at the specified conditions along with uncertainties on demand. The most recent extension of TDE covers solvent design and multi-component process stream property calculations with uncertainty analysis...... variations). Predictions can be compared to the available experimental data, and uncertainties are estimated for all efficiency criteria. Calculations of the properties of multi-component streams including composition at phase equilibria (flash calculations) are at the heart of process simulation engines...

  16. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  17. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012

    OpenAIRE

    Roy, Arnab; Venkatesh, Srinivas Vivek

    2013-01-01

    Masking is a well-known technique used to prevent block cipher implementations from side-channel attacks. Higher-order side channel attacks (e.g. higher-order DPA attack) on widely used block cipher like AES have motivated the design of efficient higher-order masking schemes. Indeed, it is known that as the masking order increases, the difficulty of side-channel attack increases exponentially. However, the main problem in higher-order masking is to design an efficient and secure technique for...

  18. Investigation on prediction capability of nuclear design parameters for gap configuration in ITER through analysis of the FNS gap streaming experiment

    International Nuclear Information System (INIS)

    Maekawa, Fujio; Konno, Chikara; Kasugai, Yoshimi; Oyama, Yukio; Uno, Yoshitomo; Maekawa, Hiroshi; Ikeda, Yujiro

    2000-01-01

    As an R and D Task of shielding neutronics experiment under the Engineering Design Activities of the International Thermonuclear Experimental Reactor (ITER), streaming experiments with simulating a gap configuration formed by two neighboring blanket modules of ITER were carried out at the FNS (Fusion Neutron Source) facility. In this work, prediction capability of various nuclear design parameters was investigated through analysis of the experiments. The Monte Carlo transport calculation code MCNP-4A and the FENDL/E-1.0 and JENDL Fusion File cross section data libraries were used for the analysis with detailed modeling of the experimental conditions. As a result, all the measured quantities were reproduced within about ±30% by the calculations. It was concluded that these calculation tools were capable of predicting nuclear design parameters, such as helium production rates at connection legs of blanket modules to the back plate and nuclear responses in toroidal field coils, with uncertainty of ±30% for the geometry where gap-streaming effect was significant. (author)

  19. An algorithm for the construction of substitution box for block ciphers based on projective general linear group

    Directory of Open Access Journals (Sweden)

    Anas Altaleb

    2017-03-01

    Full Text Available The aim of this work is to synthesize 8*8 substitution boxes (S-boxes for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28 on Galois field GF(28. In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The strength of the extended S-box is computed, and an insight is given to calculate the confusion-creating potency. To analyze the security of the S-box some popular algebraic and statistical attacks are performed as well. The proposed S-box has been analyzed by bit independent criterion, linear approximation probability test, non-linearity test, strict avalanche criterion, differential approximation probability test, and majority logic criterion. A comparison of the proposed S-box with existing S-boxes shows that the analyses of the extended S-box are comparatively better.

  20. Ecoregions and stream morphology in eastern Oklahoma

    Science.gov (United States)

    Splinter, D.K.; Dauwalter, D.C.; Marston, R.A.; Fisher, W.L.

    2010-01-01

    Broad-scale variables (i.e., geology, topography, climate, land use, vegetation, and soils) influence channel morphology. How and to what extent the longitudinal pattern of channel morphology is influenced by broad-scale variables is important to fluvial geomorphologists and stream ecologists. In the last couple of decades, there has been an increase in the amount of interdisciplinary research between fluvial geomorphologists and stream ecologists. In a historical context, fluvial geomorphologists are more apt to use physiographic regions to distinguish broad-scale variables, while stream ecologists are more apt to use the concept of an ecosystem to address the broad-scale variables that influence stream habitat. For this reason, we designed a study using ecoregions, which uses physical and biological variables to understand how landscapes influence channel processes. Ecoregions are delineated by similarities in geology, climate, soils, land use, and potential natural vegetation. In the fluvial system, stream form and function are dictated by processes observed throughout the fluvial hierarchy. Recognizing that stream form and function should differ by ecoregion, a study was designed to evaluate how the characteristics of stream channels differed longitudinally among three ecoregions in eastern Oklahoma, USA: Boston Mountains, Ozark Highlands, and Ouachita Mountains. Channel morphology of 149 stream reaches was surveyed in 1st- through 4th-order streams, and effects of drainage area and ecoregion on channel morphology was evaluated using multiple regressions. Differences existed (?????0.05) among ecoregions for particle size, bankfull width, and width/depth ratio. No differences existed among ecoregions for gradient or sinuosity. Particle size was smallest in the Ozark Highlands and largest in the Ouachita Mountains. Bankfull width was larger in the Ozark Highlands than in the Boston Mountains and Ouachita Mountains in larger streams. Width/depth ratios of the

  1. Hyperchaotic encryption based on multi-scroll piecewise linear Systems

    Czech Academy of Sciences Publication Activity Database

    García-Martínez, M.; Ontanon-García, L.J.; Campos-Cantón, E.; Čelikovský, Sergej

    2015-01-01

    Roč. 270, č. 1 (2015), s. 413-424 ISSN 0096-3003 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Hyperchaotic encryption * Piecewise linear systems * Stream cipher * Pseudo-random bit generator * Chaos theory * Multi-scrollattractors Subject RIV: BC - Control Systems Theory Impact factor: 1.345, year: 2015 http://library.utia.cas.cz/separaty/2015/TR/celikovsky-0446895.pdf

  2. Secure remote service execution for web media streaming

    OpenAIRE

    Mikityuk, Alexandra

    2017-01-01

    Through continuous advancements in streaming and Web technologies over the past decade, the Web has become a platform for media delivery. Web standards like HTML5 have been designed accordingly, allowing for the delivery of applications, high-quality streaming video, and hooks for interoperable content protection. Efficient video encoding algorithms such as AVC/HEVC and streaming protocols such as MPEG-DASH have served as additional triggers for this evolution. Users now employ...

  3. Design Characteristics as Basis for Design Languages

    DEFF Research Database (Denmark)

    Mortensen, Niels Henrik

    1997-01-01

    The application of modern feature based CAD systems has in many companies lead to significant rationalisation of design, particulary the "down stream" acticities such as NC code generation, FEM analysis, mould flow simulation and documentation. The subject of this paper is the "up stream" activit......The application of modern feature based CAD systems has in many companies lead to significant rationalisation of design, particulary the "down stream" acticities such as NC code generation, FEM analysis, mould flow simulation and documentation. The subject of this paper is the "up stream...

  4. Factoring stream turbulence into global assessments of nitrogen pollution.

    Science.gov (United States)

    Grant, Stanley B; Azizian, Morvarid; Cook, Perran; Boano, Fulvio; Rippy, Megan A

    2018-03-16

    The discharge of excess nitrogen to streams and rivers poses an existential threat to both humans and ecosystems. A seminal study of headwater streams across the United States concluded that in-stream removal of nitrate is controlled primarily by stream chemistry and biology. Reanalysis of these data reveals that stream turbulence (in particular, turbulent mass transfer across the concentration boundary layer) imposes a previously unrecognized upper limit on the rate at which nitrate is removed from streams. The upper limit closely approximates measured nitrate removal rates in streams with low concentrations of this pollutant, a discovery that should inform stream restoration designs and efforts to assess the effects of nitrogen pollution on receiving water quality and the global nitrogen cycle. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  5. Urbanization and stream ecology: Diverse mechanisms of change

    Science.gov (United States)

    Roy, Allison; Capps, Krista A.; El-Sabaawi, Rana W.; Jones, Krista L.; Parr, Thomas B.; Ramirez, Alonso; Smith, Robert F.; Walsh, Christopher J.; Wenger, Seth J.

    2016-01-01

    The field of urban stream ecology has evolved rapidly in the last 3 decades, and it now includes natural scientists from numerous disciplines working with social scientists, landscape planners and designers, and land and water managers to address complex, socioecological problems that have manifested in urban landscapes. Over the last decade, stream ecologists have met 3 times at the Symposium on Urbanization and Stream Ecology (SUSE) to discuss current research, identify knowledge gaps, and promote future research collaborations. The papers in this special series on urbanization and stream ecology include both primary research studies and conceptual synthesis papers spurred from discussions at SUSE in May 2014. The themes of the meeting are reflected in the papers in this series emphasizing global differences in mechanisms and responses of stream ecosystems to urbanization and management solutions in diverse urban streams. Our hope is that this series will encourage continued interdisciplinary and collaborative research to increase the global understanding of urban stream ecology toward stream protection and restoration in urban landscapes.

  6. Noise Prediction Module for Offset Stream Nozzles

    Science.gov (United States)

    Henderson, Brenda S.

    2011-01-01

    A Modern Design of Experiments (MDOE) analysis of data acquired for an offset stream technology was presented. The data acquisition and concept development were funded under a Supersonics NRA NNX07AC62A awarded to Dimitri Papamoschou at University of California, Irvine. The technology involved the introduction of airfoils in the fan stream of a bypass ratio (BPR) two nozzle system operated at transonic exhaust speeds. The vanes deflected the fan stream relative to the core stream and resulted in reduced sideline noise for polar angles in the peak jet noise direction. Noise prediction models were developed for a range of vane configurations. The models interface with an existing ANOPP module and can be used or future system level studies.

  7. Variable responses of fish assemblages, habitat, and stability to natural-channel-design restoration in Catskill Mountain streams

    Science.gov (United States)

    Baldigo, Barry P.; Ernst, Anne G.; Warren, Dana R.; Miller, Sarah J.

    2010-01-01

    Natural-channel-design (NCD) restorations were recently implemented within large segments of five first- and second-order streams in the Catskill Mountains of New York in an attempt to increase channel stability, reduce bed and bank erosion, and sustain water quality. In conjunction with these efforts, 54 fish and habitat surveys were done from 1999 to 2007 at six restored reaches and five stable control reaches to evaluate the effects of NCD restoration on fish assemblages, habitat, and bank stability. A before–after–control–impact study design and two-factor analysis of variance were used to quantify the net changes in habitat and fish population and community indices at treatment reaches relative to those at unaltered control reaches. The density and biomass of fish communities were often dominated by one or two small prey species and no or few predator species before restoration and by one or more trout (Salmonidae) species after restoration. Significant increases in community richness (30%), diversity (40%), species or biomass equitability (32%), and total biomass (up to 52%) in at least four of the six restored reaches demonstrate that NCD restorations can improve the health and sustainability of fish communities in geomorphically unstable Catskill Mountain streams over the short to marginally long term. Bank stability, stream habitat, and trout habitat suitability indices (HSIs) generally improved significantly at the restored reaches, but key habitat features and trout HSIs did not change or decreased at two of them. Fish communities and trout populations at these two reaches were not positively affected by NCD restorations. Though NCD restorations often had a positive effect on habitat and fish communities, our results show that the initial habitat conditions limit the relative improvements than can be achieved, habitat quality and stability do not necessarily respond in unison, and biotic and abiotic responses cannot always be generalized.

  8. STREAMS - Supporting Underrepresented Groups in Earth Sciences

    Science.gov (United States)

    Carvalho-Knighton, K.; Johnson, A.

    2009-12-01

    In Fall 2008, STREAMS (Supporting Talented and Remarkable Environmental And Marine Science students) Scholarship initiative began at the University of South Florida St. Petersburg, the only public university in Pinellas County. STREAMS is a partnership between the University of South Florida St. Petersburg’s (USFSP) Environmental Science and Policy Program and University of South Florida’s (USF) College of Marine Science. The STREAMS Student Scholarship Program has facilitated increased recruitment, retention, and graduation of USFSP environmental science and USF marine science majors. The STREAMS program has increased opportunities for minorities and women to obtain undergraduate and graduate degrees, gain valuable research experience and engage in professional development activities. STREAMS scholars have benefited from being mentored by USFSP and USF faculty and as well as MSPhDs students and NSF Florida-Georgia LSAMP Bridge to Doctorate graduate fellows. In addition, STREAMS has facilitated activities designed to prepare student participants for successful Earth system science-related careers. We will elucidate the need for this initiative and vision for the collaboration.

  9. A fast image encryption system based on chaotic maps with finite precision representation

    International Nuclear Information System (INIS)

    Kwok, H.S.; Tang, Wallace K.S.

    2007-01-01

    In this paper, a fast chaos-based image encryption system with stream cipher structure is proposed. In order to achieve a fast throughput and facilitate hardware realization, 32-bit precision representation with fixed point arithmetic is assumed. The major core of the encryption system is a pseudo-random keystream generator based on a cascade of chaotic maps, serving the purpose of sequence generation and random mixing. Unlike the other existing chaos-based pseudo-random number generators, the proposed keystream generator not only achieves a very fast throughput, but also passes the statistical tests of up-to-date test suite even under quantization. The overall design of the image encryption system is to be explained while detail cryptanalysis is given and compared with some existing schemes

  10. A Streaming Language Implementation of the Discontinuous Galerkin Method

    Science.gov (United States)

    Barth, Timothy; Knight, Timothy

    2005-01-01

    We present a Brook streaming language implementation of the 3-D discontinuous Galerkin method for compressible fluid flow on tetrahedral meshes. Efficient implementation of the discontinuous Galerkin method using the streaming model of computation introduces several algorithmic design challenges. Using a cycle-accurate simulator, performance characteristics have been obtained for the Stanford Merrimac stream processor. The current Merrimac design achieves 128 Gflops per chip and the desktop board is populated with 16 chips yielding a peak performance of 2 Teraflops. Total parts cost for the desktop board is less than $20K. Current cycle-accurate simulations for discretizations of the 3-D compressible flow equations yield approximately 40-50% of the peak performance of the Merrimac streaming processor chip. Ongoing work includes the assessment of the performance of the same algorithm on the 2 Teraflop desktop board with a target goal of achieving 1 Teraflop performance.

  11. Extreme Changes in Stream Geomorphic Conditions induced by Fluvial Scour in Bridges

    Science.gov (United States)

    Özcan, O.; Ozcan, O.

    2016-12-01

    The numerous complexities associated with bridge scour have caused scour to be one of the most active topics of stream geomorphic research. The assessment of local scouring mechanism around bridge piers provides information for decision-making regarding the pile footing design, predicting the safety of bridges under critical scoured conditions, and as a result, may help prevent unnecessary loses. In the study, bridge design plans and HEC-RAS modeling were used for the assessment of changes in stream geomorphic conditions. The derived fluvial scour depths were compared with the field measurements and the empirical formula which is based on stream flow discharge rate, streambed condition and shape of river. Preliminary results revealed that bridge damage resulting from the flood event in 2003 induced substantial scour around bridge piles. Afterwards, significant stream bed change was observed under the influence of fluvial scour in another flood occurred in 2009. Consequently, geomorphic conditions of the stream bed should be considered in the structural design of the bridges.

  12. Principles of selection ofdrilling mud stream volume when drilling with a stream pump

    Directory of Open Access Journals (Sweden)

    Jan Macuda

    2006-10-01

    Full Text Available The reverse mud circulation induced by a stream pump is most frequently applied for large diameter drilling. This system is treated as auxiliary in all design solutions. It is implemented to drilling wells from the surface to the depth of deposition of the preliminary column. It enables performing wells in loose sands, gravel, clays clayey shales, marls, limestones, sandstones and other sedimentary rocks.A principle of selecting a drilling mud stream volume for various bit diameters and drilling rates in loose rocks are presented in the paper. A special attention has been paid to the drop of efficiency of cuttings removal with an increasing depth of the borehole.

  13. Neutron streaming analysis of an aqueous self-cooled blanket applied to MARS

    International Nuclear Information System (INIS)

    Varsamis, G.L.; Embrechts, M.J.; Steiner, D.

    1987-01-01

    A novel fusion reactor blanket concept, the Aqueous Self Cooled Blanket concept (ASCB), has recently been proposed. One of the first applications of this concept was to a MARS-like tandem mirror reactor. The design employs spiraling tubes of zircaloy-4 housed in a structural casing made of a vanadium alloy (V-15Cr-5Tl). One potential problem area for this design is the possibility for neutron streaming between the zircaloy tubes. This work examines this potential streaming path using the MCNP Monte Carlo code. The results of the total and the uncollided flux indicate a noticeable streaming effect on the uncollided flux only. An analysis of the energy deposition behind the blanket indicates that this effect is small, and therefore design modifications due to this streaming effect are not anticipated

  14. STREAM

    DEFF Research Database (Denmark)

    Godsk, Mikkel

    This paper presents a flexible model, ‘STREAM’, for transforming higher science education into blended and online learning. The model is inspired by ideas of active and collaborative learning and builds on feedback strategies well-known from Just-in-Time Teaching, Flipped Classroom, and Peer...... Instruction. The aim of the model is to provide both a concrete and comprehensible design toolkit for adopting and implementing educational technologies in higher science teaching practice and at the same time comply with diverse ambitions. As opposed to the above-mentioned feedback strategies, the STREAM...... model supports a relatively diverse use of educational technologies and may also be used to transform teaching into completely online learning. So far both teachers and educational developers have positively received the model and the initial design experiences show promise....

  15. Geochemical survey of stream sediments of the Piceance Creek Basin, Colorado

    Energy Technology Data Exchange (ETDEWEB)

    Ringrose, C.D.

    1977-01-01

    A stream sediment survey was conducted in the Piceance Creek Basin to study the spatial distribution of Zn, Mo, Hg, Cd and As for future baseline considerations. The pH and organic matter were also measured. From samples taken at the mouths (junctions) of most of the named creeks in the basin, it is concluded that none of the streams contained sediments with anomalous trace element concentrations with respect to the basin. But it is thought that Mo and possibly As could be potentially toxic because of their abundance and their mobility under the stream sediments' alkaline condition. From a different sampling plan, designed to describe the background variance of five streams (Roan, Black Sulfur, Parachute, Yellow and Piceance Creeks), it was found that most of the variance occurred at distances from 0-10 m within 2 km stream segments 10 km apart for Mo, Hg, Az, and organic matter. When the variance between the five streams was considered, it was found to dominate the variances of the other factors for Mo, Hg, and Zn. This variance between streams is actually thought to represent the variance between the major drainage system in the basin. When comparison is made between the two sampling design results, it is thought that the trace element concentrations of stream junction samples represented the best range of expected values for the entire basin. The expected ranges of the trace elements from the nested design are thought to be reasonable estimates of preliminary baselines for Parachute Creek, Roan Creek and Black Sulfur Creek within the restricted limits of the streams defined in the text. From the experience gained in pursuing this study, it is thought that composite sampling should be considered, where feasible, to reduce the analytical load and to reduce the small scale variance.

  16. The Stream-Catchment (StreamCat) and Lake-Catchment ...

    Science.gov (United States)

    Background/Question/MethodsLake and stream conditions respond to both natural and human-related landscape features. Characterizing these features within contributing areas (i.e., delineated watersheds) of streams and lakes could improve our understanding of how biological conditions vary spatially and improve the use, management, and restoration of these aquatic resources. However, the specialized geospatial techniques required to define and characterize stream and lake watersheds has limited their widespread use in both scientific and management efforts at large spatial scales. We developed the StreamCat and LakeCat Datasets to model, predict, and map the probable biological conditions of streams and lakes across the conterminous US (CONUS). Both StreamCat and LakeCat contain watershed-level characterizations of several hundred natural (e.g., soils, geology, climate, and land cover) and anthropogenic (e.g., urbanization, agriculture, mining, and forest management) landscape features for ca. 2.6 million stream segments and 376,000 lakes across the CONUS, respectively. These datasets can be paired with field samples to provide independent variables for modeling and other analyses. We paired 1,380 stream and 1,073 lake samples from the USEPAs National Aquatic Resource Surveys with StreamCat and LakeCat and used random forest (RF) to model and then map an invertebrate condition index and chlorophyll a concentration, respectively. Results/ConclusionsThe invertebrate

  17. Buffering Implications for the Design Space of Streaming MEMS Storage

    NARCIS (Netherlands)

    Khatib, M.G.; Abelmann, Leon; Preas, Kathy

    2011-01-01

    Emerging nanotechnology-based systems encounter new non-functional requirements. This work addresses MEMS storage, an emerging technology that promises ultrahigh density and energy-efficient storage devices. We study the buffering requirement of MEMS storage in streaming applications. We show that

  18. ALIENS IN WESTERN STREAM ECOSYSTEMS

    Science.gov (United States)

    The USEPA's Environmental Monitoring and Assessment Program conducted a five year probability sample of permanent mapped streams in 12 western US states. The study design enables us to determine the extent of selected riparian invasive plants, alien aquatic vertebrates, and some ...

  19. Interaction between stream temperature, streamflow, and groundwater exchanges in alpine streams

    Science.gov (United States)

    Constantz, James E.

    1998-01-01

    Four alpine streams were monitored to continuously collect stream temperature and streamflow for periods ranging from a week to a year. In a small stream in the Colorado Rockies, diurnal variations in both stream temperature and streamflow were significantly greater in losing reaches than in gaining reaches, with minimum streamflow losses occurring early in the day and maximum losses occurring early in the evening. Using measured stream temperature changes, diurnal streambed infiltration rates were predicted to increase as much as 35% during the day (based on a heat and water transport groundwater model), while the measured increase in streamflow loss was 40%. For two large streams in the Sierra Nevada Mountains, annual stream temperature variations ranged from 0° to 25°C. In summer months, diurnal stream temperature variations were 30–40% of annual stream temperature variations, owing to reduced streamflows and increased atmospheric heating. Previous reports document that one Sierra stream site generally gains groundwater during low flows, while the second Sierra stream site may lose water during low flows. For August the diurnal streamflow variation was 11% at the gaining stream site and 30% at the losing stream site. On the basis of measured diurnal stream temperature variations, streambed infiltration rates were predicted to vary diurnally as much as 20% at the losing stream site. Analysis of results suggests that evapotranspiration losses determined diurnal streamflow variations in the gaining reaches, while in the losing reaches, evapotranspiration losses were compounded by diurnal variations in streambed infiltration. Diurnal variations in stream temperature were reduced in the gaining reaches as a result of discharging groundwater of relatively constant temperature. For the Sierra sites, comparison of results with those from a small tributary demonstrated that stream temperature patterns were useful in delineating discharges of bank storage following

  20. Design, Assembly, and Characterization of TALE-Based Transcriptional Activators and Repressors.

    Science.gov (United States)

    Thakore, Pratiksha I; Gersbach, Charles A

    2016-01-01

    Transcription activator-like effectors (TALEs) are modular DNA-binding proteins that can be fused to a variety of effector domains to regulate the epigenome. Nucleotide recognition by TALE monomers follows a simple cipher, making this a powerful and versatile method to activate or repress gene expression. Described here are methods to design, assemble, and test TALE transcription factors (TALE-TFs) for control of endogenous gene expression. In this protocol, TALE arrays are constructed by Golden Gate cloning and tested for activity by transfection and quantitative RT-PCR. These methods for engineering TALE-TFs are useful for studies in reverse genetics and genomics, synthetic biology, and gene therapy.

  1. StreamStats, version 4

    Science.gov (United States)

    Ries, Kernell G.; Newson, Jeremy K.; Smith, Martyn J.; Guthrie, John D.; Steeves, Peter A.; Haluska, Tana L.; Kolb, Katharine R.; Thompson, Ryan F.; Santoro, Richard D.; Vraga, Hans W.

    2017-10-30

    IntroductionStreamStats version 4, available at https://streamstats.usgs.gov, is a map-based web application that provides an assortment of analytical tools that are useful for water-resources planning and management, and engineering purposes. Developed by the U.S. Geological Survey (USGS), the primary purpose of StreamStats is to provide estimates of streamflow statistics for user-selected ungaged sites on streams and for USGS streamgages, which are locations where streamflow data are collected.Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (which is exceeded, on average, once in 100 years and has a 1-percent chance of exceedance in any year) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; permitting of water withdrawals and wastewater and industrial discharges; hydropower facility design and regulation; and setting of minimum allowed streamflows to protect freshwater ecosystems. Streamflow statistics can be computed from available data at USGS streamgages depending on the type of data collected at the stations. Most often, however, streamflow statistics are needed at ungaged sites, where no streamflow data are available to determine the statistics.

  2. Study on shielding design method of radiation streaming in a tokamak-type DT fusion reactor based on Monte Carlo calculation

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2003-09-01

    In tokamak-type DT nuclear fusion reactor, there are various type slits and ducts in the blanket and the vacuum vessel. The helium production in the rewelding location of the blanket and the vacuum vessel, the nuclear properties in the super-conductive TF coil, e.g. the nuclear heating rate in the coil winding pack, are enhanced by the radiation streaming through the slits and ducts, and they are critical concern in the shielding design. The decay gamma ray dose rate around the duct penetrating the blanket and the vacuum vessel is also enhanced by the radiation streaming through the duct, and they are also critical concern from the view point of the human access to the cryostat during maintenance. In order to evaluate these nuclear properties with good accuracy, three dimensional Monte Carlo calculation is required but requires long calculation time. Therefore, the development of the effective simple design evaluation method for radiation streaming is substantially important. This study aims to establish the systematic evaluation method for the nuclear properties of the blanket, the vacuum vessel and the Toroidal Field (TF) coil taking into account the radiation streaming through various types of slits and ducts, based on three dimensional Monte Carlo calculation using the MNCP code, and for the decay gamma ray dose rates penetrated around the ducts. The present thesis describes three topics in five chapters as follows; 1) In Chapter 2, the results calculated by the Monte Carlo code, MCNP, are compared with those by the Sn code, DOT3.5, for the radiation streaming in the tokamak-type nuclear fusion reactor, for validating the results of the Sn calculation. From this comparison, the uncertainties of the Sn calculation results coming from the ray-effect and the effect due to approximation of the geometry are investigated whether the two dimensional Sn calculation can be applied instead of the Monte Carlo calculation. Through the study, it can be concluded that the

  3. Relation between Streaming Potential and Streaming Electrification Generated by Streaming of Water through a Sandwich-type Cell

    OpenAIRE

    Maruyama, Kazunori; Nikaido, Mitsuru; Hara, Yoshinori; Tanizaki, Yoshie

    2012-01-01

    Both streaming potential and accumulated charge of water flowed out were measured simultaneously using a sandwich-type cell. The voltages generated in divided sections along flow direction satisfied additivity. The sign of streaming potential agreed with that of streaming electrification. The relation between streaming potential and streaming electrification was explained from a viewpoint of electrical double layer in glass-water interface.

  4. Color encryption scheme based on adapted quantum logistic map

    Science.gov (United States)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  5. Hydraulic Properties related to Stream Reaeration

    Energy Technology Data Exchange (ETDEWEB)

    Tsivoglou, E. C.; Wallace, J. R. [School of Civil Engineering, Georgia Institute of Technology, Atlanta, GA (United States)

    1970-09-15

    The paper reports the results of recent and current field tracer experiments designed to investigate the relationships between the reaeration capacity of a flowing stream and the stream's hydraulic properties. The purpose of the studies is to develop models for the accurate prediction of stream reaeration capacity on the basis of observation of the associated hydraulic properties. The ability of a flowing stream to absorb oxygen from the overlying atmosphere is the principal process by which the stream is able to recover its dissolved oxygen resources once they have been depleted by bacterial degradation of organic wastes. Accurate knowledge of stream reaeration capacity is therefore a necessity in determining the required degree of waste treatment, and the associated costs, in any specific case. Oxygen absorption can only occur at the air-water interface, hence reaeration is a direct function of the rate of surface water replacement due to turbulent mixing. The latter is not directly observable, and so reaeration capacity has not been observable before the quite recent development of a gaseous radiotracer technique for field measurement of reaeration. This procedure involves the simultaneous use of three tracers, namely a fluorescent dye for time of flow, tritiated water for accurate dispersion measurement, and dissolved krypton-85 for measurement of gas transfer. Field results obtained by this technique are highly reproducible. Field tracer studies of the reaeration capacities of three medium-sized streams have been conducted over a total of about fifty river miles. Associated hydraulic properties such as stream flow, cross-sectional area, depth, velocity, hydraulic gradient and dispersion have also been measured. Features such as waterfalls, rapids and pools are included, and more than eighty observations of the reaeration capacities of individual stream reaches have been made. The paper reports the observed relationships between stream reaeration capacity and

  6. Hydraulic properties related to stream reaeration

    Energy Technology Data Exchange (ETDEWEB)

    Tsivoglou, E C; Wallace, J R [School of Civil Engineering, Georgia Institute of Technology, Atlanta, GA (United States)

    1970-09-15

    The paper reports the results of recent and current field tracer experiments designed to investigate the relationships between the reaeration capacity of a flowing stream and the stream's hydraulic properties. The purpose of the studies is to develop models for the accurate prediction of stream reaeration capacity on the basis of observation of the associated hydraulic properties. The ability of a flowing stream to absorb oxygen from the overlying atmosphere is the principal process by which the stream is able to recover its dissolved oxygen resources once they have been depleted by bacterial degradation of organic wastes. Accurate knowledge of stream reaeration capacity is therefore a necessity in determining the required degree of waste treatment, and the associated costs, in any specific case. Oxygen absorption can only occur at the air-water interface, hence reaeration is a direct function of the rate of surface water replacement due to turbulent mixing. The latter is not directly observable, and so reaeration capacity has not been observable before the quite recent development of a gaseous radiotracer technique for field measurement of reaeration. This procedure involves the simultaneous use of three tracers, namely a fluorescent dye for time of flow, tritiated water for accurate dispersion measurement, and dissolved krypton-85 for measurement of gas transfer. Field results obtained by this technique are highly reproducible. Field tracer studies of the reaeration capacities of three medium-sized streams have been conducted over a total of about fifty river miles. Associated hydraulic properties such as stream flow, cross-sectional area, depth, velocity, hydraulic gradient and dispersion have also been measured. Features such as waterfalls, rapids and pools are included, and more than eighty observations of the reaeration capacities of individual stream reaches have been made. The paper reports the observed relationships between stream reaeration capacity and

  7. The role of temporal coherence in auditory stream segregation

    DEFF Research Database (Denmark)

    Christiansen, Simon Krogholt

    The ability to perceptually segregate concurrent sound sources and focus one’s attention on a single source at a time is essential for the ability to use acoustic information. While perceptual experiments have determined a range of acoustic cues that help facilitate auditory stream segregation......, it is not clear how the auditory system realizes the task. This thesis presents a study of the mechanisms involved in auditory stream segregation. Through a combination of psychoacoustic experiments, designed to characterize the influence of acoustic cues on auditory stream formation, and computational models...... of auditory processing, the role of auditory preprocessing and temporal coherence in auditory stream formation was evaluated. The computational model presented in this study assumes that auditory stream segregation occurs when sounds stimulate non-overlapping neural populations in a temporally incoherent...

  8. Analyzing indicators of stream health for Minnesota streams

    Science.gov (United States)

    Singh, U.; Kocian, M.; Wilson, B.; Bolton, A.; Nieber, J.; Vondracek, B.; Perry, J.; Magner, J.

    2005-01-01

    Recent research has emphasized the importance of using physical, chemical, and biological indicators of stream health for diagnosing impaired watersheds and their receiving water bodies. A multidisciplinary team at the University of Minnesota is carrying out research to develop a stream classification system for Total Maximum Daily Load (TMDL) assessment. Funding for this research is provided by the United States Environmental Protection Agency and the Minnesota Pollution Control Agency. One objective of the research study involves investigating the relationships between indicators of stream health and localized stream characteristics. Measured data from Minnesota streams collected by various government and non-government agencies and research institutions have been obtained for the research study. Innovative Geographic Information Systems tools developed by the Environmental Science Research Institute and the University of Texas are being utilized to combine and organize the data. Simple linear relationships between index of biological integrity (IBI) and channel slope, two-year stream flow, and drainage area are presented for the Redwood River and the Snake River Basins. Results suggest that more rigorous techniques are needed to successfully capture trends in IBI scores. Additional analyses will be done using multiple regression, principal component analysis, and clustering techniques. Uncovering key independent variables and understanding how they fit together to influence stream health are critical in the development of a stream classification for TMDL assessment.

  9. Toward 3D-IPTV: design and implementation of a stereoscopic and multiple-perspective video streaming system

    Science.gov (United States)

    Petrovic, Goran; Farin, Dirk; de With, Peter H. N.

    2008-02-01

    3D-Video systems allow a user to perceive depth in the viewed scene and to display the scene from arbitrary viewpoints interactively and on-demand. This paper presents a prototype implementation of a 3D-video streaming system using an IP network. The architecture of our streaming system is layered, where each information layer conveys a single coded video signal or coded scene-description data. We demonstrate the benefits of a layered architecture with two examples: (a) stereoscopic video streaming, (b) monoscopic video streaming with remote multiple-perspective rendering. Our implementation experiments confirm that prototyping 3D-video streaming systems is possible with today's software and hardware. Furthermore, our current operational prototype demonstrates that highly heterogeneous clients can coexist in the system, ranging from auto-stereoscopic 3D displays to resource-constrained mobile devices.

  10. Alteration of stream temperature by natural and artificial beaver dams.

    Science.gov (United States)

    Weber, Nicholas; Bouwes, Nicolaas; Pollock, Michael M; Volk, Carol; Wheaton, Joseph M; Wathen, Gus; Wirtz, Jacob; Jordan, Chris E

    2017-01-01

    Beaver are an integral component of hydrologic, geomorphic, and biotic processes within North American stream systems, and their propensity to build dams alters stream and riparian structure and function to the benefit of many aquatic and terrestrial species. Recognizing this, beaver relocation efforts and/or application of structures designed to mimic the function of beaver dams are increasingly being utilized as effective and cost-efficient stream and riparian restoration approaches. Despite these verities, the notion that beaver dams negatively impact stream habitat remains common, specifically the assumption that beaver dams increase stream temperatures during summer to the detriment of sensitive biota such as salmonids. In this study, we tracked beaver dam distributions and monitored water temperature throughout 34 km of stream for an eight-year period between 2007 and 2014. During this time the number of natural beaver dams within the study area increased by an order of magnitude, and an additional 4 km of stream were subject to a restoration manipulation that included installing a high-density of Beaver Dam Analog (BDA) structures designed to mimic the function of natural beaver dams. Our observations reveal several mechanisms by which beaver dam development may influence stream temperature regimes; including longitudinal buffering of diel summer temperature extrema at the reach scale due to increased surface water storage, and creation of cool-water channel scale temperature refugia through enhanced groundwater-surface water connectivity. Our results suggest that creation of natural and/or artificial beaver dams could be used to mitigate the impact of human induced thermal degradation that may threaten sensitive species.

  11. Stream-lined Gating Systems with Improved Yield - Dimensioning and Experimental Validation

    DEFF Research Database (Denmark)

    Tiedje, Niels Skat; Skov-Hansen, Søren Peter

    the two types of lay-outs are cast in production. It is shown that flow in the stream-lined lay-out is well controlled and that the quality of the castings is as at least equal to that of castings produced with a traditional lay-out. Further, the yield is improved by 4 % relative to a traditional lay-out.......The paper describes how a stream-lined gating system where the melt is confined and controlled during filling can be designed. Commercial numerical modelling software has been used to compare the stream-lined design with a traditional gating system. These results are confirmed by experiments where...

  12. Flow Field and Acoustic Predictions for Three-Stream Jets

    Science.gov (United States)

    Simmons, Shaun Patrick; Henderson, Brenda S.; Khavaran, Abbas

    2014-01-01

    Computational fluid dynamics was used to analyze a three-stream nozzle parametric design space. The study varied bypass-to-core area ratio, tertiary-to-core area ratio and jet operating conditions. The flowfield solutions from the Reynolds-Averaged Navier-Stokes (RANS) code Overflow 2.2e were used to pre-screen experimental models for a future test in the Aero-Acoustic Propulsion Laboratory (AAPL) at the NASA Glenn Research Center (GRC). Flowfield solutions were considered in conjunction with the jet-noise-prediction code JeNo to screen the design concepts. A two-stream versus three-stream computation based on equal mass flow rates showed a reduction in peak turbulent kinetic energy (TKE) for the three-stream jet relative to that for the two-stream jet which resulted in reduced acoustic emission. Additional three-stream solutions were analyzed for salient flowfield features expected to impact farfield noise. As tertiary power settings were increased there was a corresponding near nozzle increase in shear rate that resulted in an increase in high frequency noise and a reduction in peak TKE. As tertiary-to-core area ratio was increased the tertiary potential core elongated and the peak TKE was reduced. The most noticeable change occurred as secondary-to-core area ratio was increased thickening the secondary potential core, elongating the primary potential core and reducing peak TKE. As forward flight Mach number was increased the jet plume region decreased and reduced peak TKE.

  13. Stream pH as an abiotic gradient influencing distributions of trout in Pennsylvania streams

    Science.gov (United States)

    Kocovsky, P.M.; Carline, R.F.

    2005-01-01

    Elevation and stream slope are abiotic gradients that limit upstream distributions of brook trout Salvelinus fontinalis and brown trout Salmo trutta in streams. We sought to determine whether another abiotic gradient, base-flow pH, may also affect distributions of these two species in eastern North America streams. We used historical data from the Pennsylvania Fish and Boat Commission's fisheries management database to explore the effects of reach elevation, slope, and base-flow pH on distributional limits to brook trout and brown trout in Pennsylvania streams in the Appalachian Plateaus and Ridge and Valley physiographic provinces. Discriminant function analysis (DFA) was used to calculate a canonical axis that separated allopatric brook trout populations from allopatric brown trout populations and allowed us to assess which of the three independent variables were important gradients along which communities graded from allopatric brook trout to allopatric brown trout. Canonical structure coefficients from DFA indicated that in both physiographic provinces, stream base-flow pH and slope were important factors in distributional limits; elevation was also an important factor in the Ridge and Valley Province but not the Appalachian Plateaus Province. Graphs of each variable against the proportion of brook trout in a community also identified apparent zones of allopatry for both species on the basis of pH and stream slope. We hypothesize that pH-mediated interspecific competition that favors brook trout in competition with brown trout at lower pH is the most plausible mechanism for segregation of these two species along pH gradients. Our discovery that trout distributions in Pennsylvania are related to stream base-flow pH has important implications for brook trout conservation in acidified regions. Carefully designed laboratory and field studies will be required to test our hypothesis and elucidate the mechanisms responsible for the partitioning of brook trout and

  14. STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Fox, Geoffrey [Indiana Univ., Bloomington, IN (United States); Jha, Shantenu [Rutgers Univ., New Brunswick, NJ (United States); Ramakrishnan, Lavanya [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-10-01

    The Department of Energy (DOE) Office of Science (SC) facilities including accelerators, light sources and neutron sources and sensors that study, the environment, and the atmosphere, are producing streaming data that needs to be analyzed for next-generation scientific discoveries. There has been an explosion of new research and technologies for stream analytics arising from the academic and private sectors. However, there has been no corresponding effort in either documenting the critical research opportunities or building a community that can create and foster productive collaborations. The two-part workshop series, STREAM: Streaming Requirements, Experience, Applications and Middleware Workshop (STREAM2015 and STREAM2016), were conducted to bring the community together and identify gaps and future efforts needed by both NSF and DOE. This report describes the discussions, outcomes and conclusions from STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop, the second of these workshops held on March 22-23, 2016 in Tysons, VA. STREAM2016 focused on the Department of Energy (DOE) applications, computational and experimental facilities, as well software systems. Thus, the role of “streaming and steering” as a critical mode of connecting the experimental and computing facilities was pervasive through the workshop. Given the overlap in interests and challenges with industry, the workshop had significant presence from several innovative companies and major contributors. The requirements that drive the proposed research directions, identified in this report, show an important opportunity for building competitive research and development program around streaming data. These findings and recommendations are consistent with vision outlined in NRC Frontiers of Data and National Strategic Computing Initiative (NCSI) [1, 2]. The discussions from the workshop are captured as topic areas covered in this report's sections. The report

  15. Interactive real-time media streaming with reliable communication

    Science.gov (United States)

    Pan, Xunyu; Free, Kevin M.

    2014-02-01

    Streaming media is a recent technique for delivering multimedia information from a source provider to an end- user over the Internet. The major advantage of this technique is that the media player can start playing a multimedia file even before the entire file is transmitted. Most streaming media applications are currently implemented based on the client-server architecture, where a server system hosts the media file and a client system connects to this server system to download the file. Although the client-server architecture is successful in many situations, it may not be ideal to rely on such a system to provide the streaming service as users may be required to register an account using personal information in order to use the service. This is troublesome if a user wishes to watch a movie simultaneously while interacting with a friend in another part of the world over the Internet. In this paper, we describe a new real-time media streaming application implemented on a peer-to-peer (P2P) architecture in order to overcome these challenges within a mobile environment. When using the peer-to-peer architecture, streaming media is shared directly between end-users, called peers, with minimal or no reliance on a dedicated server. Based on the proposed software pɛvμa (pronounced [revma]), named for the Greek word meaning stream, we can host a media file on any computer and directly stream it to a connected partner. To accomplish this, pɛvμa utilizes the Microsoft .NET Framework and Windows Presentation Framework, which are widely available on various types of windows-compatible personal computers and mobile devices. With specially designed multi-threaded algorithms, the application can stream HD video at speeds upwards of 20 Mbps using the User Datagram Protocol (UDP). Streaming and playback are handled using synchronized threads that communicate with one another once a connection is established. Alteration of playback, such as pausing playback or tracking to a

  16. Toward privacy-preserving JPEG image retrieval

    Science.gov (United States)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  17. Stream channel responses and soil loss at off-highway vehicle stream crossings in the Ouachita National Forest

    Science.gov (United States)

    Daniel A. Marion; Jonathan D. Phillips; Chad Yocum; Stephanie H. Mehlhope

    2014-01-01

    This study investigates the geomorphic effects of ford-type stream crossings in an off-highway vehicle (OHV) trail complex in the Ouachita National Forest, Arkansas. At a total of 15 crossing sites, we used a disturbed vs. undisturbed study design to assess soil truncation and an upstream vs. downstream design to assess in-channel effects. The 15 sites ranged from OHV...

  18. Radiation shielding techniques and applications. 3. Analysis of Photon Streaming Through and Around Shield Doors

    International Nuclear Information System (INIS)

    Barnett, Marvin; Hack, Joe; Nathan, Steve; White, Travis

    2001-01-01

    Westinghouse Safety Management Solutions (Westinghouse SMS) has been tasked with providing radiological engineering design support for the new Commercial Light Water Reactor Tritium Extraction Facility (CLWR-TEF) being constructed at the Savannah River Site (SRS). The Remote Handling Building (RHB) of the CLWR-TEF will act as the receiving facility for irradiated targets used in the production of tritium for the U.S. Department of Energy (DOE). Because of the high dose rates, approaching 50 000 rads/h (500 Gy/h) from the irradiated target bundles, significant attention has been made to shielding structures within the facility. One aspect of the design that has undergone intense review is the shield doors. The RHB has six shield doors that needed to be studied with respect to photon streaming. Several aspects had to be examined to ensure that the design meets the radiation dose levels. Both the thickness and streaming issues around the door edges were designed and examined. Photon streaming through and around a shield door is a complicated problem, creating a reliance on computer modeling to perform the analyses. The computer code typically used by the Westinghouse SMS in the evaluation of photon transport through complex geometries is the MCNP Monte Carlo computer code. The complexity of the geometry within the problem can cause problems even with the Monte Carlo codes. Striking a balance between how the code handles transport through the shield door with transport through the streaming paths, particularly with the use of typical variance reduction methods, is difficult when trying to ensure that all important regions of the model are sampled appropriately. The thickness determination used a simple variance reduction technique. In construction, the shield door will not be flush against the wall, so a solid rectangular slab leaves streaming paths around the edges. Administrative controls could be used to control dose to workers; however, 10 CFR 835.1001 states

  19. Cost-efficient enactment of stream processing topologies

    Directory of Open Access Journals (Sweden)

    Christoph Hochreiner

    2017-12-01

    Full Text Available The continuous increase of unbound streaming data poses several challenges to established data stream processing engines. One of the most important challenges is the cost-efficient enactment of stream processing topologies under changing data volume. These data volume pose different loads to stream processing systems whose resource provisioning needs to be continuously updated at runtime. First approaches already allow for resource provisioning on the level of virtual machines (VMs, but this only allows for coarse resource provisioning strategies. Based on current advances and benefits for containerized software systems, we have designed a cost-efficient resource provisioning approach and integrated it into the runtime of the Vienna ecosystem for elastic stream processing. Our resource provisioning approach aims to maximize the resource usage for VMs obtained from cloud providers. This strategy only releases processing capabilities at the end of the VMs minimal leasing duration instead of releasing them eagerly as soon as possible as it is the case for threshold-based approaches. This strategy allows us to improve the service level agreement compliance by up to 25% and a reduction for the operational cost of up to 36%.

  20. Fast encryption of image data using chaotic Kolmogorov flows

    Science.gov (United States)

    Scharinger, Josef

    1998-04-01

    To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary which are easily implementable in soft- and hardware and are able to cope with the vast amounts of data involved. Experience has shown that block-oriented symmetric product ciphers constitute an adequate design paradigm for resolving this task, since they can offer a very high level of security as well as very high encryption rates. In this contribution we introduce a new product cipher which encrypts large blocks of plain text by repeated intertwined application of substitution and permutation operations. While almost all of the current product ciphers use fixed permutation operations on small data blocks, our approach involves parametrizable permutations on large data blocks induced by specific chaotic systems. By combining these highly unstable dynamics with an adaption of a very fast shift register based pseudo-random number generator, we obtain a new class of computationally secure product ciphers which offer many features that make them superior to contemporary bulk encryption systems when aiming at efficient image and video data encryption.

  1. StreamStats in Oklahoma - Drainage-Basin Characteristics and Peak-Flow Frequency Statistics for Ungaged Streams

    Science.gov (United States)

    Smith, S. Jerrod; Esralew, Rachel A.

    2010-01-01

    The USGS Streamflow Statistics (StreamStats) Program was created to make geographic information systems-based estimation of streamflow statistics easier, faster, and more consistent than previously used manual techniques. The StreamStats user interface is a map-based internet application that allows users to easily obtain streamflow statistics, basin characteristics, and other information for user-selected U.S. Geological Survey data-collection stations and ungaged sites of interest. The application relies on the data collected at U.S. Geological Survey streamflow-gaging stations, computer aided computations of drainage-basin characteristics, and published regression equations for several geographic regions comprising the United States. The StreamStats application interface allows the user to (1) obtain information on features in selected map layers, (2) delineate drainage basins for ungaged sites, (3) download drainage-basin polygons to a shapefile, (4) compute selected basin characteristics for delineated drainage basins, (5) estimate selected streamflow statistics for ungaged points on a stream, (6) print map views, (7) retrieve information for U.S. Geological Survey streamflow-gaging stations, and (8) get help on using StreamStats. StreamStats was designed for national application, with each state, territory, or group of states responsible for creating unique geospatial datasets and regression equations to compute selected streamflow statistics. With the cooperation of the Oklahoma Department of Transportation, StreamStats has been implemented for Oklahoma and is available at http://water.usgs.gov/osw/streamstats/. The Oklahoma StreamStats application covers 69 processed hydrologic units and most of the state of Oklahoma. Basin characteristics available for computation include contributing drainage area, contributing drainage area that is unregulated by Natural Resources Conservation Service floodwater retarding structures, mean-annual precipitation at the

  2. Shifting stream planform state decreases stream productivity yet increases riparian animal production

    Science.gov (United States)

    Venarsky, Michael P.; Walters, David M.; Hall, Robert O.; Livers, Bridget; Wohl, Ellen

    2018-01-01

    In the Colorado Front Range (USA), disturbance history dictates stream planform. Undisturbed, old-growth streams have multiple channels and large amounts of wood and depositional habitat. Disturbed streams (wildfires and logging tested how these opposing stream states influenced organic matter, benthic macroinvertebrate secondary production, emerging aquatic insect flux, and riparian spider biomass. Organic matter and macroinvertebrate production did not differ among sites per unit area (m−2), but values were 2 ×–21 × higher in undisturbed reaches per unit of stream valley (m−1 valley) because total stream area was higher in undisturbed reaches. Insect emergence was similar among streams at the per unit area and per unit of stream valley. However, rescaling insect emergence to per meter of stream bank showed that the emerging insect biomass reaching the stream bank was lower in undisturbed sites because multi-channel reaches had 3 × more stream bank than single-channel reaches. Riparian spider biomass followed the same pattern as emerging aquatic insects, and we attribute this to bottom-up limitation caused by the multi-channeled undisturbed sites diluting prey quantity (emerging insects) reaching the stream bank (riparian spider habitat). These results show that historic landscape disturbances continue to influence stream and riparian communities in the Colorado Front Range. However, these legacy effects are only weakly influencing habitat-specific function and instead are primarily influencing stream–riparian community productivity by dictating both stream planform (total stream area, total stream bank length) and the proportional distribution of specific habitat types (pools vs riffles).

  3. Shifting stream planform state decreases stream productivity yet increases riparian animal production

    Science.gov (United States)

    Venarsky, Michael P.; Walters, David M.; Hall, Robert O.; Livers, Bridget; Wohl, Ellen

    2018-01-01

    In the Colorado Front Range (USA), disturbance history dictates stream planform. Undisturbed, old-growth streams have multiple channels and large amounts of wood and depositional habitat. Disturbed streams (wildfires and logging production, emerging aquatic insect flux, and riparian spider biomass. Organic matter and macroinvertebrate production did not differ among sites per unit area (m−2), but values were 2 ×–21 × higher in undisturbed reaches per unit of stream valley (m−1 valley) because total stream area was higher in undisturbed reaches. Insect emergence was similar among streams at the per unit area and per unit of stream valley. However, rescaling insect emergence to per meter of stream bank showed that the emerging insect biomass reaching the stream bank was lower in undisturbed sites because multi-channel reaches had 3 × more stream bank than single-channel reaches. Riparian spider biomass followed the same pattern as emerging aquatic insects, and we attribute this to bottom-up limitation caused by the multi-channeled undisturbed sites diluting prey quantity (emerging insects) reaching the stream bank (riparian spider habitat). These results show that historic landscape disturbances continue to influence stream and riparian communities in the Colorado Front Range. However, these legacy effects are only weakly influencing habitat-specific function and instead are primarily influencing stream–riparian community productivity by dictating both stream planform (total stream area, total stream bank length) and the proportional distribution of specific habitat types (pools vs riffles).

  4. ADAPTIVE STREAMING OVER HTTP (DASH UNTUK APLIKASI VIDEO STREAMING

    Directory of Open Access Journals (Sweden)

    I Made Oka Widyantara

    2015-12-01

    Full Text Available This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP. DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These packages are assembled into packets in a streaming media format Presentation Description (MPD or known as MPEG-DASH. Streaming video format MPEG-DASH run on a platform with the player bitdash teritegrasi bitcoin. With this scheme, the video will have several variants of the bit rates that gave rise to the concept of scalability of streaming video services on the client side. The main target of the mechanism is smooth the MPEG-DASH streaming video display on the client. The simulation results show that the scheme based scalable video streaming MPEG-DASH able to improve the quality of image display on the client side, where the procedure bufering videos can be made constant and fine for the duration of video views

  5. Optimized open-flow mixing: insights from microbubble streaming

    Science.gov (United States)

    Rallabandi, Bhargav; Wang, Cheng; Guo, Lin; Hilgenfeldt, Sascha

    2015-11-01

    Microbubble streaming has been developed into a robust and powerful flow actuation technique in microfluidics. Here, we study it as a paradigmatic system for microfluidic mixing under a continuous throughput of fluid (open-flow mixing), providing a systematic optimization of the device parameters in this practically important situation. Focusing on two-dimensional advective stirring (neglecting diffusion), we show through numerical simulation and analytical theory that mixing in steady streaming vortices becomes ineffective beyond a characteristic time scale, necessitating the introduction of unsteadiness. By duty cycling the streaming, such unsteadiness is introduced in a controlled fashion, leading to exponential refinement of the advection structures. The rate of refinement is then optimized for particular parameters of the time modulation, i.e. a particular combination of times for which the streaming is turned ``on'' and ``off''. The optimized protocol can be understood theoretically using the properties of the streaming vortices and the throughput Poiseuille flow. We can thus infer simple design principles for practical open flow micromixing applications, consistent with experiments. Current Address: Mechanical and Aerospace Engineering, Princeton University.

  6. Asynchronous stream processing with S-Net

    NARCIS (Netherlands)

    Grelck, C.; Scholz, S.-B.; Shafarenko, A.

    2010-01-01

    We present the rationale and design of S-Net, a coordination language for asynchronous stream processing. The language achieves a near-complete separation between the application code, written in any conventional programming language, and the coordination/communication code written in S-Net. Our

  7. Applications of on-stream analysis systems

    International Nuclear Information System (INIS)

    Howarth, W.J.

    1982-01-01

    Benefits of on-stream analysis include increased metal recovery, reduced consumption of reagents, increases in concentrate grade and savings in labour. A poorly designed analysis zone can give rise to incorrect assays as a result of segregation or excessive or variable aeration

  8. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  9. Akamai Streaming

    OpenAIRE

    ECT Team, Purdue

    2007-01-01

    Akamai offers world-class streaming media services that enable Internet content providers and enterprises to succeed in today's Web-centric marketplace. They deliver live event Webcasts (complete with video production, encoding, and signal acquisition services), streaming media on demand, 24/7 Webcasts and a variety of streaming application services based upon their EdgeAdvantage.

  10. STREAMFINDER I: A New Algorithm for detecting Stellar Streams

    Science.gov (United States)

    Malhan, Khyati; Ibata, Rodrigo A.

    2018-04-01

    We have designed a powerful new algorithm to detect stellar streams in an automated and systematic way. The algorithm, which we call the STREAMFINDER, is well suited for finding dynamically cold and thin stream structures that may lie along any simple or complex orbits in Galactic stellar surveys containing any combination of positional and kinematic information. In the present contribution we introduce the algorithm, lay out the ideas behind it, explain the methodology adopted to detect streams and detail its workings by running it on a suite of simulations of mock Galactic survey data of similar quality to that expected from the ESA/Gaia mission. We show that our algorithm is able to detect even ultra-faint stream features lying well below previous detection limits. Tests show that our algorithm will be able to detect distant halo stream structures >10° long containing as few as ˜15 members (ΣG ˜ 33.6 mag arcsec-2) in the Gaia dataset.

  11. The Midwest Stream Quality Assessment—Influences of human activities on streams

    Science.gov (United States)

    Van Metre, Peter C.; Mahler, Barbara J.; Carlisle, Daren M.; Coles, James F.

    2018-04-16

    Healthy streams and the fish and other organisms that live in them contribute to our quality of life. Extensive modification of the landscape in the Midwestern United States, however, has profoundly affected the condition of streams. Row crops and pavement have replaced grasslands and woodlands, streams have been straightened, and wetlands and fields have been drained. Runoff from agricultural and urban land brings sediment and chemicals to streams. What is the chemical, physical, and biological condition of Midwestern streams? Which physical and chemical stressors are adversely affecting biological communities, what are their origins, and how might we lessen or avoid their adverse effects?In 2013, the U.S. Geological Survey (USGS) conducted the Midwest Stream Quality Assessment to evaluate how human activities affect the biological condition of Midwestern streams. In collaboration with the U.S. Environmental Protection Agency National Rivers and Streams Assessment, the USGS sampled 100 streams, chosen to be representative of the different types of watersheds in the region. Biological condition was evaluated based on the number and diversity of fish, algae, and invertebrates in the streams. Changes to the physical habitat and chemical characteristics of the streams—“stressors”—were assessed, and their relation to landscape factors and biological condition was explored by using mathematical models. The data and models help us to better understand how the human activities on the landscape are affecting streams in the region.

  12. Comparison of animated jet stream visualizations

    Science.gov (United States)

    Nocke, Thomas; Hoffmann, Peter

    2016-04-01

    The visualization of 3D atmospheric phenomena in space and time is still a challenging problem. In particular, multiple solutions of animated jet stream visualizations have been produced in recent years, which were designed to visually analyze and communicate the jet and related impacts on weather circulation patterns and extreme weather events. This PICO integrates popular and new jet animation solutions and inter-compares them. The applied techniques (e.g. stream lines or line integral convolution) and parametrizations (color mapping, line lengths) are discussed with respect to visualization quality criteria and their suitability for certain visualization tasks (e.g. jet patterns and jet anomaly analysis, communicating its relevance for climate change).

  13. Real-Time Clinical Decision Support System with Data Stream Mining

    Directory of Open Access Journals (Sweden)

    Yang Zhang

    2012-01-01

    Full Text Available This research aims to describe a new design of data stream mining system that can analyze medical data stream and make real-time prediction. The motivation of the research is due to a growing concern of combining software technology and medical functions for the development of software application that can be used in medical field of chronic disease prognosis and diagnosis, children healthcare, diabetes diagnosis, and so forth. Most of the existing software technologies are case-based data mining systems. They only can analyze finite and structured data set and can only work well in their early years and can hardly meet today's medical requirement. In this paper, we describe a clinical-support-system based data stream mining technology; the design has taken into account all the shortcomings of the existing clinical support systems.

  14. Analysis of hydraulic characteristics for stream diversion in small stream

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Sang-Jin; Jun, Kye-Won [Chungbuk National University, Cheongju(Korea)

    2001-10-31

    This study is the analysis of hydraulic characteristics for stream diversion reach by numerical model test. Through it we can provide the basis data in flood, and in grasping stream flow characteristics. Analysis of hydraulic characteristics in Seoknam stream were implemented by using computer model HEC-RAS(one-dimensional model) and RMA2(two-dimensional finite element model). As a result we became to know that RMA2 to simulate left, main channel, right in stream is more effective method in analysing flow in channel bends, steep slope, complex bed form effect stream flow characteristics, than HEC-RAS. (author). 13 refs., 3 tabs., 5 figs.

  15. Jet Noise Scaling in Dual Stream Nozzles

    Science.gov (United States)

    Khavaran, Abbas; Bridges, James

    2010-01-01

    Power spectral laws in dual stream jets are studied by considering such flows a superposition of appropriate single-stream coaxial jets. Noise generation in each mixing region is modeled using spectral power laws developed earlier for single stream jets as a function of jet temperature and observer angle. Similarity arguments indicate that jet noise in dual stream nozzles may be considered as a composite of four single stream jets representing primary/secondary, secondary/ambient, transition, and fully mixed zones. Frequency filter are designed to highlight spectral contribution from each jet. Predictions are provided at an area ratio of 2.0--bypass ratio from 0.80 to 3.40, and are compared with measurements within a wide range of velocity and temperature ratios. These models suggest that the low frequency noise in unheated jets is dominated by the fully mixed region at all velocity ratios, while the high frequency noise is dominated by the secondary when the velocity ratio is larger than 0.80. Transition and fully mixed jets equally dominate the low frequency noise in heated jets. At velocity ratios less than 0.50, the high frequency noise from primary/bypass becomes a significant contributing factor similar to that in the secondary/ambient jet.

  16. The metaphors we stream by: Making sense of music streaming

    OpenAIRE

    Hagen, Anja Nylund

    2016-01-01

    In Norway music-streaming services have become mainstream in everyday music listening. This paper examines how 12 heavy streaming users make sense of their experiences with Spotify and WiMP Music (now Tidal). The analysis relies on a mixed-method qualitative study, combining music-diary self-reports, online observation of streaming accounts, Facebook and last.fm scrobble-logs, and in-depth interviews. By drawing on existing metaphors of Internet experiences we demonstrate that music-streaming...

  17. Application of the Hydroecological Integrity Assessment Process for Missouri Streams

    Science.gov (United States)

    Kennen, Jonathan G.; Henriksen, James A.; Heasley, John; Cade, Brian S.; Terrell, James W.

    2009-01-01

    proposed hydrologic alterations; and (2) a Missouri Stream Classification Tool (MOSCT) designed for placing previously unclassified streams into one of the five pre-defined stream types.

  18. Mixed and Low-Level Treatment Facility Project. Appendix B, Waste stream engineering files, Part 1, Mixed waste streams

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-01

    This appendix contains the mixed and low-level waste engineering design files (EDFS) documenting each low-level and mixed waste stream investigated during preengineering studies for Mixed and Low-Level Waste Treatment Facility Project. The EDFs provide background information on mixed and low-level waste generated at the Idaho National Engineering Laboratory. They identify, characterize, and provide treatment strategies for the waste streams. Mixed waste is waste containing both radioactive and hazardous components as defined by the Atomic Energy Act and the Resource Conservation and Recovery Act, respectively. Low-level waste is waste that contains radioactivity and is not classified as high-level waste, transuranic waste, spent nuclear fuel, or 11e(2) byproduct material as defined by DOE 5820.2A. Test specimens of fissionable material irradiated for research and development only, and not for the production of power or plutonium, may be classified as low-level waste, provided the concentration of transuranic is less than 100 nCi/g. This appendix is a tool that clarifies presentation format for the EDFS. The EDFs contain waste stream characterization data and potential treatment strategies that will facilitate system tradeoff studies and conceptual design development. A total of 43 mixed waste and 55 low-level waste EDFs are provided.

  19. SP@CE - An SP-based programming model for consumer electronics streaming applications

    NARCIS (Netherlands)

    Varbanescu, Ana Lucia; Nijhuis, Maik; Escribano, Arturo González; Sips, Henk; Bos, Herbert; Bal, Henri

    2007-01-01

    Efficient programming of multimedia streaming applications for Consumer Electronics (CE) devices is not trivial. As a solution for this problem, we present SP@CE, a novel programming model designed to balance the specific requirements of CE streaming applications with the simplicity and efficiency

  20. The Morphology of Streams Restored for Market and Nonmarket Purposes: Insights From a Mixed Natural-Social Science Approach

    Science.gov (United States)

    Singh, J.; Doyle, M.; Lave, R.; Robertson, M.

    2015-12-01

    Stream restoration is increasingly driven by compensatory mitigation; impacts to streams associated with typical land development activities must be offset via restoration of streams elsewhere. This policy creates an environment where restored stream 'credits' are traded under market-like conditions, comparable to wetland mitigation, carbon offsets, or endangered species habitat banking. The effect of mitigation on restoration design and construction is unknown. We use geomorphic surveys to quantify the differences between restored and nonrestored streams, and the difference between streams restored for market purposes (compensatory mitigation) from those restored for nonmarket programs. Physical study sites are located in the state of North Carolina, USA. We also analyze the social and political-economic drivers of the stream restoration and mitigation industry using analysis of policy documents and interviews with key personnel including regulators, mitigation bankers, stream designers, and scientists. Restored streams are typically wider, shallower and geomorphically more homogeneous than nonrestored streams. For example, nonrestored streams are typically characterized by more than an order of magnitude variability in radius of curvature and meander wavelength within a single study reach. By contrast, the radius of curvature in many restored streams does not vary for nearly the entire project reach. Streams restored for the mitigation market are typically headwater streams and part of a large, complex of long restored main channels, and many restored tributaries; streams restored for nonmarket purposes are typically shorter and consist of the main channel only. Interviews reveal that social forces shape the morphology of restored streams. Designers integrate many influences including economic and regulatory constraints, but traditions of practice have a large influence as well. Home to a fairly mature stream mitigation banking market, North Carolina can provide

  1. Pseudo-Random Number Generator Based on Coupled Map Lattices

    Science.gov (United States)

    Lü, Huaping; Wang, Shihong; Hu, Gang

    A one-way coupled chaotic map lattice is used for generating pseudo-random numbers. It is shown that with suitable cooperative applications of both chaotic and conventional approaches, the output of the spatiotemporally chaotic system can easily meet the practical requirements of random numbers, i.e., excellent random statistical properties, long periodicity of computer realizations, and fast speed of random number generations. This pseudo-random number generator system can be used as ideal synchronous and self-synchronizing stream cipher systems for secure communications.

  2. Catalog of Audiovisual Productions. Volume 3. Air Force and Miscellaneous DoD Productions

    Science.gov (United States)

    1984-06-01

    operation of betatrons, cyclotrons, synchrotrons , etc. For atomic and molecular structure and spectra, see T/02 CrhAisILr. For application, see 0...STRATOSPHERE 0/03 SYNCHRONOUS SATELLITES X/02 STRAW J/06 SYNCHROTRONS T/06 STREAMS(iMETEOROLOGY), JET D/CS SYNTAX B/10 STRUCTURAL ENGINEERING F/12...ENEMIES 50579-DF JOHNNY LINGOGOD26B0 GODF TEA FOR ELSA 26927-OF RESURRECTION OF JOE C HAMMOND 5OSSO.DF CIPHER IN THE SNOW 26505-OF LAND OF THE BRAVE 2692

  3. International Symposium on Complex Computing-Networks

    CERN Document Server

    Sevgi, L; CCN2005; Complex computing networks: Brain-like and wave-oriented electrodynamic algorithms

    2006-01-01

    This book uniquely combines new advances in the electromagnetic and the circuits&systems theory. It integrates both fields regarding computational aspects of common interest. Emphasized subjects are those methods which mimic brain-like and electrodynamic behaviour; among these are cellular neural networks, chaos and chaotic dynamics, attractor-based computation and stream ciphers. The book contains carefully selected contributions from the Symposium CCN2005. Pictures from the bestowal of Honorary Doctorate degrees to Leon O. Chua and Leopold B. Felsen are included.

  4. Ciphers for MPC and FHE

    DEFF Research Database (Denmark)

    R. Albrecht, Martin; Rechberger, Christian; Schneider, Thomas

    2015-01-01

    that when encrypting larger amounts of data the new design strategy translates into improvements in computation and communication complexity by up to a factor of 5 compared to AES-128, which incidentally is one of the most competitive classical designs. Furthermore, we identify cases where “free XORs” can...... of symmetric-key primitives that minimize the multiplicative size and depth of their descriptions. This is motivated by recent progress in practical instantiations of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where linear computations are, compared...

  5. StreamStats: A water resources web application

    Science.gov (United States)

    Ries, Kernell G.; Guthrie, John G.; Rea, Alan H.; Steeves, Peter A.; Stewart, David W.

    2008-01-01

    Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (the flow that is exceeded, on average, once in 100 years and has a 1-percent chance of being exceeded in any year, sometimes referred to as the 100-year flood) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; water-use appropriations and permitting; wastewater and industrial discharge permitting; hydropower facility design and regulation; and the setting of minimum required streamflows to protect freshwater ecosystems. In addition, researchers, planners, regulators, and others often need to know the physical and climatic characteristics of the drainage basins (basin characteristics) and the influence of human activities, such as dams and water withdrawals, on streamflow upstream from locations of interest to understand the mechanisms that control water availability and quality at those locations. Knowledge of the streamflow network and downstream human activities also is necessary to adequately determine whether an upstream activity, such as a water withdrawal, can be allowed without adversely affecting downstream activities.Streamflow statistics could be needed at any location along a stream. Most often, streamflow statistics are needed at ungaged sites, where no streamflow data are available to compute the statistics. At U.S. Geological Survey (USGS) streamflow data-collection stations, which include streamgaging stations, partial-record stations, and miscellaneous-measurement stations, streamflow statistics can be computed from available data for the stations. Streamflow data are collected continuously at streamgaging stations

  6. Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming

    OpenAIRE

    Tang, Ming; Pang, Haitian; Wang, Shou; Gao, Lin; Huang, Jianwei; Sun, Lifeng

    2017-01-01

    Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dime...

  7. DataCell: Exploiting the Power of Relational Databases for Efficient Stream Processing

    NARCIS (Netherlands)

    E. Liarou (Erietta); M.L. Kersten (Martin)

    2009-01-01

    htmlabstractDesigned for complex event processing, DataCell is a research prototype database system in the area of sensor stream systems. Under development at CWI, it belongs to the MonetDB database system family. CWI researchers innovatively built a stream engine directly on top of a database

  8. STREAM: A First Programming Process

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard; Kölling, Michael

    2009-01-01

    to derive a programming process, STREAM, designed specifically for novices. STREAM is a carefully down-scaled version of a full and rich agile software engineering process particularly suited for novices learning object-oriented programming. In using it we hope to achieve two things: to help novice......Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based—they may know what the individual programming language constructs are, but they do not know how to put them together....... Despite this fact, textbooks, educational practice, and programming education research hardly address the issue of teaching the skills needed for systematic development of programs. We provide a conceptual framework for incremental program development, called Stepwise Improvement, which unifies best...

  9. StreamCat

    Data.gov (United States)

    U.S. Environmental Protection Agency — The StreamCat Dataset provides summaries of natural and anthropogenic landscape features for ~2.65 million streams, and their associated catchments, within the...

  10. Stream Crossings

    Data.gov (United States)

    Vermont Center for Geographic Information — Physical measurements and attributes of stream crossing structures and adjacent stream reaches which are used to provide a relative rating of aquatic organism...

  11. Acoustic streaming in the transducer plane in ultrasonic particle manipulation devices.

    Science.gov (United States)

    Lei, Junjun; Glynne-Jones, Peter; Hill, Martyn

    2013-06-07

    In acoustofluidic manipulation and sorting devices, Rayleigh streaming flows are typically found in addition to the acoustic radiation forces. However, experimental work from various groups has described acoustic streaming that occurs in planar devices in a plane parallel to the transducer face. This is typically a four-quadrant streaming pattern with the circulation parallel to the transducer. Understanding its origins is essential for creating designs that limit or control this phenomenon. The cause of this kind of streaming pattern has not been previously explained as it is different from the well-known classical streaming patterns such as Rayleigh streaming and Eckart streaming, whose circulation planes are generally perpendicular to the face of the acoustic transducer. In order to gain insight into these patterns we present a numerical method based on Nyborg's limiting velocity boundary condition that includes terms ignored in the Rayleigh analysis, and verify its predictions against experimental PIV results in a simple device. The results show that the modelled particle trajectories match those found experimentally. Analysis of the dominant terms in the driving equations shows that the origin of this kind of streaming pattern is related to the circulation of the acoustic intensity.

  12. Control characteristics of cryogenic distillation column with a feedback stream for fusion reactor

    International Nuclear Information System (INIS)

    Yamanishi, Toshihiko; Okuno, Kenji

    1997-01-01

    The control characteristics of the cryogenic distillation column with a feedback stream have been discussed based on computer simulation results. This column plays an important role in fusion reactor. A new control system was proposed from the simulation results. The flow rate of top product is determined from the composition and flow rate of a main feed stream by a feedforward control loop. The flow rates of the feedback stream and vapor stream within the column are proportionally changed with a corresponding change of feed flow rate. The flow rate of vapor stream within the column is further adjusted to maintain product purity by a feedback control loop. The proposed system can control the product purity for a large fluctuation of feed composition, a change of feed flow rate, and an increase or decrease of the number of total theoretical stages of the column. The control system should be designed for each column by considering its operating conditions and function. The present study gives us a basic procedure for the design method of the control system of the cryogenic distillation column. (author)

  13. Prioritized Contact Transport Stream

    Science.gov (United States)

    Hunt, Walter Lee, Jr. (Inventor)

    2015-01-01

    A detection process, contact recognition process, classification process, and identification process are applied to raw sensor data to produce an identified contact record set containing one or more identified contact records. A prioritization process is applied to the identified contact record set to assign a contact priority to each contact record in the identified contact record set. Data are removed from the contact records in the identified contact record set based on the contact priorities assigned to those contact records. A first contact stream is produced from the resulting contact records. The first contact stream is streamed in a contact transport stream. The contact transport stream may include and stream additional contact streams. The contact transport stream may be varied dynamically over time based on parameters such as available bandwidth, contact priority, presence/absence of contacts, system state, and configuration parameters.

  14. Re-Meandering of Lowland Streams

    DEFF Research Database (Denmark)

    Pedersen, Morten Lauge; Kristensen, Klaus Kevin; Friberg, Nikolai

    2014-01-01

    We evaluated the restoration of physical habitats and its influence on macroinvertebrate community structure in 18 Danish lowland streams comprising six restored streams, six streams with little physical alteration and six channelized streams. We hypothesized that physical habitats...... and macroinvertebrate communities of restored streams would resemble those of natural streams, while those of the channelized streams would differ from both restored and near-natural streams. Physical habitats were surveyed for substrate composition, depth, width and current velocity. Macroinvertebrates were sampled...... along 100 m reaches in each stream, in edge habitats and in riffle/run habitats located in the center of the stream. Restoration significantly altered the physical conditions and affected the interactions between stream habitat heterogeneity and macroinvertebrate diversity. The substrate in the restored...

  15. StreamExplorer: A Multi-Stage System for Visually Exploring Events in Social Streams.

    Science.gov (United States)

    Wu, Yingcai; Chen, Zhutian; Sun, Guodao; Xie, Xiao; Cao, Nan; Liu, Shixia; Cui, Weiwei

    2017-10-18

    Analyzing social streams is important for many applications, such as crisis management. However, the considerable diversity, increasing volume, and high dynamics of social streams of large events continue to be significant challenges that must be overcome to ensure effective exploration. We propose a novel framework by which to handle complex social streams on a budget PC. This framework features two components: 1) an online method to detect important time periods (i.e., subevents), and 2) a tailored GPU-assisted Self-Organizing Map (SOM) method, which clusters the tweets of subevents stably and efficiently. Based on the framework, we present StreamExplorer to facilitate the visual analysis, tracking, and comparison of a social stream at three levels. At a macroscopic level, StreamExplorer uses a new glyph-based timeline visualization, which presents a quick multi-faceted overview of the ebb and flow of a social stream. At a mesoscopic level, a map visualization is employed to visually summarize the social stream from either a topical or geographical aspect. At a microscopic level, users can employ interactive lenses to visually examine and explore the social stream from different perspectives. Two case studies and a task-based evaluation are used to demonstrate the effectiveness and usefulness of StreamExplorer.Analyzing social streams is important for many applications, such as crisis management. However, the considerable diversity, increasing volume, and high dynamics of social streams of large events continue to be significant challenges that must be overcome to ensure effective exploration. We propose a novel framework by which to handle complex social streams on a budget PC. This framework features two components: 1) an online method to detect important time periods (i.e., subevents), and 2) a tailored GPU-assisted Self-Organizing Map (SOM) method, which clusters the tweets of subevents stably and efficiently. Based on the framework, we present Stream

  16. Evaluation of Secondary Streams in Mixed Waste Treatment

    International Nuclear Information System (INIS)

    Haywood, Fred F.; Goldsmith, William A.; Allen, Douglas F.; Mezga, Lance J.

    1995-12-01

    The United States Department of Energy (DOE) and its predecessors have generated waste containing radioactive and hazardous chemical components (mixed wastes) for over 50 years. Facilities and processes generating these wastes as well as the regulations governing their management have changed. Now, DOE has 49 sites where mixed waste streams exist. The Federal Facility Compliance Act of 1992 (1) required DOE to prepare and obtain regulatory approval of plans for treating these mixed waste streams. Each of the involved DOE sites submitted its respective plan to regulators in April 1995 (2). Most of the individual plans were approved by the respective regulatory agencies in October 1995. The implementation of these plans has begun accordance with compliance instruments (orders) issued by the cognizant regulatory authority. Most of these orders include milestones that are fixed, firm and enforceable as defined in each compliance order. In many cases, mixed waste treatment that was already being carried out and survived the alternative selection process is being used now to treat selected mixed waste streams. For other waste streams at sites throughout the DOE complex treatment methods and schedules are subject to negotiation as the realties of ever decreasing budgets begin to drive the available options. Secondary wastes generated by individual waste treatment systems are also mixed wastes that require treatment in the appropriate treatment system. These secondary wastes may be solid or liquid waste (or both). For example debris washing will generate wastewater requiring treatment; wastewater treatment, in turn, will generate sludge or other residuals requiring treatment; liquid effluents must meet applicable limits of discharge permits. At large DOE sites, secondary waste streams will be a major influence in optimizing design for primary treatment. Understanding these impacts is important not only foe system design, but also for assurances that radiation releases and

  17. An Association-Oriented Partitioning Approach for Streaming Graph Query

    Directory of Open Access Journals (Sweden)

    Yun Hao

    2017-01-01

    Full Text Available The volumes of real-world graphs like knowledge graph are increasing rapidly, which makes streaming graph processing a hot research area. Processing graphs in streaming setting poses significant challenges from different perspectives, among which graph partitioning method plays a key role. Regarding graph query, a well-designed partitioning method is essential for achieving better performance. Existing offline graph partitioning methods often require full knowledge of the graph, which is not possible during streaming graph processing. In order to handle this problem, we propose an association-oriented streaming graph partitioning method named Assc. This approach first computes the rank values of vertices with a hybrid approximate PageRank algorithm. After splitting these vertices with an adapted variant affinity propagation algorithm, the process order on vertices in the sliding window can be determined. Finally, according to the level of these vertices and their association, the partition where the vertices should be distributed is decided. We compare its performance with a set of streaming graph partition methods and METIS, a widely adopted offline approach. The results show that our solution can partition graphs with hundreds of millions of vertices in streaming setting on a large collection of graph datasets and our approach outperforms other graph partitioning methods.

  18. A study of the effects of implementing agricultural best management practices and in-stream restoration on suspended sediment, stream habitat, and benthic macroinvertebrates at three stream sites in Surry County, North Carolina, 2004-2007-Lessons learned

    Science.gov (United States)

    Smith, Douglas G.; Ferrell, G.M.; Harned, Douglas A.; Cuffney, Thomas F.

    2011-01-01

    The effects of agricultural best management practices and in-stream restoration on suspended-sediment concentrations, stream habitat, and benthic macroinvertebrate assemblages were examined in a comparative study of three small, rural stream basins in the Piedmont and Blue Ridge Physiographic Provinces of North Carolina and Virginia between 2004 and 2007. The study was designed to assess changes in stream quality associated with stream-improvement efforts at two sites in comparison to a control site (Hogan Creek), for which no improvements were planned. In the drainage basin of one of the stream-improvement sites (Bull Creek), several agricultural best management practices, primarily designed to limit cattle access to streams, were implemented during this study. In the drainage basin of the second stream-improvement site (Pauls Creek), a 1,600-foot reach of the stream channel was restored and several agricultural best management practices were implemented. Streamflow conditions in the vicinity of the study area were similar to or less than the long-term annual mean streamflows during the study. Precipitation during the study period also was less than normal, and the geographic distribution of precipitation indicated drier conditions in the southern part of the study area than in the northern part. Dry conditions during much of the study limited opportunities for acquiring high-flow sediment samples and streamflow measurements. Suspended-sediment yields for the three basins were compared to yield estimates for streams in the southeastern United States. Concentrations of suspended sediment and nutrients in samples from Bull Creek, the site where best management practices were implemented, were high compared to the other two sites. No statistically significant change in suspended-sediment concentrations occurred at the Bull Creek site following implementation of best management practices. However, data collected before and after channel stabilization at the Pauls

  19. Introduction to stream: An Extensible Framework for Data Stream Clustering Research with R

    Directory of Open Access Journals (Sweden)

    Michael Hahsler

    2017-02-01

    Full Text Available In recent years, data streams have become an increasingly important area of research for the computer science, database and statistics communities. Data streams are ordered and potentially unbounded sequences of data points created by a typically non-stationary data generating process. Common data mining tasks associated with data streams include clustering, classification and frequent pattern mining. New algorithms for these types of data are proposed regularly and it is important to evaluate them thoroughly under standardized conditions. In this paper we introduce stream, a research tool that includes modeling and simulating data streams as well as an extensible framework for implementing, interfacing and experimenting with algorithms for various data stream mining tasks. The main advantage of stream is that it seamlessly integrates with the large existing infrastructure provided by R. In addition to data handling, plotting and easy scripting capabilities, R also provides many existing algorithms and enables users to interface code written in many programming languages popular among data mining researchers (e.g., C/C++, Java and Python. In this paper we describe the architecture of stream and focus on its use for data stream clustering research. stream was implemented with extensibility in mind and will be extended in the future to cover additional data stream mining tasks like classification and frequent pattern mining.

  20. Process analytical chemistry applied to actinide waste streams

    International Nuclear Information System (INIS)

    Day, R.S.

    1994-01-01

    The Department of Energy is being called upon to clean up it's legacy of waste from the nuclear complex generated during the cold war period. Los Alamos National Laboratory is actively involved in waste minimization and waste stream polishing activities associated with this clean up. The Advanced Testing Line for Actinide Separations (ATLAS) at Los Alamos serves as a developmental test bed for integrating flow sheet development of nitric acid waste streams with process analytical chemistry and process control techniques. The wastes require processing in glove boxes because of the radioactive components, thus adding to the difficulties of making analytical measurements. Process analytical chemistry methods provide real-time chemical analysis in support of existing waste stream operations and enhances the development of new waste stream polishing initiatives. The instrumentation and methods being developed on ATLAS are designed to supply near-real time analyses on virtually all of the chemical parameters found in nitric acid processing of actinide waste. These measurements supply information on important processing parameters including actinide oxidation states, free acid concentration, interfering anions and metal impurities

  1. Benthic invertebrate fauna, small streams

    Science.gov (United States)

    J. Bruce Wallace; S.L. Eggert

    2009-01-01

    Small streams (first- through third-order streams) make up >98% of the total number of stream segments and >86% of stream length in many drainage networks. Small streams occur over a wide array of climates, geology, and biomes, which influence temperature, hydrologic regimes, water chemistry, light, substrate, stream permanence, a basin's terrestrial plant...

  2. Compensatory stream and wetland mitigation in North Carolina: an evaluation of regulatory success.

    Science.gov (United States)

    Hill, Tammy; Kulz, Eric; Munoz, Breda; Dorney, John R

    2013-05-01

    Data from a probability sample were used to estimate wetland and stream mitigation success from 2007 to 2009 across North Carolina (NC). "Success" was defined as whether the mitigation site met regulatory requirements in place at the time of construction. Analytical results were weighted by both component counts and mitigation size. Overall mitigation success (including preservation) was estimated at 74 % (SE = 3 %) for wetlands and 75 % (SE = 4 %) for streams in NC. Compared to the results of previous studies, wetland mitigation success rates had increased since the mid-1990s. Differences between mitigation providers (mitigation banks, NC Ecosystem Enhancement Program's design-bid-build and full-delivery programs, NC Department of Transportation and private permittee-responsible mitigation) were generally not significant although permittee-responsible mitigation yielded higher success rates in certain circumstances. Both wetland and stream preservation showed high rates of success and the stream enhancement success rate was significantly higher than that of stream restoration. Additional statistically significant differences when mitigation size was considered included: (1) the Piedmont yielded a lower stream mitigation success rate than other areas of the state, and (2) recently constructed wetland mitigation projects demonstrated a lower success rate than those built prior to 2002. Opportunities for improvement exist in the areas of regulatory record-keeping, understanding the relationship between post-construction establishment and long-term ecological trajectories of stream and wetland restoration projects, incorporation of numeric ecological metrics into mitigation monitoring and success criteria, and adaptation of stream mitigation designs to achieve greater success in the Piedmont.

  3. Inventory of miscellaneous streams

    International Nuclear Information System (INIS)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column

  4. Pseudo-noise generator using UNMBER SIEVE''. Kazu furui wo mochiita giji ransu seiseiki

    Energy Technology Data Exchange (ETDEWEB)

    Kyan, S.; Teruya, H. (University of the Ryukyus, Okinawa (Japan). College of Engineering)

    1992-09-01

    In data communications which require secrecy, the Vernam cipher method is often used because of its simple principle and high security. It is necessary for this method to generate key streams as random numbers. The conventional generating methods using linear feedback shift register (LFSR) or data encryption standard(DES) have some problems in and security and circuit complexity. This paper proposes a pseudo-noise generator of relatively simple structure using number sieve, and describes its structure and security. The pseudo-noise generator consists of the number sieve circuit combined With shift resistors of figures of 8 prime numbers from 2 to 19 and other resisters containing AND in feedback area. The total number of keys that can be selected is 3.8[times]10[sup 25], which is not readable from the aspect of calculation volume. Concerning a model of the number sieve circuit with shift resistors which are reduced to 4, linear complexity, which is part of evaluation standard for the security of pseudo-random numbers for cipher, and hamming distance for different keys are examined. 10 refs., 8 figs., 3 tabs.

  5. Evidence for fish dispersal from spatial analysis of stream network topology

    Science.gov (United States)

    Hitt, N.P.; Angermeier, P.L.

    2008-01-01

    Developing spatially explicit conservation strategies for stream fishes requires an understanding of the spatial structure of dispersal within stream networks. We explored spatial patterns of stream fish dispersal by evaluating how the size and proximity of connected streams (i.e., stream network topology) explained variation in fish assemblage structure and how this relationship varied with local stream size. We used data from the US Environmental Protection Agency's Environmental Monitoring and Assessment Program in wadeable streams of the Mid-Atlantic Highlands region (n = 308 sites). We quantified stream network topology with a continuous analysis based on the rate of downstream flow accumulation from sites and with a discrete analysis based on the presence of mainstem river confluences (i.e., basin area >250 km2) within 20 fluvial km (fkm) from sites. Continuous variation in stream network topology was related to local species richness within a distance of ???10 fkm, suggesting an influence of fish dispersal within this spatial grain. This effect was explained largely by catostomid species, cyprinid species, and riverine species, but was not explained by zoogeographic regions, ecoregions, sampling period, or spatial autocorrelation. Sites near mainstem river confluences supported greater species richness and abundance of catostomid, cyprinid, and ictalurid fishes than did sites >20 fkm from such confluences. Assemblages at sites on the smallest streams were not related to stream network topology, consistent with the hypothesis that local stream size regulates the influence of regional dispersal. These results demonstrate that the size and proximity of connected streams influence the spatial distribution of fish and suggest that these influences can be incorporated into the designs of stream bioassessments and reserves to enhance management efficacy. ?? 2008 by The North American Benthological Society.

  6. Time-Based Data Streams: Fundamental Concepts for a Data Resource for Streams

    Energy Technology Data Exchange (ETDEWEB)

    Beth A. Plale

    2009-10-10

    Real time data, which we call data streams, are readings from instruments, environmental, bodily or building sensors that are generated at regular intervals and often, due to their volume, need to be processed in real time. Often a single pass is all that can be made on the data, and a decision to discard or keep the instance is made on the spot. Too, the stream is for all practical purposes indefinite, so decisions must be made on incomplete knowledge. This notion of data streams has a different set of issues from a file, for instance, that is byte streamed to a reader. The file is finite, so the byte stream is becomes a processing convenience more than a fundamentally different kind of data. Through the duration of the project we examined three aspects of streaming data: the first, techniques to handle streaming data in a distributed system organized as a collection of web services, the second, the notion of the dashboard and real time controllable analysis constructs in the context of the Fermi Tevatron Beam Position Monitor, and third and finally, we examined provenance collection of stream processing such as might occur as raw observational data flows from the source and undergoes correction, cleaning, and quality control. The impact of this work is severalfold. We were one of the first to advocate that streams had little value unless aggregated, and that notion is now gaining general acceptance. We were one of the first groups to grapple with the notion of provenance of stream data also.

  7. Asteroid/meteorite streams

    Science.gov (United States)

    Drummond, J.

    The independent discovery of the same three streams (named alpha, beta, and gamma) among 139 Earth approaching asteroids and among 89 meteorite producing fireballs presents the possibility of matching specific meteorites to specific asteroids, or at least to asteroids in the same stream and, therefore, presumably of the same composition. Although perhaps of limited practical value, the three meteorites with known orbits are all ordinary chondrites. To identify, in general, the taxonomic type of the parent asteroid, however, would be of great scientific interest since these most abundant meteorite types cannot be unambiguously spectrally matched to an asteroid type. The H5 Pribram meteorite and asteroid 4486 (unclassified) are not part of a stream, but travel in fairly similar orbits. The LL5 Innisfree meteorite is orbitally similar to asteroid 1989DA (unclassified), and both are members of a fourth stream (delta) defined by five meteorite-dropping fireballs and this one asteroid. The H5 Lost City meteorite is orbitally similar to 1980AA (S type), which is a member of stream gamma defined by four asteroids and four fireballs. Another asteroid in this stream is classified as an S type, another is QU, and the fourth is unclassified. This stream suggests that ordinary chondrites should be associated with S (and/or Q) asteroids. Two of the known four V type asteroids belong to another stream, beta, defined by five asteroids and four meteorite-dropping (but unrecovered) fireballs, making it the most probable source of the eucrites. The final stream, alpha, defined by five asteroids and three fireballs is of unknown composition since no meteorites have been recovered and only one asteroid has an ambiguous classification of QRS. If this stream, or any other as yet undiscovered ones, were found to be composed of a more practical material (e.g., water or metalrich), then recovery of the associated meteorites would provide an opportunity for in-hand analysis of a potential

  8. Design of the study on transitions in employment, ability and motivation (STREAM)

    NARCIS (Netherlands)

    Geuskens, G.A.; Ybema, J.F.; Heuvel, S.G. van den; Wind, A. de; Leijten, M.S.; Joling, C.I.; Blatter, B.M. van; Burdorf, A.; Beek, A.J. van der; Bongers, P.M.

    2013-01-01

    The objective of the Study on Transitions in Employment, Ability and Motivation (STREAM) is to acquire knowledge on determinants of healthy and productive work participation among persons aged 45–64 years. A research framework was developed with main outcomes of productivity and transitions in

  9. Application of a concept development process to evaluate process layout designs using value stream mapping and simulation

    Directory of Open Access Journals (Sweden)

    Ki-Young Jeong

    2011-07-01

    Full Text Available Purpose: We propose and demonstrate a concept development process (CDP as a framework to solve a value stream mapping (VSM related process layout design optimization problem.Design/methodology/approach: A case study approach was used to demonstrate the effectiveness of CDP framework in a portable fire extinguisher manufacturing company. To facilitate the CDP application, we proposed the system coupling level index (SCLI and simulation to evaluate the process layout design concepts.Findings: As part of the CDP framework application, three process layout design concepts - current layout (CL, express lane layout (ELL and independent zone layout (IZL - were generated. Then, the SCLI excluded CL and simulation selected IZL as the best concept. The simulation was also applied to optimize the performance of IZL in terms of the number of pallets. Based on this case study, we concluded that CDP framework worked well.Research limitations/implications: The process layout design optimization issue has not been well addressed in the VSM literature. We believe that this paper initiated the relevant discussion by showing the feasibility of CDP as a framework in this issue.Practical implications: The CDP and SCLI are very practice-oriented approaches in the sense that they do not require any complex analytical knowledge.Originality/value: We discussed a not well-addressed issue with a systematic framework. In addition, the SCLI presented was also unique.

  10. Chaos based video encryption using maps and Ikeda time delay system

    Science.gov (United States)

    Valli, D.; Ganesan, K.

    2017-12-01

    Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.

  11. Aeroacoustics of Three-Stream Jets

    Science.gov (United States)

    Henderson, Brenda S.

    2012-01-01

    Results from acoustic measurements of noise radiated from a heated, three-stream, co-annular exhaust system operated at subsonic conditions are presented. The experiments were conducted for a range of core, bypass, and tertiary stream temperatures and pressures. The nozzle system had a fan-to-core area ratio of 2.92 and a tertiary-to-core area ratio of 0.96. The impact of introducing a third stream on the radiated noise for third-stream velocities below that of the bypass stream was to reduce high frequency noise levels at broadside and peak jet-noise angles. Mid-frequency noise radiation at aft observation angles was impacted by the conditions of the third stream. The core velocity had the greatest impact on peak noise levels and the bypass-to-core mass flow ratio had a slight impact on levels in the peak jet-noise direction. The third-stream jet conditions had no impact on peak noise levels. Introduction of a third jet stream in the presence of a simulated forward-flight stream limits the impact of the third stream on radiated noise. For equivalent ideal thrust conditions, two-stream and three-stream jets can produce similar acoustic spectra although high-frequency noise levels tend to be lower for the three-stream jet.

  12. Evaluation of stream crossing methods prior to gas pipeline construction

    International Nuclear Information System (INIS)

    Murphy, M.H.; Rogers, J.S.; Ricca, A.

    1995-01-01

    Stream surveys are conducted along proposed gas pipeline routes prior to construction to assess potential impacts to stream ecosystems and to recommend preferred crossing methods. Recently, there has been a high level of scrutiny from the Public Service Commission (PSC) to conduct these stream crossings with minimal effects to the aquatic community. PSC's main concern is the effect of sediment on aquatic biota. Smaller, low flowing or intermittent streams are generally crossed using a wet crossing technique. This technique involves digging a trench for the pipeline while the stream is flowing. Sediment control measures are used to reduce sediment loads downstream. Wider, faster flowing, or protected streams are typically crossed with a dry crossing technique. A dry crossing involves placing a barrier upstream of the crossing and diverting the water around the crossing location. The pipeline trench is then dug in the dry area. O'Brien and Gere and NYSEG have jointly designed a modified wet crossing for crossing streams that exceed maximum flows for a dry crossing, and are too wide for a typical wet crossing. This method diverts water around the crossing using a pumping system, instead of constructing a dam. The trench is similar to a wet crossing, with sediment control devices in place upstream and downstream. If streams are crossed during low flow periods, the pumping system will be able to reduce the majority of water flow and volume form the crossing area, thereby reducing ecological impacts. Evaluation of effects of this crossing type on the stream biota are currently proposed and may proceed when construction begins

  13. Academic Self-Concepts in Ability Streams: Considering Domain Specificity and Same-Stream Peers

    Science.gov (United States)

    Liem, Gregory Arief D.; McInerney, Dennis M.; Yeung, Alexander S.

    2015-01-01

    The study examined the relations between academic achievement and self-concepts in a sample of 1,067 seventh-grade students from 3 core ability streams in Singapore secondary education. Although between-stream differences in achievement were large, between-stream differences in academic self-concepts were negligible. Within each stream, levels of…

  14. Solar wind stream interfaces

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1978-01-01

    Measurements aboard Imp 6, 7, and 8 reveal that approximately one third of all high-speed solar wind streams observed at 1 AU contain a sharp boundary (of thickness less than approx.4 x 10 4 km) near their leading edge, called a stream interface, which separates plasma of distinctly different properties and origins. Identified as discontinuities across which the density drops abruptly, the proton temperature increases abruptly, and the speed rises, stream interfaces are remarkably similar in character from one stream to the next. A superposed epoch analysis of plasma data has been performed for 23 discontinuous stream interfaces observed during the interval March 1971 through August 1974. Among the results of this analysis are the following: (1) a stream interface separates what was originally thick (i.e., dense) slow gas from what was originally thin (i.e., rare) fast gas; (2) the interface is the site of a discontinuous shear in the solar wind flow in a frame of reference corotating with the sun; (3) stream interfaces occur at speeds less than 450 km s - 1 and close to or at the maximum of the pressure ridge at the leading edges of high-speed streams; (4) a discontinuous rise by approx.40% in electron temperature occurs at the interface; and (5) discontinuous changes (usually rises) in alpha particle abundance and flow speed relative to the protons occur at the interface. Stream interfaces do not generally recur on successive solar rotations, even though the streams in which they are embedded often do. At distances beyond several astronomical units, stream interfaces should be bounded by forward-reverse shock pairs; three of four reverse shocks observed at 1 AU during 1971--1974 were preceded within approx.1 day by stream interfaces. Our observations suggest that many streams close to the sun are bounded on all sides by large radial velocity shears separating rapidly expanding plasma from more slowly expanding plasma

  15. Designer solvents for the extraction of glycols and alcohols from aqueous streams

    NARCIS (Netherlands)

    Garcia Chavez, L.Y.

    2013-01-01

    The separation of polar compounds from aqueous streams is one of the most energy intensive operations within the chemical industry, because of the formation of hydrogen bonds that should be broken and the high heat of vaporization of water. Important bulk chemicals like glycols and alcohols produced

  16. Stream Phosphorus Dynamics Along a Suburbanizing Gradient in Southern Ontario, Canada

    Science.gov (United States)

    Duval, T. P.

    2017-12-01

    While it is well known that urban streams are subject to impaired water quality relative to natural analogues, far less research has been directed at stream water quality during the process of (sub-) urbanization. This study determines the role of housing construction activities in Brampton, Canada on the concentration and flux of phosphorus (P) of a headwater stream. Prior to development the stream was engineered with a riffle-pool sequence, riparian plantings, and a floodplain corridor that was lined with sediment fencing. Stream sites were sampled daily over a period of six months at locations representing varying stages of subdivision completion (upper site -active construction; middle site -finished construction and natural vegetation; lower site -finished construction and active construction). A nearby urban stream site developed ten years prior to this study was selected as a reference site. There were no differences in total phosphorus (TP) levels or flux between the suburbanizing and urban streams; however, the forms of P differed between sites. The urban stream TP load was dominated by particulate phosphorus (PP) while suburbanizing stream P was mainly in the dissolved organic phosphorus (DOP) form. The importance of DOP to TP flux increased with the onset of the growing season. TP levels in all stream segments frequently exceeded provincial water quality guidelines during storm events but were generally low during baseflow conditions. During storm events PP and total suspended solid levels in the suburbanizing stream reached levels of the urban stream due to sediment fence failure at several locations along the construction-hillslope interface. Along the suburbanizing gradient, the hydrological connection to a mid-reach zone of no-construction activity / fallow field and native forest resulted in significantly lower P levels than the upper suburbanizing stream site. This suggests that stream channel design features as well as timing of construction

  17. Stream systems.

    Science.gov (United States)

    Jack E. Williams; Gordon H. Reeves

    2006-01-01

    Restored, high-quality streams provide innumerable benefits to society. In the Pacific Northwest, high-quality stream habitat often is associated with an abundance of salmonid fishes such as chinook salmon (Oncorhynchus tshawytscha), coho salmon (O. kisutch), and steelhead (O. mykiss). Many other native...

  18. Using Video to Communicate Scientific Findings -- Habitat Connections in Urban Streams

    Science.gov (United States)

    Harned, D. A.; Moorman, M.; Fitzpatrick, F. A.; McMahon, G.

    2011-12-01

    The U.S Geological Survey (USGS) National Water-Quality Assessment Program (NAWQA) provides information about (1) water-quality conditions and how those conditions vary locally, regionally, and nationally, (2) water-quality trends, and (3) factors that affect those conditions. As part of the NAWQA Program, the Effects of Urbanization on Stream Ecosystems (EUSE) study examined the vulnerability and resilience of streams to urbanization. Completion of the EUSE study has resulted in over 20 scientific publications. Video podcasts are being used in addition to these publications to communicate the relevance of these scientific findings to more general audiences such as resource managers, educational groups, public officials, and the general public. An example of one of the podcasts is a film examining effects of urbanization on stream habitat. "Habitat Connections in Urban Streams" explores how urbanization changes some of the physical features that provide in-stream habitat and examines examples of stream restoration projects designed to improve stream form and function. The "connections" theme is emphasized, including the connection of in-stream habitats from the headwaters to the stream mouth; connections between stream habitat and the surrounding floodplains, wetlands and basin; and connections between streams and people-- resource managers, public officials, scientists, and the general public. Examples of innovative stream restoration projects in Baltimore Maryland; Milwaukee, Wisconsin; and Portland Oregon are shown with interviews of managers, engineers, scientists, and others describing the projects. The film is combined with a website with links to extended film versions of the stream-restoration project interviews. The website and films are an example of USGS efforts aimed at improving science communication to a general audience. The film is available for access from the EUSE website: http://water.usgs.gov/nawqa/urban/html/podcasts.html. Additional films are

  19. A Rapid Method to Score Stream Reaches Based on the Overall Performance of Their Main Ecological Functions

    Science.gov (United States)

    Rowe, David K.; Parkyn, Stephanie; Quinn, John; Collier, Kevin; Hatton, Chris; Joy, Michael K.; Maxted, John; Moore, Stephen

    2009-06-01

    A method was developed to score the ecological condition of first- to third-order stream reaches in the Auckland region of New Zealand based on the performance of their key ecological functions. Such a method is required by consultants and resource managers to quantify the reduction in ecological condition of a modified stream reach relative to its unmodified state. This is a fundamental precursor for the determination of fair environmental compensation for achieving no-net-loss in overall stream ecological value. Field testing and subsequent use of the method indicated that it provides a useful measure of ecological condition related to the performance of stream ecological functions. It is relatively simple to apply compared to a full ecological study, is quick to use, and allows identification of the degree of impairment of each of the key ecological functions. The scoring system was designed so that future improvements in the measurement of stream functions can be incorporated into it. Although the methodology was specifically designed for Auckland streams, the principles can be readily adapted to other regions and stream types.

  20. Applicability of Existing Objective Metrics of Perceptual Quality for Adaptive Video Streaming

    DEFF Research Database (Denmark)

    Søgaard, Jacob; Krasula, Lukás; Shahid, Muhammad

    2016-01-01

    Objective video quality metrics are designed to estimate the quality of experience of the end user. However, these objective metrics are usually validated with video streams degraded under common distortion types. In the presented work, we analyze the performance of published and known full......-reference and noreference quality metrics in estimating the perceived quality of adaptive bit-rate video streams knowingly out of scope. Experimental results indicate not surprisingly that state of the art objective quality metrics overlook the perceived degradations in the adaptive video streams and perform poorly...

  1. PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liao Jianxin; Lei Zhengxiong; Ma Xutao; Zhu Xiaomin

    2006-01-01

    A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strategy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.

  2. Watershed-based survey designs

    Science.gov (United States)

    Detenbeck, N.E.; Cincotta, D.; Denver, J.M.; Greenlee, S.K.; Olsen, A.R.; Pitchford, A.M.

    2005-01-01

    Watershed-based sampling design and assessment tools help serve the multiple goals for water quality monitoring required under the Clean Water Act, including assessment of regional conditions to meet Section 305(b), identification of impaired water bodies or watersheds to meet Section 303(d), and development of empirical relationships between causes or sources of impairment and biological responses. Creation of GIS databases for hydrography, hydrologically corrected digital elevation models, and hydrologic derivatives such as watershed boundaries and upstream–downstream topology of subcatchments would provide a consistent seamless nationwide framework for these designs. The elements of a watershed-based sample framework can be represented either as a continuous infinite set defined by points along a linear stream network, or as a discrete set of watershed polygons. Watershed-based designs can be developed with existing probabilistic survey methods, including the use of unequal probability weighting, stratification, and two-stage frames for sampling. Case studies for monitoring of Atlantic Coastal Plain streams, West Virginia wadeable streams, and coastal Oregon streams illustrate three different approaches for selecting sites for watershed-based survey designs.

  3. Low latency adaptive streaming of HD H.264 video over 802.11 wireless networks with cross-layer feedback

    Science.gov (United States)

    Patti, Andrew; Tan, Wai-tian; Shen, Bo

    2007-09-01

    Streaming video in consumer homes over wireless IEEE 802.11 networks is becoming commonplace. Wireless 802.11 networks pose unique difficulties for streaming high definition (HD), low latency video due to their error-prone physical layer and media access procedures which were not designed for real-time traffic. HD video streaming, even with sophisticated H.264 encoding, is particularly challenging due to the large number of packet fragments per slice. Cross-layer design strategies have been proposed to address the issues of video streaming over 802.11. These designs increase streaming robustness by imposing some degree of monitoring and control over 802.11 parameters from application level, or by making the 802.11 layer media-aware. Important contributions are made, but none of the existing approaches directly take the 802.11 queuing into account. In this paper we take a different approach and propose a cross-layer design allowing direct, expedient control over the wireless packet queue, while obtaining timely feedback on transmission status for each packet in a media flow. This method can be fully implemented on a media sender with no explicit support or changes required to the media client. We assume that due to congestion or deteriorating signal-to-noise levels, the available throughput may drop substantially for extended periods of time, and thus propose video source adaptation methods that allow matching the bit-rate to available throughput. A particular H.264 slice encoding is presented to enable seamless stream switching between streams at multiple bit-rates, and we explore using new computationally efficient transcoding methods when only a high bit-rate stream is available.

  4. Evaluation of the streaming-matrix method for discrete-ordinates duct-streaming calculations

    International Nuclear Information System (INIS)

    Clark, B.A.; Urban, W.T.; Dudziak, D.J.

    1983-01-01

    A new deterministic streaming technique called the Streaming Matrix Hybrid Method (SMHM) is applied to two realistic duct-shielding problems. The results are compared to standard discrete-ordinates and Monte Carlo calculations. The SMHM shows promise as an alternative deterministic streaming method to standard discrete-ordinates

  5. Analysis of Trivium by a Simulated Annealing variant

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian

    2010-01-01

    This paper proposes a new method of solving certain classes of systems of multivariate equations over the binary field and its cryptanalytical applications. We show how heuristic optimization methods such as hill climbing algorithms can be relevant to solving systems of multivariate equations....... A characteristic of equation systems that may be efficiently solvable by the means of such algorithms is provided. As an example, we investigate equation systems induced by the problem of recovering the internal state of the stream cipher Trivium. We propose an improved variant of the simulated annealing method...

  6. Herramientas de criptoanálisis

    OpenAIRE

    Castro Lechtaler, Antonio; Cipriano, Marcelo; García, Edith; Liporace, Julio César; Maiorano, Ariel; Malvacio, Eduardo; Tapia, Néstor

    2017-01-01

    Este proyecto persigue el estudio, analisis, desarrollo e implementación de técnicas o métodos criptográficos para ser aplicados a determinados generadores de secuencias seudoaleatorias tipo Stream Ciphers, en particular a aquellos algoritmos que involucran LFSR´s, NLFSR´s, CCG y CA. Se orientará el estudio a los métodos Criptoanálisis Diferencial[1-2], Lineal[ 3], Algebraico, Guess-and- Determi-ne[4] y una de las últimas técnicas criptológicas denominada Cube Attack [5]. Desarrollar un...

  7. Noise-based Stego-ECC

    Directory of Open Access Journals (Sweden)

    Rahardjo Budi

    2014-03-01

    Full Text Available A novel method of inserting noise into stream of ciphered text is proposed. The goal of inserting noise is to increase the level of uncertainty, thus making it harder for an attacker to detect data and noise. This form of steganography is implemented using Elliptic Curve Cryptography (ECC. The process of embedding the noise to the message in the encryption process and removing the noise from the message in the decryption process is proposed in this work by modifying ElGamal to allow auto detection of data and noise.

  8. Hill climbing algorithms and trivium

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian

    2011-01-01

    This paper proposes a new method to solve certain classes of systems of multivariate equations over the binary field and its cryptanalytical applications. We show how heuristic optimization methods such as hill climbing algorithms can be relevant to solving systems of multivariate equations....... A characteristic of equation systems that may be efficiently solvable by the means of such algorithms is provided. As an example, we investigate equation systems induced by the problem of recovering the internal state of the stream cipher Trivium. We propose an improved variant of the simulated annealing method...

  9. Consequences of variation in stream-landscape connections for stream nitrate retention and export

    Science.gov (United States)

    Handler, A. M.; Helton, A. M.; Grimm, N. B.

    2017-12-01

    Hydrologic and material connections among streams, the surrounding terrestrial landscape, and groundwater systems fluctuate between extremes in dryland watersheds, yet the consequences of this variation for stream nutrient retention and export remain uncertain. We explored how seasonal variation in hydrologic connection among streams, landscapes, and groundwater affect nitrate and ammonium concentrations across a dryland stream network and how this variation mediates in-stream nitrate uptake and watershed export. We conducted spatial surveys of stream nitrate and ammonium concentration across the 1200 km2 Oak Creek watershed in central Arizona (USA). In addition, we conducted pulse releases of a solution containing biologically reactive sodium nitrate, with sodium chloride as a conservative hydrologic tracer, to estimate nitrate uptake rates in the mainstem (Q>1000 L/s) and two tributaries. Nitrate and ammonium concentrations generally increased from headwaters to mouth in the mainstem. Locally elevated concentrations occurred in spring-fed tributaries draining fish hatcheries and larger irrigation ditches, but did not have a substantial effect on the mainstem nitrogen load. Ambient nitrate concentration (as N) ranged from below the analytical detection limit of 0.005 mg/L to 0.43 mg/L across all uptake experiments. Uptake length—average stream distance traveled for a nutrient atom from the point of release to its uptake—at ambient concentration ranged from 250 to 704 m and increased significantly with higher discharge, both across streams and within the same stream on different experiment dates. Vertical uptake velocity and aerial uptake rate ranged from 6.6-10.6 mm min-1 and 0.03 to 1.4 mg N m-2 min-1, respectively. Preliminary analyses indicate potentially elevated nitrogen loading to the lower portion of the watershed during seasonal precipitation events, but overall, the capacity for nitrate uptake is high in the mainstem and tributaries. Ongoing work

  10. Streaming tearing mode

    Science.gov (United States)

    Shigeta, M.; Sato, T.; Dasgupta, B.

    1985-01-01

    The magnetohydrodynamic stability of streaming tearing mode is investigated numerically. A bulk plasma flow parallel to the antiparallel magnetic field lines and localized in the neutral sheet excites a streaming tearing mode more strongly than the usual tearing mode, particularly for the wavelength of the order of the neutral sheet width (or smaller), which is stable for the usual tearing mode. Interestingly, examination of the eigenfunctions of the velocity perturbation and the magnetic field perturbation indicates that the streaming tearing mode carries more energy in terms of the kinetic energy rather than the magnetic energy. This suggests that the streaming tearing mode instability can be a more feasible mechanism of plasma acceleration than the usual tearing mode instability.

  11. How do land-based salmonid farms affect stream ecology?

    International Nuclear Information System (INIS)

    Tello, A.; Corner, R.A.; Telfer, T.C.

    2010-01-01

    Increasing research is highlighting the fact that streams provide crucial ecosystem services through the biogeochemical and ecological processes they sustain. Freshwater land-based salmonid farms commonly discharge their effluents into low order, headwater streams, partly due to the fact that adequate freshwater resources for production are commonly found in undisturbed areas. We review the effects of salmonid farm effluents on different biological components of stream ecosystems. Relevant considerations related to the temporal and spatial scales of effluent discharge and ecological effects are discussed. These highlight the need to characterize the patterns of stressor discharge when assessing environmental impacts and designing ecological effects studies. The potential role of multiple stressors in disrupting ecosystem structure and function is discussed with an emphasis on aquaculture veterinary medicines. Further research on the effects of veterinary medicines using relevant exposure scenarios would significantly contribute to our understanding of their impact in relation to other effluent stressors. - This article reviews the effects of aquaculture effluents on stream ecosystems with an emphasis on veterinary medicines and the temporal patterns of effluent discharge.

  12. The distribution of copper in stream sediments in an anomalous stream near Steinkopf, Namaqualand

    International Nuclear Information System (INIS)

    De Bruin, D.

    1987-01-01

    Anomalous copper concentrations detected by the regional stream-sediment programme of the Geological Survey was investigated in a stream near Steinkopf, Namaqualand. A follow-up disclosed the presence of malachite mineralization. However, additional stream-sediment samples collected from the 'anomalous' stream revealed an erratic distribution of copper and also that the malachite mineralization had no direct effect on the copper distribution in the stream sediments. Low partial-extraction yields, together with X-ray diffraction analyses, indicated that dispersion is mainly mechanical and that the copper occurs as cations in the lattice of the biotite fraction of the stream sediments. (author). 8 refs., 5 figs., 1 tab

  13. The distribution of copper in stream sediments in an anomalous stream near Steinkopf, Namaqualand

    Energy Technology Data Exchange (ETDEWEB)

    De Bruin, D

    1987-01-01

    Anomalous copper concentrations detected by the regional stream-sediment programme of the Geological Survey was investigated in a stream near Steinkopf, Namaqualand. A follow-up disclosed the presence of malachite mineralization. However, additional stream-sediment samples collected from the 'anomalous' stream revealed an erratic distribution of copper and also that the malachite mineralization had no direct effect on the copper distribution in the stream sediments. Low partial-extraction yields, together with X-ray diffraction analyses, indicated that dispersion is mainly mechanical and that the copper occurs as cations in the lattice of the biotite fraction of the stream sediments. (author). 8 refs., 5 figs., 1 tab.

  14. Verification of the DUCT-III for calculation of high energy neutron streaming

    Energy Technology Data Exchange (ETDEWEB)

    Masukawa, Fumihiro; Nakano, Hideo; Nakashima, Hiroshi; Sasamoto, Nobuo [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Tayama, Ryu-ichi; Handa, Hiroyuki; Hayashi, Katsumi [Hitachi Engineering Co., Ltd., Hitachi, Ibaraki (Japan); Hirayama, Hideo [High Energy Accelerator Research Organization, Tsukuba, Ibaraki (Japan); Shin, Kazuo [Kyoto Univ., Kyoto (Japan)

    2003-03-01

    A large number of radiation streaming calculations under a variety of conditions are required as a part of shielding design for a high energy proton accelerator facility. Since sophisticated methods are very time consuming, simplified methods are employed in many cases. For accuracy evaluation of a simplified code DUCT-III for high energy neutron streaming calculations, two kinds of benchmark problems based on the experiments were analyzed. Through comparison of the DUCT-III calculations with both the measurements and the sophisticated Monte Carlo calculations, DUCT-III was seen reliable enough for applying to the shielding design for the Intense Proton Accelerator Facility. (author)

  15. Verification of the DUCT-III for calculation of high energy neutron streaming

    CERN Document Server

    Masukawa, F; Hayashi, K; Hirayama, H; Nakano, H; Nakashima, H; Sasamoto, N; Shin, K; Tayama, R I

    2003-01-01

    A large number of radiation streaming calculations under a variety of conditions are required as a part of shielding design for a high energy proton accelerator facility. Since sophisticated methods are very time consuming, simplified methods are employed in many cases. For accuracy evaluation of a simplified code DUCT-III for high energy neutron streaming calculations, two kinds of benchmark problems based on the experiments were analyzed. Through comparison of the DUCT-III calculations with both the measurements and the sophisticated Monte Carlo calculations, DUCT-III was seen reliable enough for applying to the shielding design for the Intense Proton Accelerator Facility.

  16. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  17. Re-Meandering of Lowland Streams

    DEFF Research Database (Denmark)

    Pedersen, Morten Lauge; Kristensen, Klaus Kevin; Friberg, Nikolai

    2014-01-01

    We evaluated the restoration of physical habitats and its influence on macroinvertebrate community structure in 18 Danish lowland streams comprising six restored streams, six streams with little physical alteration and six channelized streams. We hypothesized that physical habitats and macroinver...

  18. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  19. Experimental investigation of acoustic streaming in a cylindrical wave guide up to high streaming Reynolds numbers.

    Science.gov (United States)

    Reyt, Ida; Bailliet, Hélène; Valière, Jean-Christophe

    2014-01-01

    Measurements of streaming velocity are performed by means of Laser Doppler Velocimetry and Particle Image Velociimetry in an experimental apparatus consisting of a cylindrical waveguide having one loudspeaker at each end for high intensity sound levels. The case of high nonlinear Reynolds number ReNL is particularly investigated. The variation of axial streaming velocity with respect to the axial and to the transverse coordinates are compared to available Rayleigh streaming theory. As expected, the measured streaming velocity agrees well with the Rayleigh streaming theory for small ReNL but deviates significantly from such predictions for high ReNL. When the nonlinear Reynolds number is increased, the outer centerline axial streaming velocity gets distorted towards the acoustic velocity nodes until counter-rotating additional vortices are generated near the acoustic velocity antinodes. This kind of behavior is followed by outer streaming cells only and measurements in the near wall region show that inner streaming vortices are less affected by this substantial evolution of fast streaming pattern. Measurements of the transient evolution of streaming velocity provide an additional insight into the evolution of fast streaming.

  20. innovation in radioactive waste water-stream management

    International Nuclear Information System (INIS)

    Shaaban, D.A.E.F.

    2010-01-01

    treatment of radioactive waste dtreams is receiving considereble attention in most countries. the present work is for the radioactive wastewater stream management, by volume reduction by a mutual heating and humidificaction of a compressed dry air introduced through the wastewater. in the present work, a mathematical model describing the volume reduction by at the optimum operating condition is determined. a set of coupled first order differential equations, obtained through the mass and energy conservations laws, are used to obtain the humidity ratio, water diffused to the air stream, water temperature, and humid air stream temperature distributions through the bubbling column. these coupled differential equations are simulataneously solved numerically by the developed computer program using fourth order rung-kutta method. the results obtained, according to the present mathematical model, revealed that the air bubble state variables such as mass transfer coefficient (K G ) and interfacial area (a) have a strong effect on the process. therefore, the behavior of the air bubble state variables with coulmn height can be predicted and optimized. moreover, the design curves of the volumetric reduction of the wastewater streams are obtained and assessed at the different operating conditions. an experimental setup was constructed to verify the suggested model. comperhensive comparison between suggested model results, recent experimental measurements and the results of previous work was carried out

  1. Design and development of a highly sensitive, field portable plasma source instrument for on-line liquid stream monitoring and real-time sample analysis

    International Nuclear Information System (INIS)

    Duan, Yixiang; Su, Yongxuan; Jin, Zhe; Abeln, Stephen P.

    2000-01-01

    The development of a highly sensitive, field portable, low-powered instrument for on-site, real-time liquid waste stream monitoring is described in this article. A series of factors such as system sensitivity and portability, plasma source, sample introduction, desolvation system, power supply, and the instrument configuration, were carefully considered in the design of the portable instrument. A newly designed, miniature, modified microwave plasma source was selected as the emission source for spectroscopy measurement, and an integrated small spectrometer with a charge-coupled device detector was installed for signal processing and detection. An innovative beam collection system with optical fibers was designed and used for emission signal collection. Microwave plasma can be sustained with various gases at relatively low power, and it possesses high detection capabilities for both metal and nonmetal pollutants, making it desirable to use for on-site, real-time, liquid waste stream monitoring. An effective in situ sampling system was coupled with a high efficiency desolvation device for direct-sampling liquid samples into the plasma. A portable computer control system is used for data processing. The new, integrated instrument can be easily used for on-site, real-time monitoring in the field. The system possesses a series of advantages, including high sensitivity for metal and nonmetal elements; in situ sampling; compact structure; low cost; and ease of operation and handling. These advantages will significantly overcome the limitations of previous monitoring techniques and make great contributions to environmental restoration and monitoring. (c)

  2. A Statistical Method to Predict Flow Permanence in Dryland Streams from Time Series of Stream Temperature

    Directory of Open Access Journals (Sweden)

    Ivan Arismendi

    2017-12-01

    Full Text Available Intermittent and ephemeral streams represent more than half of the length of the global river network. Dryland freshwater ecosystems are especially vulnerable to changes in human-related water uses as well as shifts in terrestrial climates. Yet, the description and quantification of patterns of flow permanence in these systems is challenging mostly due to difficulties in instrumentation. Here, we took advantage of existing stream temperature datasets in dryland streams in the northwest Great Basin desert, USA, to extract critical information on climate-sensitive patterns of flow permanence. We used a signal detection technique, Hidden Markov Models (HMMs, to extract information from daily time series of stream temperature to diagnose patterns of stream drying. Specifically, we applied HMMs to time series of daily standard deviation (SD of stream temperature (i.e., dry stream channels typically display highly variable daily temperature records compared to wet stream channels between April and August (2015–2016. We used information from paired stream and air temperature data loggers as well as co-located stream temperature data loggers with electrical resistors as confirmatory sources of the timing of stream drying. We expanded our approach to an entire stream network to illustrate the utility of the method to detect patterns of flow permanence over a broader spatial extent. We successfully identified and separated signals characteristic of wet and dry stream conditions and their shifts over time. Most of our study sites within the entire stream network exhibited a single state over the entire season (80%, but a portion of them showed one or more shifts among states (17%. We provide recommendations to use this approach based on a series of simple steps. Our findings illustrate a successful method that can be used to rigorously quantify flow permanence regimes in streams using existing records of stream temperature.

  3. A statistical method to predict flow permanence in dryland streams from time series of stream temperature

    Science.gov (United States)

    Arismendi, Ivan; Dunham, Jason B.; Heck, Michael; Schultz, Luke; Hockman-Wert, David

    2017-01-01

    Intermittent and ephemeral streams represent more than half of the length of the global river network. Dryland freshwater ecosystems are especially vulnerable to changes in human-related water uses as well as shifts in terrestrial climates. Yet, the description and quantification of patterns of flow permanence in these systems is challenging mostly due to difficulties in instrumentation. Here, we took advantage of existing stream temperature datasets in dryland streams in the northwest Great Basin desert, USA, to extract critical information on climate-sensitive patterns of flow permanence. We used a signal detection technique, Hidden Markov Models (HMMs), to extract information from daily time series of stream temperature to diagnose patterns of stream drying. Specifically, we applied HMMs to time series of daily standard deviation (SD) of stream temperature (i.e., dry stream channels typically display highly variable daily temperature records compared to wet stream channels) between April and August (2015–2016). We used information from paired stream and air temperature data loggers as well as co-located stream temperature data loggers with electrical resistors as confirmatory sources of the timing of stream drying. We expanded our approach to an entire stream network to illustrate the utility of the method to detect patterns of flow permanence over a broader spatial extent. We successfully identified and separated signals characteristic of wet and dry stream conditions and their shifts over time. Most of our study sites within the entire stream network exhibited a single state over the entire season (80%), but a portion of them showed one or more shifts among states (17%). We provide recommendations to use this approach based on a series of simple steps. Our findings illustrate a successful method that can be used to rigorously quantify flow permanence regimes in streams using existing records of stream temperature.

  4. Developing a national stream morphology data exchange: Needs, challenges, and opportunities

    Science.gov (United States)

    Collins, Mathias J.; Gray, John R.; Peppler, Marie C.; Fitzpatrick, Faith A.; Schubauer-Berigan, Joseph P.

    2012-05-01

    Stream morphology data, primarily consisting of channel and foodplain geometry and bed material size measurements, historically have had a wide range of applications and uses including culvert/ bridge design, rainfall- runoff modeling, food inundation mapping (e.g., U.S. Federal Emergency Management Agency food insurance studies), climate change studies, channel stability/sediment source investigations, navigation studies, habitat assessments, and landscape change research. The need for stream morphology data in the United States, and thus the quantity of data collected, has grown substantially over the past 2 decades because of the expanded interests of resource management agencies in watershed management and restoration. The quantity of stream morphology data collected has also increased because of state-of-the-art technologies capable of rapidly collecting high-resolution data over large areas with heretofore unprecedented precision. Despite increasing needs for and the expanding quantity of stream morphology data, neither common reporting standards nor a central data archive exist for storing and serving these often large and spatially complex data sets. We are proposing an open- access data exchange for archiving and disseminating stream morphology data.

  5. StreamQRE: Modular Specification and Efficient Evaluation of Quantitative Queries over Streaming Data.

    Science.gov (United States)

    Mamouras, Konstantinos; Raghothaman, Mukund; Alur, Rajeev; Ives, Zachary G; Khanna, Sanjeev

    2017-06-01

    Real-time decision making in emerging IoT applications typically relies on computing quantitative summaries of large data streams in an efficient and incremental manner. To simplify the task of programming the desired logic, we propose StreamQRE, which provides natural and high-level constructs for processing streaming data. Our language has a novel integration of linguistic constructs from two distinct programming paradigms: streaming extensions of relational query languages and quantitative extensions of regular expressions. The former allows the programmer to employ relational constructs to partition the input data by keys and to integrate data streams from different sources, while the latter can be used to exploit the logical hierarchy in the input stream for modular specifications. We first present the core language with a small set of combinators, formal semantics, and a decidable type system. We then show how to express a number of common patterns with illustrative examples. Our compilation algorithm translates the high-level query into a streaming algorithm with precise complexity bounds on per-item processing time and total memory footprint. We also show how to integrate approximation algorithms into our framework. We report on an implementation in Java, and evaluate it with respect to existing high-performance engines for processing streaming data. Our experimental evaluation shows that (1) StreamQRE allows more natural and succinct specification of queries compared to existing frameworks, (2) the throughput of our implementation is higher than comparable systems (for example, two-to-four times greater than RxJava), and (3) the approximation algorithms supported by our implementation can lead to substantial memory savings.

  6. Integral cryptanalysis

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Wagner, David

    2002-01-01

    This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only.......This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only....

  7. Productivity of Stream Definitions

    NARCIS (Netherlands)

    Endrullis, Jörg; Grabmayer, Clemens; Hendriks, Dimitri; Isihara, Ariya; Klop, Jan

    2007-01-01

    We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called ‘productive’ if it can be evaluated continuously in such a way that a uniquely determined stream is obtained as the limit. Whereas productivity is undecidable

  8. Productivity of stream definitions

    NARCIS (Netherlands)

    Endrullis, J.; Grabmayer, C.A.; Hendriks, D.; Isihara, A.; Klop, J.W.

    2008-01-01

    We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called ‘productive’ if it can be evaluated continually in such a way that a uniquely determined stream in constructor normal form is obtained as the limit. Whereas

  9. Streams and their future inhabitants

    DEFF Research Database (Denmark)

    Sand-Jensen, K.; Friberg, Nikolai

    2006-01-01

    In this fi nal chapter we look ahead and address four questions: How do we improve stream management? What are the likely developments in the biological quality of streams? In which areas is knowledge on stream ecology insuffi cient? What can streams offer children of today and adults of tomorrow?...

  10. HYLIFE-II reactor chamber mechanical design

    International Nuclear Information System (INIS)

    House, P.A.

    1992-01-01

    Mechanical design features of the reactor chamber for the HYLIFE-11 inertial confinement fusion power plant are presented. A combination of oscillating and steady, molten salt streams are used for shielding and blast protection. The system is designed for an 8 Hz repetition rate. Beam path clearing, between shots, is accomplished with the oscillating flow. The mechanism for generating the oscillating streams is described. A design configuration of the vessel wall allows adequate cooling and provides extra shielding to reduce thermal stresses to tolerable levels. The bottom portion of the reactor chamber is designed to minimize splash back of the high velocity (20 m/s) salt streams and also recover up to half of the dynamic head

  11. Salamander occupancy in headwater stream networks

    Science.gov (United States)

    Grant, E.H.C.; Green, L.E.; Lowe, W.H.

    2009-01-01

    1. Stream ecosystems exhibit a highly consistent dendritic geometry in which linear habitat units intersect to create a hierarchical network of connected branches. 2. Ecological and life history traits of species living in streams, such as the potential for overland movement, may interact with this architecture to shape patterns of occupancy and response to disturbance. Specifically, large-scale habitat alteration that fragments stream networks and reduces connectivity may reduce the probability a stream is occupied by sensitive species, such as stream salamanders. 3. We collected habitat occupancy data on four species of stream salamanders in first-order (i.e. headwater) streams in undeveloped and urbanised regions of the eastern U.S.A. We then used an information-theoretic approach to test alternative models of salamander occupancy based on a priori predictions of the effects of network configuration, region and salamander life history. 4. Across all four species, we found that streams connected to other first-order streams had higher occupancy than those flowing directly into larger streams and rivers. For three of the four species, occupancy was lower in the urbanised region than in the undeveloped region. 5. These results demonstrate that the spatial configuration of stream networks within protected areas affects the occurrences of stream salamander species. We strongly encourage preservation of network connections between first-order streams in conservation planning and management decisions that may affect stream species.

  12. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  13. Design, Implementation and Evaluation of Congestion Control Mechanism for Video Streaming

    OpenAIRE

    Hiroshi Noborio; Hiroyuki Hisamatsu; Hiroki Oda

    2011-01-01

    In recent years, video streaming services over TCP, such as YouTube, have become more and more popular. TCP NewReno, the current TCP standard, performs greedy congestion control, which increases the congestion window size until packet loss occurs. Therefore, because TCP transmits data at a much higher rate than the video playback rate, the probability of packet loss in the network increases, which in turn takes bandwidth from other network traffic. In this paper, we propose a new transport-la...

  14. Stream hydraulics and temperature determine the metabolism of geothermal Icelandic streams

    Directory of Open Access Journals (Sweden)

    Demars B. O.L.

    2011-07-01

    Full Text Available Stream ecosystem metabolism plays a critical role in planetary biogeochemical cycling. Stream benthic habitat complexity and the available surface area for microbes relative to the free-flowing water volume are thought to be important determinants of ecosystem metabolism. Unfortunately, the engineered deepening and straightening of streams for drainage purposes could compromise stream natural services. Stream channel complexity may be quantitatively expressed with hydraulic parameters such as water transient storage, storage residence time, and water spiralling length. The temperature dependence of whole stream ecosystem respiration (ER, gross primary productivity (GPP and net ecosystem production (NEP = GPP − ER has recently been evaluated with a “natural experiment” in Icelandic geothermal streams along a 5–25 °C temperature gradient. There remained, however, a substantial amount of unexplained variability in the statistical models, which may be explained by hydraulic parameters found to be unrelated to temperature. We also specifically tested the additional and predicted synergistic effects of water transient storage and temperature on ER, using novel, more accurate, methods. Both ER and GPP were highly related to water transient storage (or water spiralling length but not to the storage residence time. While there was an additional effect of water transient storage and temperature on ER (r2 = 0.57; P = 0.015, GPP was more related to water transient storage than temperature. The predicted synergistic effect could not be confirmed, most likely due to data limitation. Our interpretation, based on causal statistical modelling, is that the metabolic balance of streams (NEP was primarily determined by the temperature dependence of respiration. Further field and experimental work is required to test the predicted synergistic effect on ER. Meanwhile, since higher metabolic activities allow for higher pollutant degradation or uptake

  15. A novel chaotic block cryptosystem based on iterating map with output-feedback

    International Nuclear Information System (INIS)

    Yang Degang; Liao Xiaofeng; Wang Yong; Yang Huaqian; Wei Pengcheng

    2009-01-01

    A novel method for encryption based on iterating map with output-feedback is presented in this paper. The output-feedback, instead of simply mixing the chaotic signal of the proposed chaotic cryptosystem with the cipher-text, is relating to previous cipher-text that is obtained through the plaintext and key. Some simulated experiments are performed to substantiate that our method can make cipher-text more confusion and diffusion and that the proposed method is practical whenever efficiency, cipher-text length or security is concerned.

  16. Morphodynamic effects of riparian vegetation growth after stream restoration

    NARCIS (Netherlands)

    Vargas-Luna, Andrés; Crosato, Alessandra; Anders, Niels; Hoitink, Antonius J.F.; Keesstra, Saskia D.; Uijttewaal, Wim S.J.

    2018-01-01

    The prediction of the morphological evolution of renaturalized streams is important for the success of restoration projects. Riparian vegetation is a key component of the riverine landscape and is therefore essential for the natural rehabilitation of rivers. This complicates the design of

  17. Nitrogen saturation in stream ecosystems.

    Science.gov (United States)

    Earl, Stevan R; Valett, H Maurice; Webster, Jackson R

    2006-12-01

    The concept of nitrogen (N) saturation has organized the assessment of N loading in terrestrial ecosystems. Here we extend the concept to lotic ecosystems by coupling Michaelis-Menten kinetics and nutrient spiraling. We propose a series of saturation response types, which may be used to characterize the proximity of streams to N saturation. We conducted a series of short-term N releases using a tracer (15NO3-N) to measure uptake. Experiments were conducted in streams spanning a gradient of background N concentration. Uptake increased in four of six streams as NO3-N was incrementally elevated, indicating that these streams were not saturated. Uptake generally corresponded to Michaelis-Menten kinetics but deviated from the model in two streams where some other growth-critical factor may have been limiting. Proximity to saturation was correlated to background N concentration but was better predicted by the ratio of dissolved inorganic N (DIN) to soluble reactive phosphorus (SRP), suggesting phosphorus limitation in several high-N streams. Uptake velocity, a reflection of uptake efficiency, declined nonlinearly with increasing N amendment in all streams. At the same time, uptake velocity was highest in the low-N streams. Our conceptual model of N transport, uptake, and uptake efficiency suggests that, while streams may be active sites of N uptake on the landscape, N saturation contributes to nonlinear changes in stream N dynamics that correspond to decreased uptake efficiency.

  18. Video Streaming for Creative Writing at International Elementary School

    Directory of Open Access Journals (Sweden)

    Deni Darmawan

    2013-02-01

    Full Text Available This study aims at overcoming difficulty in learning language, both in Indonesian Language and English at international elementary school, especially in creative writing. Creative writing as part of human activity is creativity with language medium as prose (narrative, description, poem (old, new and modern, as well as drama (dialogue, role play, and sosio drama. Specific target to be achieved is the design of Video Streaming for all kinds of creative writing in the language of Indonesian and English. This investigation is a continuation of the previos investigation that has managed to make a video leaning in English for Math and Science as integrated learning to early class at international elementary school. The method used follow the principles of developmental reasearch. The firts stage is script writing video streaming through brainstorming with teachers, lecturers, teams of investigators Indonesia (UPI and Malaysia (USM. The second stage manuscript, making finalization Video Streaming, make the Web, media experts and creative writing material team investigators. The third stage, testing the Video Streaming, Web and dissemination of results into all the international elementary school in Indonesia and Malaysia.

  19. Hardware Trojan Side-Channels based on Physical Unclonable Functions

    NARCIS (Netherlands)

    Gong, Z.; Makkes, M.X.; Ardagna, C.A.; Zhou, J.

    2011-01-01

    The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is

  20. Flood effects on an Alaskan stream restoration project: the value of long-term monitoring

    Science.gov (United States)

    Densmore, Roseann V.; Karle, Kenneth F.

    2009-01-01

    On a nationwide basis, few stream restoration projects have long-term programs in place to monitor the effects of floods on channel and floodplain configuration and floodplain vegetation, but long-term and event-based monitoring is required to measure the effects of these stochastic events and to use the knowledge for adaptive management and the design of future projects. This paper describes a long-term monitoring effort (15 years) on a stream restoration project in Glen Creek in Denali National Park and Preserve in Alaska. The stream channel and floodplain of Glen Creek had been severely degraded over a period of 80 years by placer mining for gold, which left many reaches with unstable and incised streambeds without functioning vegetated floodplains. The objectives of the original project, initiated in 1991, were to develop and test methods for the hydraulic design of channel and floodplain morphology and for floodplain stabilization and riparian habitat recovery, and to conduct research and monitoring to provide information for future projects in similar degraded watersheds. Monitoring methods included surveyed stream cross-sections, vegetation plots, and aerial, ground, and satellite photos. In this paper we address the immediate and outlying effects of a 25-year flood on the stream and floodplain geometry and riparian vegetation. The long-term monitoring revealed that significant channel widening occurred following the flood, likely caused by excessive upstream sediment loading and the fairly slow development of floodplain vegetation in this climate. Our results illustrated design flaws, particularly in regard to identification and analysis of sediment sources and the dominant processes of channel adjustment.

  1. Percent Forest Adjacent to Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  2. Percent Agriculture Adjacent to Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  3. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  4. Connectivity and conditional models of access and abundance of species in stream networks.

    Science.gov (United States)

    Chelgren, Nathan D; Dunham, Jason B

    2015-07-01

    Barriers to passage of aquatic organisms at stream road crossings are a major cause of habitat fragmentation in stream networks. Accordingly, large investments have been made to restore passage at these crossings, but often without estimation of population-level benefits. Here, we describe a broad-scale approach to quantifying the effectiveness of passage restoration in terms interpretable at population levels, namely numbers of fish and length of stream gained through restoration, by sampling abundance in a study design that accounts for variable biogeographic species pools, variable stream and barrier configurations, and variable probabilities of capture and detectability for multiple species. We modified an existing zero-inflated negative-binomial model to estimate the probability of site access, abundance conditional on access, and capture probability of individual fish. Therein, we modeled probability of access as a function of gradient, stream road-crossing type, and downstream access by fish simultaneously with a predictive model for abundance at sites accessible to fish. Results indicated that replacement of barriers with new crossing designs intended to allow for greater movement was associated with dramatically higher probability of access for all fishes, including migratory Pacific salmon, trout, sculpin, and lamprey. Conversely, existing non-replaced crossings negatively impacted fish distributions. Assuming no downstream constraints on access, we estimated the potential length of stream restored by the program ranged between 7.33 (lamprey) and 15.28 km (small coastal cutthroat and rainbow trout). These contributions represented a fraction of the total length available upstream (187 km) of replaced crossings. When limited ranges of species were considered, the estimated contributions of culvert replacement were reduced (1.65-km range, for longnose dace to 12.31 km for small coastal cutthroat and rainbow trout). Numbers of fish contributed ranged from

  5. Headwater stream temperature: interpreting response after logging, with and without riparian buffers, Washington, USA

    Science.gov (United States)

    Jack E. Janisch; Steven M. Wondzell; William J. Ehinger

    2012-01-01

    We examined stream temperature response to forest harvest in small forested headwater catchments in western Washington, USA over a seven year period (2002-2008). These streams have very low discharge in late summer and many become spatially intermittent. We used a before-after, control-impact (BACl) study design to contrast the effect of clearcut logging with two...

  6. Dynamical modeling of tidal streams

    International Nuclear Information System (INIS)

    Bovy, Jo

    2014-01-01

    I present a new framework for modeling the dynamics of tidal streams. The framework consists of simple models for the initial action-angle distribution of tidal debris, which can be straightforwardly evolved forward in time. Taking advantage of the essentially one-dimensional nature of tidal streams, the transformation to position-velocity coordinates can be linearized and interpolated near a small number of points along the stream, thus allowing for efficient computations of a stream's properties in observable quantities. I illustrate how to calculate the stream's average location (its 'track') in different coordinate systems, how to quickly estimate the dispersion around its track, and how to draw mock stream data. As a generative model, this framework allows one to compute the full probability distribution function and marginalize over or condition it on certain phase-space dimensions as well as convolve it with observational uncertainties. This will be instrumental in proper data analysis of stream data. In addition to providing a computationally efficient practical tool for modeling the dynamics of tidal streams, the action-angle nature of the framework helps elucidate how the observed width of the stream relates to the velocity dispersion or mass of the progenitor, and how the progenitors of 'orphan' streams could be located. The practical usefulness of the proposed framework crucially depends on the ability to calculate action-angle variables for any orbit in any gravitational potential. A novel method for calculating actions, frequencies, and angles in any static potential using a single orbit integration is described in the Appendix.

  7. The idiosyncrasies of streams: local variability mitigates vulnerability of trout to changing conditions

    Science.gov (United States)

    Andrea Watts; Brooke Penaluna; Jason Dunham

    2016-01-01

    Land use and climate change are two key factors with the potential to affect stream conditions and fish habitat. Since the 1950s, Washington and Oregon have required forest practices designed to mitigate the effects of timber harvest on streams and fish. Yet questions remain about the extent to which these practices are effective. Add in the effects of climate change—...

  8. Streaming of Continuous Media for Distance Education Systems

    Science.gov (United States)

    Dashti, Ali; Safar, Maytham

    2007-01-01

    Distance education created new challenges regarding the delivery of large size isochronous continuous streaming media (SM) objects. In this paper, we consider the design of a framework for customized SM presentations, where each presentation consists of a number of SM objects that should be retrieved and displayed to the user in a coherent…

  9. Human impacts to mountain streams

    Science.gov (United States)

    Wohl, Ellen

    2006-09-01

    Mountain streams are here defined as channel networks within mountainous regions of the world. This definition encompasses tremendous diversity of physical and biological conditions, as well as history of land use. Human effects on mountain streams may result from activities undertaken within the stream channel that directly alter channel geometry, the dynamics of water and sediment movement, contaminants in the stream, or aquatic and riparian communities. Examples include channelization, construction of grade-control structures or check dams, removal of beavers, and placer mining. Human effects can also result from activities within the watershed that indirectly affect streams by altering the movement of water, sediment, and contaminants into the channel. Deforestation, cropping, grazing, land drainage, and urbanization are among the land uses that indirectly alter stream processes. An overview of the relative intensity of human impacts to mountain streams is provided by a table summarizing human effects on each of the major mountainous regions with respect to five categories: flow regulation, biotic integrity, water pollution, channel alteration, and land use. This table indicates that very few mountains have streams not at least moderately affected by land use. The least affected mountainous regions are those at very high or very low latitudes, although our scientific ignorance of conditions in low-latitude mountains in particular means that streams in these mountains might be more altered than is widely recognized. Four case studies from northern Sweden (arctic region), Colorado Front Range (semiarid temperate region), Swiss Alps (humid temperate region), and Papua New Guinea (humid tropics) are also used to explore in detail the history and effects on rivers of human activities in mountainous regions. The overview and case studies indicate that mountain streams must be managed with particular attention to upstream/downstream connections, hillslope

  10. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology.

    Science.gov (United States)

    Viswanathan, P; Krishna, P Venkata

    2014-05-01

    Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.

  11. How and Why Does Stream Water Temperature Vary at Small Spatial Scales in a Headwater Stream?

    Science.gov (United States)

    Morgan, J. C.; Gannon, J. P.; Kelleher, C.

    2017-12-01

    The temperature of stream water is controlled by climatic variables, runoff/baseflow generation, and hyporheic exchange. Hydrologic conditions such as gaining/losing reaches and sources of inflow can vary dramatically along a stream on a small spatial scale. In this work, we attempt to discern the extent that the factors of air temperature, groundwater inflow, and precipitation influence stream temperature at small spatial scales along the length of a stream. To address this question, we measured stream temperature along the perennial stream network in a 43 ha catchment with a complex land use history in Cullowhee, NC. Two water temperature sensors were placed along the stream network on opposite sides of the stream at 100-meter intervals and at several locations of interest (i.e. stream junctions). The forty total sensors recorded the temperature every 10 minutes for one month in the spring and one month in the summer. A subset of sampling locations where stream temperature was consistent or varied from one side of the stream to the other were explored with a thermal imaging camera to obtain a more detailed representation of the spatial variation in temperature at those sites. These thermal surveys were compared with descriptions of the contributing area at the sample sites in an effort to discern specific causes of differing flow paths. Preliminary results suggest that on some branches of the stream stormflow has less influence than regular hyporheic exchange, while other tributaries can change dramatically with stormflow conditions. We anticipate this work will lead to a better understanding of temperature patterns in stream water networks. A better understanding of the importance of small-scale differences in flow paths to water temperature may be able to inform watershed management decisions in the future.

  12. CAMS: OLAPing Multidimensional Data Streams Efficiently

    Science.gov (United States)

    Cuzzocrea, Alfredo

    In the context of data stream research, taming the multidimensionality of real-life data streams in order to efficiently support OLAP analysis/mining tasks is a critical challenge. Inspired by this fundamental motivation, in this paper we introduce CAMS (C ube-based A cquisition model for M ultidimensional S treams), a model for efficiently OLAPing multidimensional data streams. CAMS combines a set of data stream processing methodologies, namely (i) the OLAP dimension flattening process, which allows us to obtain dimensionality reduction of multidimensional data streams, and (ii) the OLAP stream aggregation scheme, which aggregates data stream readings according to an OLAP-hierarchy-based membership approach. We complete our analytical contribution by means of experimental assessment and analysis of both the efficiency and the scalability of OLAPing capabilities of CAMS on synthetic multidimensional data streams. Both analytical and experimental results clearly connote CAMS as an enabling component for next-generation Data Stream Management Systems.

  13. Aquatic organism passage at road-stream crossings—synthesis and guidelines for effectiveness monitoring

    Science.gov (United States)

    Hoffman, Robert L.; Dunham, Jason B.; Hansen, Bruce P.

    2012-01-01

    Restoration and maintenance of passage for aquatic organisms at road-stream crossings represents a major management priority, involving an investment of hundreds of millions of dollars (for example, U.S. Government Accounting Office, 2001). In recent years, passage at hundreds of crossings has been restored, primarily by replacing barrier road culverts with bridges or stream simulation culverts designed to pass all species and all life stages of aquatic life and simulate natural hydro-geomorphic processes (U.S. Forest Service, 2008). The current situation has motivated two general questions: 1. Are current design standards for stream simulation culverts adequately re-establishing passage for aquatic biota? and 2. How do we monitor and evaluate effectiveness of passage restoration? To address the latter question, a national workshop was held in March 2010, in Portland, Oregon. The workshop included experts on aquatic organism passage from across the nation (see table of participants, APPENDIX) who addressed four classes of methods for monitoring effectiveness of aquatic organism passage—individual movement, occupancy, demography, and genetics. This report has been written, in part, for field biologists who will be undertaking and evaluating the effectiveness of aquatic organism passage restoration projects at road-stream crossings. The report outlines basic methods for evaluating road-stream crossing passage impairment and restoration and discusses under what circumstances and conditions each method will be useful; what questions each method can potentially answer; how to design and implement an evaluation study; and points out the fundamental reality that most evaluation projects will require special funding and partnerships among researchers and resource managers. The report is organized into the following sections, which can be read independently: 1. Historical context: In this section, we provide a brief history of events leading up to the present situation

  14. Application of the water gas shift reaction to fusion fuel exhaust streams

    International Nuclear Information System (INIS)

    McKay, A.M.; Cheh, C.H.; Glass, R.W.

    1983-10-01

    In a Fusion Fuel Clean Up (FCU) system, impurities will be removed from the fusion reactor exhaust and neutral beam line streams. Tritium in this impurity stream will be recovered and recycled to the fuel stream. In one flowsheet configuration of the Tritium Systems Test Assembly (TSTA), tritium is recovered from a simulated impurity stream via uranium hot metal beds and recycled to an isotope separation system. This study has shown, however, that the catalyzed water gas shift reaction, by which (H,D,T) 2 O and CO are converted to (H,D,T) 2 and CO 2 is a better method of (H,D,T) 2 O reduction than the hot metal beds. Catalytic reactors were designed, built and tested to provide data for the design of a prototype reactor to replace the hot metal beds in the FCU system. The prototype reactor contains only 10 g of catalyst and is expected to last at least 5 years. The reactor is small (1.3 cm OD x 13 cm long), operates at low temperatures (approximately 490 K) and will convert water to hydrogen, at a CO/H 2 O ratio of 1.5, with an efficiency of greater than 98 percent. Results show that the catalytic reactor is very stable even during upset conditions. Wide ranges of flow and a CO/H 2 O ratio variance from 1.3 upward have little effect on the conversion efficiency. Short term high temperature excursions do not affect the catalyst and lower temperatures will simply decrease the reaction rate resulting in lower conversions. The reactor appears to be unaffected by NO 2 , CO 2 , O 2 and N 2 in the feed stream at concentration levels expected in a fusion reactor exhaust stream

  15. Frequency effects on the scale and behavior of acoustic streaming.

    Science.gov (United States)

    Dentry, Michael B; Yeo, Leslie Y; Friend, James R

    2014-01-01

    Acoustic streaming underpins an exciting range of fluid manipulation phenomena of rapidly growing significance in microfluidics, where the streaming often assumes the form of a steady, laminar jet emanating from the device surface, driven by the attenuation of acoustic energy within the beam of sound propagating through the liquid. The frequencies used to drive such phenomena are often chosen ad hoc to accommodate fabrication and material issues. In this work, we seek a better understanding of the effects of sound frequency and power on acoustic streaming. We present and, using surface acoustic waves, experimentally verify a laminar jet model that is based on the turbulent jet model of Lighthill, which is appropriate for acoustic streaming seen at micro- to nanoscales, between 20 and 936 MHz and over a broad range of input power. Our model eliminates the critically problematic acoustic source singularity present in Lighthill's model, replacing it with a finite emission area and enabling determination of the streaming velocity close to the source. At high acoustic power P (and hence high jet Reynolds numbers ReJ associated with fast streaming), the laminar jet model predicts a one-half power dependence (U∼P1/2∼ ReJ) similar to the turbulent jet model. However, the laminar model may also be applied to jets produced at low powers-and hence low jet Reynolds numbers ReJ-where a linear relationship between the beam power and streaming velocity exists: U∼P∼ReJ2. The ability of the laminar jet model to predict the acoustic streaming behavior across a broad range of frequencies and power provides a useful tool in the analysis of microfluidics devices, explaining peculiar observations made by several researchers in the literature. In particular, by elucidating the effects of frequency on the scale of acoustically driven flows, we show that the choice of frequency is a vitally important consideration in the design of small-scale devices employing acoustic streaming

  16. Three-dimensional model of corotating streams in the solar wind 3. Magnetohydrodynamic streams

    International Nuclear Information System (INIS)

    Pizzo, V.J.

    1982-01-01

    The focus of this paper is two-fold: (1) to examine how the presence of the spiral magnetic field affects the evolution of interplanetary corotating solar wind streams, and (2) to ascertain the nature of secondary large-scale phenomena likely to be associated with streams having a pronounced three-dimensional (3-D) structure. The dynamics are presumed to be governed by the nonlinear polytropic, single-fluid, 3-D MHD equations. Solutions are obtained with an explicit, Eulerian, finite differences technique that makes use of a simple form of artificial diffusion for handling shocks. For smooth axisymmetric flows, the picture of magnetically induced meridional motions previously established by linear models requires only minor correction. In the case of broad 3-D streams input near the sun, inclusion of the magnetic field is found to retard the kinematic steepening at the stream front substantially but to produce little deviation from planar flow. For the more realistic case of initially sharply bounded streams, however, it becomes essential to account for magnetic effects in the formulation. Whether a full 3-D treatment is required depends upon the latitudinal geometry of the stream

  17. Maximum error-bounded Piecewise Linear Representation for online stream approximation

    KAUST Repository

    Xie, Qing; Pang, Chaoyi; Zhou, Xiaofang; Zhang, Xiangliang; Deng, Ke

    2014-01-01

    Given a time series data stream, the generation of error-bounded Piecewise Linear Representation (error-bounded PLR) is to construct a number of consecutive line segments to approximate the stream, such that the approximation error does not exceed a prescribed error bound. In this work, we consider the error bound in L∞ norm as approximation criterion, which constrains the approximation error on each corresponding data point, and aim on designing algorithms to generate the minimal number of segments. In the literature, the optimal approximation algorithms are effectively designed based on transformed space other than time-value space, while desirable optimal solutions based on original time domain (i.e., time-value space) are still lacked. In this article, we proposed two linear-time algorithms to construct error-bounded PLR for data stream based on time domain, which are named OptimalPLR and GreedyPLR, respectively. The OptimalPLR is an optimal algorithm that generates minimal number of line segments for the stream approximation, and the GreedyPLR is an alternative solution for the requirements of high efficiency and resource-constrained environment. In order to evaluate the superiority of OptimalPLR, we theoretically analyzed and compared OptimalPLR with the state-of-art optimal solution in transformed space, which also achieves linear complexity. We successfully proved the theoretical equivalence between time-value space and such transformed space, and also discovered the superiority of OptimalPLR on processing efficiency in practice. The extensive results of empirical evaluation support and demonstrate the effectiveness and efficiency of our proposed algorithms.

  18. Maximum error-bounded Piecewise Linear Representation for online stream approximation

    KAUST Repository

    Xie, Qing

    2014-04-04

    Given a time series data stream, the generation of error-bounded Piecewise Linear Representation (error-bounded PLR) is to construct a number of consecutive line segments to approximate the stream, such that the approximation error does not exceed a prescribed error bound. In this work, we consider the error bound in L∞ norm as approximation criterion, which constrains the approximation error on each corresponding data point, and aim on designing algorithms to generate the minimal number of segments. In the literature, the optimal approximation algorithms are effectively designed based on transformed space other than time-value space, while desirable optimal solutions based on original time domain (i.e., time-value space) are still lacked. In this article, we proposed two linear-time algorithms to construct error-bounded PLR for data stream based on time domain, which are named OptimalPLR and GreedyPLR, respectively. The OptimalPLR is an optimal algorithm that generates minimal number of line segments for the stream approximation, and the GreedyPLR is an alternative solution for the requirements of high efficiency and resource-constrained environment. In order to evaluate the superiority of OptimalPLR, we theoretically analyzed and compared OptimalPLR with the state-of-art optimal solution in transformed space, which also achieves linear complexity. We successfully proved the theoretical equivalence between time-value space and such transformed space, and also discovered the superiority of OptimalPLR on processing efficiency in practice. The extensive results of empirical evaluation support and demonstrate the effectiveness and efficiency of our proposed algorithms.

  19. 244-AR vault cooling water stream-specific report

    International Nuclear Information System (INIS)

    1990-08-01

    The proposed wastestream designation for the 244-AR Vault cooling water wastestream is that this stream is not a dangerous waste, pursuant to the Washington (State) Administration Code (WAC) 173-303, Dangerous Waste Regulations. A combination of process knowledge and sampling data was used to make this determination. 21 refs., 6 figs., 7 tabs

  20. Cytoplasmic Streaming in the Drosophila Oocyte.

    Science.gov (United States)

    Quinlan, Margot E

    2016-10-06

    Objects are commonly moved within the cell by either passive diffusion or active directed transport. A third possibility is advection, in which objects within the cytoplasm are moved with the flow of the cytoplasm. Bulk movement of the cytoplasm, or streaming, as required for advection, is more common in large cells than in small cells. For example, streaming is observed in elongated plant cells and the oocytes of several species. In the Drosophila oocyte, two stages of streaming are observed: relatively slow streaming during mid-oogenesis and streaming that is approximately ten times faster during late oogenesis. These flows are implicated in two processes: polarity establishment and mixing. In this review, I discuss the underlying mechanism of streaming, how slow and fast streaming are differentiated, and what we know about the physiological roles of the two types of streaming.

  1. In-stream Physical Heterogeneity, Rainfall Aided Flushing, and Discharge on Stream Water Quality.

    Science.gov (United States)

    Gomes, Pattiyage I A; Wai, Onyx W H

    2015-08-01

    Implications of instream physical heterogeneity, rainfall-aided flushing, and stream discharge on water quality control have been investigated in a headwater stream of a climatic region that has contrasting dry and wet seasons. Dry (low flow) season's physical heterogeneity showed a positive correlation with good water quality. However, in the wet season, physical heterogeneity showed minor or no significance on water quality variations. Furthermore, physical heterogeneity appeared to be more complementary with good water quality subsequent to rainfall events. In many cases stream discharge was a reason for poor water quality. For the dry season, graywater inputs to the stream could be held responsible. In the wet season, it was probably the result of catchment level disturbances (e.g., regulation of ephemeral freshwater paths). Overall, this study revealed the importance of catchment-based approaches on water quality improvement in tandem with in-stream approaches framed on a temporal scale.

  2. Stream II-V5: Revision Of Stream II-V4 To Account For The Effects Of Rainfall Events

    International Nuclear Information System (INIS)

    Chen, K.

    2010-01-01

    STREAM II-V4 is the aqueous transport module currently used by the Savannah River Site emergency response Weather Information Display (WIND) system. The transport model of the Water Quality Analysis Simulation Program (WASP) was used by STREAM II to perform contaminant transport calculations. WASP5 is a US Environmental Protection Agency (EPA) water quality analysis program that simulates contaminant transport and fate through surface water. STREAM II-V4 predicts peak concentration and peak concentration arrival time at downstream locations for releases from the SRS facilities to the Savannah River. The input flows for STREAM II-V4 are derived from the historical flow records measured by the United States Geological Survey (USGS). The stream flow for STREAM II-V4 is fixed and the flow only varies with the month in which the releases are taking place. Therefore, the effects of flow surge due to a severe storm are not accounted for by STREAM II-V4. STREAM II-V4 has been revised to account for the effects of a storm event. The steps used in this method are: (1) generate rainfall hyetographs as a function of total rainfall in inches (or millimeters) and rainfall duration in hours; (2) generate watershed runoff flow based on the rainfall hyetographs from step 1; (3) calculate the variation of stream segment volume (cross section) as a function of flow from step 2; (4) implement the results from steps 2 and 3 into the STREAM II model. The revised model (STREAM II-V5) will find the proper stream inlet flow based on the total rainfall and rainfall duration as input by the user. STREAM II-V5 adjusts the stream segment volumes (cross sections) based on the stream inlet flow. The rainfall based stream flow and the adjusted stream segment volumes are then used for contaminant transport calculations.

  3. Stream Clustering of Growing Objects

    Science.gov (United States)

    Siddiqui, Zaigham Faraz; Spiliopoulou, Myra

    We study incremental clustering of objects that grow and accumulate over time. The objects come from a multi-table stream e.g. streams of Customer and Transaction. As the Transactions stream accumulates, the Customers’ profiles grow. First, we use an incremental propositionalisation to convert the multi-table stream into a single-table stream upon which we apply clustering. For this purpose, we develop an online version of K-Means algorithm that can handle these swelling objects and any new objects that arrive. The algorithm also monitors the quality of the model and performs re-clustering when it deteriorates. We evaluate our method on the PKDD Challenge 1999 dataset.

  4. LHCb trigger streams optimization

    Science.gov (United States)

    Derkach, D.; Kazeev, N.; Neychev, R.; Panin, A.; Trofimov, I.; Ustyuzhanin, A.; Vesterinen, M.

    2017-10-01

    The LHCb experiment stores around 1011 collision events per year. A typical physics analysis deals with a final sample of up to 107 events. Event preselection algorithms (lines) are used for data reduction. Since the data are stored in a format that requires sequential access, the lines are grouped into several output file streams, in order to increase the efficiency of user analysis jobs that read these data. The scheme efficiency heavily depends on the stream composition. By putting similar lines together and balancing the stream sizes it is possible to reduce the overhead. We present a method for finding an optimal stream composition. The method is applied to a part of the LHCb data (Turbo stream) on the stage where it is prepared for user physics analysis. This results in an expected improvement of 15% in the speed of user analysis jobs, and will be applied on data to be recorded in 2017.

  5. Use of the Streaming Matrix Hybrid Method for discrete-ordinates fusion reactor calculations

    International Nuclear Information System (INIS)

    Battat, M.E.; Davidson, J.W.; Dudziak, D.J.; Thayer, G.R.

    1984-01-01

    The use of the discrete-ordinates method for solving two-dimensional, neutral-particle transport in fusion reactor blankets and shields is often limited by inherent inaccuracies due to the ray-effect. This effect presents a particular problem in the case of neutron streaming in the large internal void regions of a fusion reactor. A deterministic streaming technique called the Streaming Matrix Hybrid Method (SMHM) has been incorporated in the two-dimensional discrete-ordinates code TRIDENT-CTR. Calculations have been performed for an actual inertial-confinement fusion (ICF) reactor design using TRIDENT-CTR both with and without the SMHM. Comparisons of the calculated fluxes indicate that substantial mitigation of the ray effect can be achieved with the SMHM. Calculations were performed for the Los Alamos FIRST STEP hybrid ICF reactor designed for tritium production. Conventional 238 U fuel rod assemblies surround the spherical steel target chamber to form an annular cylindrical blanket. An axial fuel region is included to complete the blanket

  6. Pseudo-random bit generator based on lag time series

    Science.gov (United States)

    García-Martínez, M.; Campos-Cantón, E.

    2014-12-01

    In this paper, we present a pseudo-random bit generator (PRBG) based on two lag time series of the logistic map using positive and negative values in the bifurcation parameter. In order to hidden the map used to build the pseudo-random series we have used a delay in the generation of time series. These new series when they are mapped xn against xn+1 present a cloud of points unrelated to the logistic map. Finally, the pseudo-random sequences have been tested with the suite of NIST giving satisfactory results for use in stream ciphers.

  7. Information Security Scheme Based on Computational Temporal Ghost Imaging.

    Science.gov (United States)

    Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing

    2017-08-09

    An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

  8. Propylene/Nitrogen Separation in a By-Stream of the Polypropylene Production: From Pilot Test and Model Validation to Industrial Scale Process Design and Optimization

    OpenAIRE

    Guler Narin; Ana Ribeiro; Alexandre Ferreira; Young Hwang; U-Hwang Lee; José Loureiro; Jong-San Chang; Alírio Rodrigues

    2014-01-01

    Two industrial-scale pressure swing adsorption (PSA) processes were designed and optimized by simulations: recovery of only nitrogen and recovery of both nitrogen and propylene from a polypropylene manufacture purge gas stream. MIL-100(Fe) granulates were used as adsorbent. The mathematical model employed in the simulations was verified by a PSA experiment. The effect of several operating parameters on the performance of the proposed PSA processes was investigated. For the nitrogen recovery, ...

  9. The ventral stream offers more affordance and the dorsal stream more memory than believed

    NARCIS (Netherlands)

    Postma, Albert; van der Lubbe, Robert Henricus Johannes; Zuidhoek, Sander

    2002-01-01

    Opposed to Norman's proposal, processing of affordance is likely to occur not solely in the dorsal stream but also in the ventral stream. Moreover, the dorsal stream might do more than just serve an important role in motor actions. It supports egocentric location coding as well. As such, it would

  10. The long term response of stream flow to climatic warming in headwater streams of interior Alaska

    Science.gov (United States)

    Jeremy B. Jones; Amanda J. Rinehart

    2010-01-01

    Warming in the boreal forest of interior Alaska will have fundamental impacts on stream ecosystems through changes in stream hydrology resulting from upslope loss of permafrost, alteration of availability of soil moisture, and the distribution of vegetation. We examined stream flow in three headwater streams of the Caribou-Poker Creeks Research Watershed (CPCRW) in...

  11. The Stream-Catchment (StreamCat) Dataset: A database of watershed metrics for the conterminous USA

    Science.gov (United States)

    We developed an extensive database of landscape metrics for ~2.65 million streams, and their associated catchments, within the conterminous USA: The Stream-Catchment (StreamCat) Dataset. These data are publically available and greatly reduce the specialized geospatial expertise n...

  12. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  13. Leaf litter processing in West Virginia mountain streams: effects of temperature and stream chemistry

    Science.gov (United States)

    Jacquelyn M. Rowe; William B. Perry; Sue A. Perry

    1996-01-01

    Climate change has the potential to alter detrital processing in headwater streams, which receive the majority of their nutrient input as terrestrial leaf litter. Early placement of experimental leaf packs in streams, one month prior to most abscission, was used as an experimental manipulation to increase stream temperature during leaf pack breakdown. We studied leaf...

  14. Three-Dimensional Numerical Modelling of Flow and Sediment Transport for Field Scale Application of Stream Barbs at Sawmill Creek, Ottawa

    Science.gov (United States)

    Jamieson, E. C.; Rennie, C. D.; Townsend, R. D.

    2009-05-01

    Stream barbs (a type of submerged groyne or spur dike) are low-profile linear rock structures that prevent the erosion of stream banks by redirecting high velocity flow away from the bank. Stream barbs are becoming a popular method for stream bank protection as they can be built at a relatively low cost and provide added ecological benefit. The design and construction of stream barbs in Sawmill Creek, a small urban stream in the city of Ottawa, Canada, will serve as a demonstration project for the use of barbs as a bank stabilization technique that will contribute to the rehabilitation of urban creeks while reducing erosion threats to property and infrastructure. As well as providing bank protection, these structures promote vegetated stream banks, create resting pools and scour holes for fish habitat, and increase bio-diversity for aquatic species. Despite these benefits, stream barbs are not a common means of stream bank protection in Canada, due largely to a lack of suitable design guidelines. The overall goal of stream habitat restoration in incising channel systems should be to accelerate natural processes of channel equilibrium recovery, riparian re-vegetation, and stream-floodplain interaction. Incorporating stream barbs, instead of traditional bank protection measures, attempts to achieve these goals. A three-dimensional numerical model: 'Simulation in Intakes with Multiblock option' (SSIIM), was used to model the effects of placing a series of stream barbs along an unstable section of Sawmill Creek. The average bankfull depth, width, and discharge of the creek are 1.2 m, 7.5 m, and 9 m3/s respectively. The model was used to assess various design alternatives for a series of seven stream barbs at two consecutive channel bends requiring stabilization measures along their outer banks. Design criteria were principally based on the reduction of velocity, shear stress and subsequent erosion at the outside bank of each bend, and on the relocation of a new thalweg

  15. Stream invertebrate productivity linked to forest subsidies: 37 stream-years of reference and experimental data.

    Science.gov (United States)

    Wallace, J Bruce; Eggert, Susan L; Meyer, Judy L; Webster, Jackson R

    2015-05-01

    Riparian habitats provide detrital subsidies of varying quantities and qualities to recipient ecosystems. We used long-term data from three reference streams (covering 24 stream-years) and 13-year whole-stream organic matter manipulations to investigate the influence of terrestrial detrital quantity and quality on benthic invertebrate community structure, abundance, biomass, and secondary production in rockface (RF) and mixed substrates (MS) of forested headwater streams. Using a mesh canopy covering the entire treatment stream, we examined effects of litter ex'clusion, small- and large-wood removal, and addition of artificial wood (PVC) and leaves of varying quality on organic matter standing crops and invertebrate community structure and function. We assessed differences in functional feeding group distribution between substrate types as influenced by organic matter manipulations and long-term patterns of predator and prey production in manipulated vs. reference years. Particulate organic matter standing crops in MS of the treatment stream declined drastically with each successive year of litter exclusion, approaching zero after three years. Monthly invertebrate biomass and annual secondary production was positively related to benthic organic matter in the MS habitats. Rockface habitats exhibited fewer changes than MS habitats across all organic matter manipulations. With leaf addition, the patterns of functional group distribution among MS and RF habitats returned to patterns seen in reference streams. Secondary production per unit organic matter standing crop was greatest for the leaf addition period, followed by the reference streams, and significantly less for the litter exclusion and wood removal periods. These data indicate that the limited organic matter remaining in the stream following litter exclusion and wood removal was more refractory than that in the reference streams, whereas the added leaf material was more labile and readily converted into

  16. New Splitting Criteria for Decision Trees in Stationary Data Streams.

    Science.gov (United States)

    Jaworski, Maciej; Duda, Piotr; Rutkowski, Leszek; Jaworski, Maciej; Duda, Piotr; Rutkowski, Leszek; Rutkowski, Leszek; Duda, Piotr; Jaworski, Maciej

    2018-06-01

    The most popular tools for stream data mining are based on decision trees. In previous 15 years, all designed methods, headed by the very fast decision tree algorithm, relayed on Hoeffding's inequality and hundreds of researchers followed this scheme. Recently, we have demonstrated that although the Hoeffding decision trees are an effective tool for dealing with stream data, they are a purely heuristic procedure; for example, classical decision trees such as ID3 or CART cannot be adopted to data stream mining using Hoeffding's inequality. Therefore, there is an urgent need to develop new algorithms, which are both mathematically justified and characterized by good performance. In this paper, we address this problem by developing a family of new splitting criteria for classification in stationary data streams and investigating their probabilistic properties. The new criteria, derived using appropriate statistical tools, are based on the misclassification error and the Gini index impurity measures. The general division of splitting criteria into two types is proposed. Attributes chosen based on type- splitting criteria guarantee, with high probability, the highest expected value of split measure. Type- criteria ensure that the chosen attribute is the same, with high probability, as it would be chosen based on the whole infinite data stream. Moreover, in this paper, two hybrid splitting criteria are proposed, which are the combinations of single criteria based on the misclassification error and Gini index.

  17. Fast acoustic streaming in standing waves: generation of an additional outer streaming cell.

    Science.gov (United States)

    Reyt, Ida; Daru, Virginie; Bailliet, Hélène; Moreau, Solène; Valière, Jean-Christophe; Baltean-Carlès, Diana; Weisman, Catherine

    2013-09-01

    Rayleigh streaming in a cylindrical acoustic standing waveguide is studied both experimentally and numerically for nonlinear Reynolds numbers from 1 to 30 [Re(NL)=(U0/c0)(2)(R/δν)(2), with U0 the acoustic velocity amplitude at the velocity antinode, c0 the speed of sound, R the tube radius, and δν the acoustic boundary layer thickness]. Streaming velocity is measured by means of laser Doppler velocimetry in a cylindrical resonator filled with air at atmospheric pressure at high intensity sound levels. The compressible Navier-Stokes equations are solved numerically with high resolution finite difference schemes. The resonator is excited by shaking it along the axis at imposed frequency. Results of measurements and of numerical calculation are compared with results given in the literature and with each other. As expected, the axial streaming velocity measured and calculated agrees reasonably well with the slow streaming theory for small ReNL but deviates significantly from such predictions for fast streaming (ReNL>1). Both experimental and numerical results show that when ReNL is increased, the center of the outer streaming cells are pushed toward the acoustic velocity nodes until counter-rotating additional vortices are generated near the acoustic velocity antinodes.

  18. Effects of Concrete Channels on Stream Biogeochemistry, Maryland Coastal Plain

    Science.gov (United States)

    Prestegaard, K. L.; Gilbert, L.; Phemister, K.

    2005-05-01

    In the 1950's and 60's, extensive networks of cement-lined channels were built in suburban watersheds near Washington, D.C. to convey storm water to downstream locations. These cement-lined stream channels limit interactions between surface and groundwater and they provide sources of alkalinity in Maryland Coastal Plain watersheds that normally have low alkalinity. This project was designed to 1) compare base flow water chemistry in headwater reaches of urban and non-urban streams, and 2) to evaluate downstream changes in water chemistry in channelized urban streams in comparison with non-urban reference streams. During a drought year, headwater streams in both urban and non-urban sites had significant concentrations of Fe(II) that were discharged from groundwater sources and rapidly oxidized by iron-oxidizing bacteria. During a wet year, the concentrations of Fe(II) were higher in headwater urban streams than in the non-urban streams. This suggests that impervious surfaces in headwater urban watersheds prevent the recharge of oxygen-rich waters during storm events, which maintains iron-rich groundwater discharge to the stream. Downstream changes in water chemistry are prominent in cement-lined urban channels because they are associated with distinctive microbial communities. The headwater zones of channelized streams are dominated by iron-ozidizing bacteria, that are replaced downstream by manganese-oxidizing zones, and replaced further downstream by biofilms dominated by photosynthesizing cyanobacteria. The reaches dominated by cyanobacteria exhibit diurnal changes in pH due to uptake of CO2 for photosynthesis. Diurnal changes range from 7.5 to 8.8 in the summer months to 7.0 to 7.5 in the cooler months, indicating both the impact of photosynthesis and the additional source of alkalinity provided by concrete. The dissolved oxygen, pH, and other characteristics of tributaries dominated by cyanobacteria are similar to the water chemistry characteristics observed in

  19. MEKANISME SEGMENTASI LAJU BIT PADA DYNAMIC ADAPTIVE STREAMING OVER HTTP (DASH UNTUK APLIKASI VIDEO STREAMING

    Directory of Open Access Journals (Sweden)

    Muhammad Audy Bazly

    2015-12-01

    Full Text Available This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP. DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These packages are assembled into packets in a streaming media format Presentation Description (MPD or known as MPEG-DASH. Streaming video format MPEG-DASH run on a platform with the player bitdash teritegrasi bitcoin. With this scheme, the video will have several variants of the bit rates that gave rise to the concept of scalability of streaming video services on the client side. The main target of the mechanism is smooth the MPEG-DASH streaming video display on the client. The simulation results show that the scheme based scalable video streaming MPEG- DASH able to improve the quality of image display on the client side, where the procedure bufering videos can be made constant and fine for the duration of video views

  20. Progressive Conversion from B-rep to BSP for Streaming Geometric Modeling.

    Science.gov (United States)

    Bajaj, Chandrajit; Paoluzzi, Alberto; Scorzelli, Giorgio

    2006-01-01

    We introduce a novel progressive approach to generate a Binary Space Partition (BSP) tree and a convex cell decomposition for any input triangles boundary representation (B-rep), by utilizing a fast calculation of the surface inertia. We also generate a solid model at progressive levels of detail. This approach relies on a variation of standard BSP tree generation, allowing for labeling cells as in, out and fuzzy, and which permits a comprehensive representation of a solid as the Hasse diagram of a cell complex. Our new algorithm is embedded in a streaming computational framework, using four types of dataflow processes that continuously produce, transform, combine or consume subsets of cells depending on their number or input/output stream. A varied collection of geometric modeling techniques are integrated in this streaming framework, including polygonal, spline, solid and heterogeneous modeling with boundary and decompositive representations, Boolean set operations, Cartesian products and adaptive refinement. The real-time B-rep to BSP streaming results we report in this paper are a large step forward in the ultimate unification of rapid conceptual and detailed shape design methodologies.

  1. HYLIFE-II reactor chamber design refinements

    International Nuclear Information System (INIS)

    House, P.A.

    1994-06-01

    Mechanical design features of the reactor chamber for the HYLIFE-II inertial confinement fusion power plant are presented. A combination of oscillating and steady, molten salt streams (Li 2 BeF 4 ) are used for shielding and blast protection of the chamber walls. The system is designed for a 6 Hz repetition rate. Beam path clearing, between shots, is accomplished with the oscillating flow. The mechanism for generating the oscillating streams is described. A design configuration of the vessel wall allows adequate cooling and provides extra shielding to reduce thermal stresses to tolerable levels. The bottom portion of the reactor chamber is designed to minimize splash back of the high velocity (>12 m/s) salt streams and also recover up to half of the dynamic head. Cost estimates for a 1 GWe and 2 GWe reactor chamber are presented

  2. The development of stream temperature model in a mountainous river of Taiwan.

    Science.gov (United States)

    Tung, Ching-Pin; Lee, Tsung-Yu; Huang, Jr-Chuang; Perng, Po-Wen; Kao, Shih-Ji; Liao, Lin-Yen

    2014-11-01

    Formosan landlocked salmon is an endangered species and is very sensitive to stream temperature change. This study attempts to improve a former stream temperature model (STM) which was developed for the salmon's habitat to simulate stream temperature more realistically. Two modules, solar radiation modification (SRM) and surface/subsurface runoff mixing (RM), were incorporated to overcome the limitation of STM designed only for clear-sky conditions. It was found that daily temperature difference is related to cloud cover and can be used to adjust the effects of cloud cover on incident solar radiation to the ground level. The modified model (STM + SRM) improved the simulation during a baseflow period in both winter and summer with the Nash-Sutcliffe efficiency coefficient improved from 0.37 (by STM only) to 0.71 for the winter and from -0.18 to 0.70 for the summer. On the days with surface/subsurface runoff, the incorporation of the two new modules together (STM + SRM + RM) improved the Nash-Sutcliffe efficiency coefficient from 0.00 to 0.65 and from 0.29 to 0.83 in the winter and the summer, respectively. Meanwhile, the contributions of major thermal sources to stream temperature changes were identified. Groundwater is a major controlling factor for regulating seasonal changes of stream temperature while solar radiation is the primary factor controlling daily stream temperature variations. This study advanced our understanding on short-term stream temperature variation, which could be useful for the authorities to restore the salmon's habitat.

  3. POLA RASIO KEUANGAN PADA SAAT UP STREAM DAN DOWN STREAM DI INDUSTRI REALESTAT YANG GO PUBLIC

    Directory of Open Access Journals (Sweden)

    David Sukardi Kodrat

    2006-01-01

    Full Text Available This research has purpose to explain differences on indicator financial ratio in up and down stream condition. This research uses real estate industries listed on Jakarta Stock Exchange as a sample. Sample selection is performed based on purposive sampling method with object to gain sample according to the research aim. Based on those criteria, there are 18 companies, which have fulfilling the conditions needed, starting from 1994 until 2002. The classification of business cycle on up and down stream conditions to used stock pricing indexes of property and real estate which calculated by arithmatic mean method. Based on those criteria, the classifications from 1994 until 1997 are represented by up stream condition and from 1998 until 2002 are represented by down stream condition. The result shows indicators: profitability ratios, gross margin ratios, capital turnover ratios, asset to equity ratios, growth ratios, liquidity ratios, leverage ratios, and cash flow ratios are different in up and down stream conditions, both simultaneously and partially. Simultaneously, there is a significant difference between up and down stream condition with wilks lambda of 0,346 and p value of 0,000. This research shows financial ratio indicator has differences on business cycle. Abstract in Bahasa Indonesia : Penelitan ini mempunyai tujuan untuk mengetahui perbedaan indikator rasio keuangan pada kondisi up stream dan down stream. Penelitian ini menggunakan sampel pada industri di sektor properti yang terdaftar di Bursa Efek Jakarta. Pemilihan sampel dalam penelitian ini menggunakan Purposive Sampling yaitu sampel diambil berdasarkan kriteria-kriteria tertentu yang sesuai dengan tujuan penelitian ini. Berdasarkan kriteria tersebut, terdapat 18 perusahaan yang dapat dijadikan sampel mulai tahun 1994 sampai dengan 2002. Untuk menentukan perubahan business cycle pada kondisi up stream dan down stream dilakukan dengan menggunakan indeks harga saham di sektor properti

  4. Efficient Estimation of Dynamic Density Functions with Applications in Streaming Data

    KAUST Repository

    Qahtan, Abdulhakim Ali Ali

    2016-01-01

    application is to detect outliers in data streams from sensor networks based on the estimated PDF. The method detects outliers accurately and outperforms baseline methods designed for detecting and cleaning outliers in sensor data. The third application

  5. HUNTING THE PARENT OF THE ORPHAN STREAM: IDENTIFYING STREAM MEMBERS FROM LOW-RESOLUTION SPECTROSCOPY

    International Nuclear Information System (INIS)

    Casey, Andrew R.; Da Costa, Gary; Keller, Stefan C.; Maunder, Elizabeth

    2013-01-01

    We present candidate K-giant members in the Orphan Stream that have been identified from low-resolution data taken with the AAOmega spectrograph on the Anglo-Australian Telescope. From modest signal-to-noise spectra and independent cuts in photometry, kinematics, gravity, and metallicity we yield self-consistent, highly probable stream members. We find a revised stream distance of 22.5 ± 2.0 kpc near the celestial equator and our kinematic signature peaks at V GSR = 82.1 ± 1.4 km s –1 . The observed velocity dispersion of our most probable members is consistent with arising from the velocity uncertainties alone. This indicates that at least along this line of sight, the Orphan Stream is kinematically cold. Our data indicate an overall stream metallicity of [Fe/H] = –1.63 ± 0.19 dex which is more metal-rich than previously found and unbiased by spectral type. Furthermore, the significant metallicity dispersion displayed by our most probable members, σ([Fe/H]) = 0.56 dex, suggests that the unidentified Orphan Stream parent is a dSph satellite. We highlight likely members for high-resolution spectroscopic follow-up.

  6. Tritium removal from air streams by catalytic oxidation and water adsorption

    International Nuclear Information System (INIS)

    Sherwood, A.E.

    1976-06-01

    An effective method of capturing tritium from air streams is by catalytic oxidation followed by water adsorption on a microporous solid adsorbent. Performance of a burner/dryer combination is illustrated by overall mass balance equations. Engineering design methods for packed bed reactors and adsorbers are reviewed, emphasizing the experimental data needed for design and the effect of operating conditions on system performance

  7. In-stream nutrient uptake kinetics along stream size and development gradients in a rapidly developing mountain resort watershed

    Science.gov (United States)

    Covino, T.; McGlynn, B.; McNamarra, R.; Gardner, K.

    2012-04-01

    Land use / land cover (LULC) change including mountain resort development often lead to increased nutrient loading to streams, however the potential influence on stream ecosystem nutrient uptake kinetics and transport remain poorly understood. Given the deleterious impacts elevated nutrient loading can have on aquatic ecosystems, it is imperative to improve understanding of nutrient retention capacities across stream scales and watershed development intensities. We performed seventeen nutrient addition experiments on six streams across the West Fork Gallatin Watershed, Montana, USA, to quantify nitrogen (N) uptake kinetics and retention dynamics across stream sizes (1st to 4th order) and along a mountain resort development gradient. We observed that stream N uptake kinetics and spiraling parameters varied across streams of different development intensity and scale. In more developed watersheds we observed a fertilization affect, however, none of the streams exhibited saturation with respect to N. Additionally, we observed that elevated loading led to increased biomass and retentive capacities in developed streams that helped maintain export at low levels during baseflow. Our results indicate that LULC can enhance in-stream uptake of limiting nutrients and highlight the value of characterizing uptake kinetic curves from ambient to saturation.

  8. Indication of pesticide effects and recolonization in streams.

    Science.gov (United States)

    Knillmann, Saskia; Orlinskiy, Polina; Kaske, Oliver; Foit, Kaarina; Liess, Matthias

    2018-07-15

    The agricultural use of pesticides leads to environmentally relevant pesticide concentrations that cause adverse effects on stream ecosystems. These effects on invertebrate community composition can be identified by the bio-indicator SPEAR pesticides . However, refuge areas have been found to partly confound the indicator. On the basis of three monitoring campaigns of 41 sites in Central Germany, we identified 11 refuge taxa. The refuge taxa, mainly characterized by dispersal-based resilience, were observed only nearby uncontaminated stream sections and independent of the level of pesticide pressure. Through incorporation of this information into the revised SPEAR pesticides indicator, the community structure specifically identified the toxic pressure and no longer depended on the presence of refuge areas. With regard to ecosystem functions, leaf litter degradation was predicted by the revised SPEAR pesticides and the median water temperature at a site (R 2  = 0.38, P = 0.003). Furthermore, we designed the bio-indicator SPEAR refuge to quantify the magnitude of general recolonization at a given stream site. We conclude that the taxonomic composition of aquatic invertebrate communities enables a specific indication of anthropogenic stressors and resilience of ecosystems. Copyright © 2018 Elsevier B.V. All rights reserved.

  9. Stream invertebrate productivity linked to forest subsidies: 37 stream-years of reference and experimental data

    Science.gov (United States)

    J. Bruce Wallace; Susan L Eggert; Judy L. Meyer; Jackson R. Webster

    2015-01-01

    Riparian habitats provide detrital subsidies of varying quantities and qualities to recipient ecosystems. We used long-term data from three reference streams (covering 24 stream-years) and 13-year whole-stream organic matter manipulations to investigate the influence of terrestrial detrital quantity and quality on benthic invertebrate community structure, abundance,...

  10. How wide is a stream? Spatial extent of the potential "stream signature" in terrestrial food webs using meta-analysis.

    Science.gov (United States)

    Muehlbauer, Jeffrey D; Collins, Scott F; Doyle, Martin W; Tockner, Klement

    2014-01-01

    The magnitude of cross-ecosystem resource subsidies is increasingly well recognized; however, less is known about the distance these subsidies travel into the recipient landscape. In streams and rivers, this distance can delimit the "biological stream width," complementary to hydro-geomorphic measures (e.g., channel banks) that have typically defined stream ecosystem boundaries. In this study we used meta-analysis to define a "stream signature" on land that relates the stream-to-land subsidy to distance. The 50% stream signature, for example, identifies the point on the landscape where subsidy resources are still at half of their maximum (in- or near-stream) level. The decay curve for these data was best fit by a negative power function in which the 50% stream signature was concentrated near stream banks (1.5 m), but a non-trivial (10%) portion of the maximum subsidy level was still found > 0.5 km from the water's edge. The meta-analysis also identified explanatory variables that affect the stream signature. This improves our understanding of ecosystem conditions that permit spatially extensive subsidy transmission, such as in highly productive, middle-order streams and rivers. Resultant multivariate models from this analysis may be useful to managers implementing buffer rules and conservation strategies for stream and riparian function, as they facilitate prediction of the extent of subsidies. Our results stress that much of the subsidy remains near the stream, but also that subsidies (and aquatic organisms) are capable of long-distance dispersal into adjacent environments, and that the effective "biological stream width" of stream and river ecosystems is often much larger than has been defined by hydro-geomorphic metrics alone. Limited data available from marine and lake sources overlap well with the stream signature data, indicating that the "signature" approach may also be applicable to subsidy spatial dynamics across other ecosystems.

  11. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

    DEFF Research Database (Denmark)

    Leander, Gregor

    2011-01-01

    which breaks the cipher for at least a quarter of the keys with a complexity less than 258. In the case of PRESENT we show that the design is sound. The design criteria are sufficient to ensure the resistance against linear attacks, taking into account the notion of linear hulls. Finally, we show...

  12. What Can Hierarchies Do for Data Streams?

    DEFF Research Database (Denmark)

    Yin, Xuepeng; Pedersen, Torben Bach

    Much effort has been put into building data streams management systems for querying data streams. Here, data streams have been viewed as a flow of low-level data items, e.g., sensor readings or IP packet data. Stream query languages have mostly been SQL-based, with the STREAM and TelegraphCQ lang...

  13. StreamSqueeze: a dynamic stream visualization for monitoring of event data

    Science.gov (United States)

    Mansmann, Florian; Krstajic, Milos; Fischer, Fabian; Bertini, Enrico

    2012-01-01

    While in clear-cut situations automated analytical solution for data streams are already in place, only few visual approaches have been proposed in the literature for exploratory analysis tasks on dynamic information. However, due to the competitive or security-related advantages that real-time information gives in domains such as finance, business or networking, we are convinced that there is a need for exploratory visualization tools for data streams. Under the conditions that new events have higher relevance and that smooth transitions enable traceability of items, we propose a novel dynamic stream visualization called StreamSqueeze. In this technique the degree of interest of recent items is expressed through an increase in size and thus recent events can be shown with more details. The technique has two main benefits: First, the layout algorithm arranges items in several lists of various sizes and optimizes the positions within each list so that the transition of an item from one list to the other triggers least visual changes. Second, the animation scheme ensures that for 50 percent of the time an item has a static screen position where reading is most effective and then continuously shrinks and moves to the its next static position in the subsequent list. To demonstrate the capability of our technique, we apply it to large and high-frequency news and syslog streams and show how it maintains optimal stability of the layout under the conditions given above.

  14. Stream temperature responses to timber harvest and best management practices—findings from the ODF RipStream project

    Science.gov (United States)

    Jeremy D. Groom

    2013-01-01

    Studies over the past 40 years have established that riparian buff er retention along streams protects against stream temperature increase. Th is protection is neither universal nor complete; some buff ered streams still warm, while other streams’ temperatures remain stable. Oregon Department of Forestry developed riparian rules in the Forest Practices Act (FPA) to...

  15. Innovation in radioactive wastewater-stream management: Part one

    International Nuclear Information System (INIS)

    Karameldin, A.

    2005-01-01

    Treatment of radioactive wastewater streams is receiving considerable attention in most countries that have nuclear reactors. The first Egyptian research reactor ETRR-1 has been operating for 40 years, resulting in accumulation of large quantities of wastewater collected in special drainage tanks called SDTs. Previous attempts were aimed at the volumetric reduction of streams present in SDTs, by reverse osmosis systems, which previously succeeded in reducing the water volume present in SDTs from 450 m 3 to 50 m 3 (during the period 1998-2000). The main drawbacks of the RO system are the additional amount of secondary wastes (turbidity and emulsion filters media replacement, and the excessive amounts of chemicals for the membrane cleaning, flushing and storing), and a limited contaminant release in the SDTs area, resulting in the decommissioning of the RO system. Meanwhile, the SDTs waste contents recently reached 500 m 3 . Recently, the invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilises the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs. From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs has indicated that the proposed optimal evaporating temperature is around 75 deg. C. The design curve of the daily volumetric reduction of the wastewater streams vs. the necessary volumetric airflow rates at different operating temperatures has been achieved. Recently, an experimental facility is being constructed to obtain the optimal operating parameters of the system, regarding the probable emissions of the radioactive nuclides within the permissible release limits. (author)

  16. Percent Forest Adjacent to Streams (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  17. Percent Agriculture Adjacent to Streams (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  18. Ecological health in the Nation's streams

    Science.gov (United States)

    Carlisle, Daren M.; Woodside, Michael D.

    2013-01-01

    Aquatic biological communities, which are collections of organisms, are a direct measure of stream health because they indicate the ability of a stream to support life. This fact sheet highlights selected findings of a national assessment of stream health by the National Water-Quality Assessment (NAWQA) Program of the U.S. Geological Survey (USGS). The assessment was unique in that it integrated the condition of three biological communities—algae, macroinvertebrates, and fish—as well as measures of streamflow modification, pesticides, nutrients, and other factors. At least one biological community was altered at 83 percent of assessed streams, and the occurrence of altered communities was highest in urban streams. Streamflows were modified at 86 percent of assessed streams, and increasing severity of streamflow modification was associated with increased occurrence of altered biological communities. Agricultural and urban land use in watersheds may contribute pesticides and nutrients to stream waters, and increasing concentrations of these chemicals were associated with increased occurrence of altered biological communities.

  19. A New Streamflow-Routing (SFR1) Package to Simulate Stream-Aquifer Interaction with MODFLOW-2000

    Science.gov (United States)

    Prudic, David E.; Konikow, Leonard F.; Banta, Edward R.

    2004-01-01

    stream reach is based on a mass-balance approach and accounts for exchanges with (inputs from or losses to) ground-water systems. Two test examples are used to illustrate some of the capabilities of the SFR1 Package. The first test simulation was designed to illustrate how pumping of ground water from an aquifer connected to streams can affect streamflow, depth, width, and streambed conductance using the different options. The second test simulation was designed to illustrate solute transport through interconnected lakes, streams, and aquifers. Because of the need to examine time series results from the model simulations, the Gage Package first described in the LAK3 documentation was revised to include time series results of selected variables (streamflows, stream depth and width, streambed conductance, solute concentrations, and solute loads) for specified stream reaches. The mass-balance or continuity approach for routing flow and solutes through a stream network may not be applicable for all interactions between streams and aquifers. The SFR1 Package is best suited for modeling long-term changes (months to hundreds of years) in ground-water flow and solute concentrations using averaged flows in streams. The Package is not recommended for modeling the transient exchange of water between streams and aquifers when the objective is to examine short-term (minutes to days) effects caused by rapidly changing streamflows.

  20. Global pressures, specific responses: effects of nutrient enrichment in streams from different biomes

    International Nuclear Information System (INIS)

    Artigas, Joan; García-Berthou, Emili; Gómez, Nora; Romaní, Anna M; Sabater, Sergi; Bauer, Delia E; Cochero, Joaquín; Cortelezzi, Agustina; Rodrigues-Capítulo, Alberto; Castro, Maria I; Donato, John C; Colautti, Darío C; Elosegi, Arturo; Feijoó, Claudia; Giorgi, Adonis; Leggieri, Leonardo; Muñoz, Isabel

    2013-01-01

    We assessed the effects of nutrient enrichment on three stream ecosystems running through distinct biomes (Mediterranean, Pampean and Andean). We increased the concentrations of N and P in the stream water 1.6–4-fold following a before–after control–impact paired series (BACIPS) design in each stream, and evaluated changes in the biomass of bacteria, primary producers, invertebrates and fish in the enriched (E) versus control (C) reaches after nutrient addition through a predictive-BACIPS approach. The treatment produced variable biomass responses (2–77% of explained variance) among biological communities and streams. The greatest biomass response was observed for algae in the Andean stream (77% of the variance), although fish also showed important biomass responses (about 9–48%). The strongest biomass response to enrichment (77% in all biological compartments) was found in the Andean stream. The magnitude and seasonality of biomass responses to enrichment were highly site specific, often depending on the basal nutrient concentration and on windows of ecological opportunity (periods when environmental constraints other than nutrients do not limit biomass growth). The Pampean stream, with high basal nutrient concentrations, showed a weak response to enrichment (except for invertebrates), whereas the greater responses of Andean stream communities were presumably favored by wider windows of ecological opportunity in comparison to those from the Mediterranean stream. Despite variation among sites, enrichment globally stimulated the algal-based food webs (algae and invertebrate grazers) but not the detritus-based food webs (bacteria and invertebrate shredders). This study shows that nutrient enrichment tends to globally enhance the biomass of stream biological assemblages, but that its magnitude and extent within the food web are complex and are strongly determined by environmental factors and ecosystem structure. (letter)

  1. Comparison of active and passive stream restoration

    DEFF Research Database (Denmark)

    Kristensen, Esben Astrup; Thodsen, Hans; Dehli, Bjarke

    2013-01-01

    Modification and channelization of streams and rivers have been conducted extensively throughout the world during the past century. Subsequently, much effort has been directed at re-creating the lost habitats and thereby improving living conditions for aquatic organisms. However, as restoration...... methods are plentiful, it is difficult to determine which one to use to get the anticipated result. The aim of this study was to compare two commonly used methods in small Danish streams to improve the physical condition: re-meandering and passive restoration through cease of maintenance. Our...... investigation included measurement of the physical conditions in 29 stream reaches covering four different groups: (1) re-meandered streams, (2) LDC streams (the least disturbed streams available), (3) passively restored streams (>10 years stop of aintenance) and (4) channelized and non-restored streams. The in...

  2. The Pacific northwest stream quality assessment

    Science.gov (United States)

    Van Metre, Peter C.; Morace, Jennifer L.; Sheibley, Rich W.

    2015-01-01

    In 2015, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) program is assessing stream quality in the Pacific Northwest. The goals of the Pacific Northwest Stream Quality Assessment (Pacific Northwest study) are to assess the quality of streams in the region by characterizing multiple water-quality factors that are stressors to aquatic life and to evaluate the relation between these stressors and biological communities. The effects of urbanization and agriculture on stream quality for the Puget Lowlands and Willamette Valley are the focus of this regional study. Findings will provide the public and policymakers with information regarding which human and environmental factors are the most critical in affecting stream quality and, thus, provide insights about possible approaches to protect or improve the health of streams in the region.

  3. An ecohydrological stream type cassification of intermittent and ephemeral streams in the Southwestern United States 2397

    Science.gov (United States)

    Ephemeral and intermittent streams are the predominant fluvial forms in arid and semi-arid environments. Various studies have shown biological and habitat diversity in these lands to be considerably higher along stream corridors in comparison to adjacent uplands, yet knowledge of how these streams f...

  4. Streamlining Streaming : Tilläggsfunktioner och dess betydelse för att designa en streamingtjänst

    OpenAIRE

    Mähler, Viktor; Näslund, Erik

    2015-01-01

    Streaming is a big field in todays digitalized society. The streaming market is huge, both in regards to the customer base, but also in regards to different providers and their stakes within this market. But how does the different providers go about in order to provide their users with added value? What does the user prioritize? The purpose of this study is to examine which additional functions can be considered important when designing a streaming service, which in turn will create an added ...

  5. Bed-material entrainment and associated transportation infrastructure problems in streams of the Edwards Plateau, central Texas

    Science.gov (United States)

    Heitmuller, Franklin T.; Asquith, William H.

    2008-01-01

    The Texas Department of Transportation commonly builds and maintains low-water crossings (LWCs) over streams in the Edwards Plateau in Central Texas. LWCs are low-height structures, typically constructed of concrete and asphalt, that provide acceptable passage over seasonal rivers or streams with relatively low normal-depth flow. They are designed to accommodate flow by roadway overtopping during high-flow events. The streams of the Edwards Plateau are characterized by cobble- and gravel-sized bed material and highly variable flow regimes. Low base flows that occur most of the time occasionally are interrupted by severe floods. The floods entrain and transport substantial loads of bed material in the stream channels. As a result, LWCs over streams in the Edwards Plateau are bombarded and abraded by bed material during floods and periodically must be maintained or even replaced.

  6. Streaming Media Seminar--Effective Development and Distribution of Streaming Multimedia in Education

    Science.gov (United States)

    Mainhart, Robert; Gerraughty, James; Anderson, Kristine M.

    2004-01-01

    Concisely defined, "streaming media" is moving video and/or audio transmitted over the Internet for immediate viewing/listening by an end user. However, at Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA), streaming media is approached from a broader perspective. The working definition includes…

  7. Learning Design for Sustainable Educational and Professional Development

    DEFF Research Database (Denmark)

    Godsk, Mikkel; Bjælde, Ole Eggers; Caspersen, Michael E.

    2015-01-01

    This poster presents the impact of two learning design initiatives at Faculty of Science and Technology, Aarhus University: the professional development module ‘Digital Learning Design’ (DiLD) for assistant professors and postdocs, and the STREAM learning design model for enhancing and transformi...... modules. Both DiLD and the STREAM model have proven to be effective for encouraging educators across all career steps to embrace the potential of educational technology in science higher education and for improving teaching and learning.......This poster presents the impact of two learning design initiatives at Faculty of Science and Technology, Aarhus University: the professional development module ‘Digital Learning Design’ (DiLD) for assistant professors and postdocs, and the STREAM learning design model for enhancing and transforming...

  8. Process for humidifying a gaseous fuel stream

    International Nuclear Information System (INIS)

    Sederquist, R. A.

    1985-01-01

    A fuel gas stream for a fuel cell is humidified by a recirculating hot liquid water stream using the heat of condensation from the humidified stream as the heat to vaporize the liquid water. Humidification is accomplished by directly contacting the liquid water with the dry gas stream in a saturator to evaporate a small portion of water. The recirculating liquid water is reheated by direct contact with the humidified gas stream in a condenser, wherein water is condensed into the liquid stream. Between the steps of humidifying and condensing water from the gas stream it passes through the fuel cell and additional water, in the form of steam, is added thereto

  9. Stochastic ice stream dynamics.

    Science.gov (United States)

    Mantelli, Elisa; Bertagni, Matteo Bernard; Ridolfi, Luca

    2016-08-09

    Ice streams are narrow corridors of fast-flowing ice that constitute the arterial drainage network of ice sheets. Therefore, changes in ice stream flow are key to understanding paleoclimate, sea level changes, and rapid disintegration of ice sheets during deglaciation. The dynamics of ice flow are tightly coupled to the climate system through atmospheric temperature and snow recharge, which are known exhibit stochastic variability. Here we focus on the interplay between stochastic climate forcing and ice stream temporal dynamics. Our work demonstrates that realistic climate fluctuations are able to (i) induce the coexistence of dynamic behaviors that would be incompatible in a purely deterministic system and (ii) drive ice stream flow away from the regime expected in a steady climate. We conclude that environmental noise appears to be crucial to interpreting the past behavior of ice sheets, as well as to predicting their future evolution.

  10. Stream Tracker: Crowd sourcing and remote sensing to monitor stream flow intermittence

    Science.gov (United States)

    Puntenney, K.; Kampf, S. K.; Newman, G.; Lefsky, M. A.; Weber, R.; Gerlich, J.

    2017-12-01

    Streams that do not flow continuously in time and space support diverse aquatic life and can be critical contributors to downstream water supply. However, these intermittent streams are rarely monitored and poorly mapped. Stream Tracker is a community powered stream monitoring project that pairs citizen contributed observations of streamflow presence or absence with a network of streamflow sensors and remotely sensed data from satellites to track when and where water is flowing in intermittent stream channels. Citizens can visit sites on roads and trails to track flow and contribute their observations to the project site hosted by CitSci.org. Data can be entered using either a mobile application with offline capabilities or an online data entry portal. The sensor network provides a consistent record of streamflow and flow presence/absence across a range of elevations and drainage areas. Capacitance, resistance, and laser sensors have been deployed to determine the most reliable, low cost sensor that could be mass distributed to track streamflow intermittence over a larger number of sites. Streamflow presence or absence observations from the citizen and sensor networks are then compared to satellite imagery to improve flow detection algorithms using remotely sensed data from Landsat. In the first two months of this project, 1,287 observations have been made at 241 sites by 24 project members across northern and western Colorado.

  11. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  12. Acoustic streaming of a sharp edge.

    Science.gov (United States)

    Ovchinnikov, Mikhail; Zhou, Jianbo; Yalamanchili, Satish

    2014-07-01

    Anomalous acoustic streaming is observed emanating from sharp edges of solid bodies that are vibrating in fluids. The streaming velocities can be orders of magnitude higher than expected from the Rayleigh streaming at similar amplitudes of vibration. Acoustic velocity of fluid relative to a solid body diverges at a sharp edge, giving rise to a localized time-independent body force acting on the fluid. This force results in a formation of a localized jet. Two-dimensional numerical simulations are performed to predict acoustic streaming for low amplitude vibration using two methods: (1) Steady-state solution utilizing perturbation theory and (2) direct transient solution of the Navier-Stokes equations. Both analyses agree with each other and correctly predict the streaming of a sharp-edged vibrating blade measured experimentally. The origin of the streaming can be attributed to the centrifugal force of the acoustic fluid flow around a sharp edge. The dependence of this acoustic streaming on frequency and velocity is examined using dimensional analysis. The dependence law is devised and confirmed by numerical simulations.

  13. Global perspectives on the urban stream syndrome

    Science.gov (United States)

    Roy, Allison; Booth, Derek B.; Capps, Krista A.; Smith, Benjamin

    2016-01-01

    Urban streams commonly express degraded physical, chemical, and biological conditions that have been collectively termed the “urban stream syndrome”. The description of the syndrome highlights the broad similarities among these streams relative to their less-impaired counterparts. Awareness of these commonalities has fostered rapid improvements in the management of urban stormwater for the protection of downstream watercourses, but the focus on the similarities among urban streams has obscured meaningful differences among them. Key drivers of stream responses to urbanization can vary greatly among climatological and physiographic regions of the globe, and the differences can be manifested in individual stream channels even through the homogenizing veneer of urban development. We provide examples of differences in natural hydrologic and geologic settings (within similar regions) that can result in different mechanisms of stream ecosystem response to urbanization and, as such, should lead to different management approaches. The idea that all urban streams can be cured using the same treatment is simplistic, but overemphasizing the tremendous differences among natural (or human-altered) systems also can paralyze management. Thoughtful integration of work that recognizes the commonalities of the urban stream syndrome across the globe has benefitted urban stream management. Now we call for a more nuanced understanding of the regional, subregional, and local attributes of any given urban stream and its watershed to advance the physical, chemical, and ecological recovery of these systems.

  14. Organic carbon spiralling in stream ecosystems

    Energy Technology Data Exchange (ETDEWEB)

    Newbold, J D; Mulholland, P J; Elwood, J W; O' Neill, R V

    1982-01-01

    The term spiralling has been used to describe the combined processes of cycling and longitudinal transport in streams. As a measure or organic carbon spiralling, we introduced organic carbon turnover length, S, defined as the average or expected downstream distance travelled by a carbon atom between its entry or fixation in the stream and its oxidation. Using a simple model for organic carbon dynamics in a stream, we show that S is closely related to fisher and Likens' ecosystem efficiency. Unlike efficiency, however, S is independent of the length of the study reach, and values of S determined in streams of differing lengths can be compared. Using data from three different streams, we found the relationship between S and efficiency to agree closely with the model prediction. Hypotheses of stream functioning are discussed in the context of organic carbeon spiralling theory.

  15. ESTIMATION OF THE TEMPERATURE RISE OF A MCU ACID STREAM PIPE IN NEAR PROXIMITY TO A SLUDGE STREAM PIPE

    International Nuclear Information System (INIS)

    Fondeur, F; Michael Poirier, M; Samuel Fink, S

    2007-01-01

    Effluent streams from the Modular Caustic-Side Solvent Extraction Unit (MCU) will transfer to the tank farms and to the Defense Waste Processing Facility (DWPF). These streams will contain entrained solvent. A significant portion of the Strip Effluent (SE) pipeline (i.e., acid stream containing Isopar(reg s ign) L residues) length is within one inch of a sludge stream. Personnel envisioned the sludge stream temperature may reach 100 C during operation. The nearby SE stream may receive heat from the sludge stream and reach temperatures that may lead to flammability issues once the contents of the SE stream discharge into a larger reservoir. To this end, personnel used correlations from the literature to estimate the maximum temperature rise the SE stream may experience if the nearby sludge stream reaches boiling temperature. Several calculation methods were used to determine the temperature rise of the SE stream. One method considered a heat balance equation under steady state that employed correlation functions to estimate heat transfer rate. This method showed the maximum temperature of the acid stream (SE) may exceed 45 C when the nearby sludge stream is 80 C or higher. A second method used an effectiveness calculation used to predict the heat transfer rate in single pass heat exchanger. By envisioning the acid and sludge pipes as a parallel flow pipe-to-pipe heat exchanger, this method provides a conservative estimation of the maximum temperature rise. Assuming the contact area (i.e., the area over which the heat transfer occurs) is the whole pipe area, the results found by this method nearly matched the results found with the previous calculation method. It is recommended that the sludge stream be maintained below 80 C to minimize a flammable vapor hazard from occurring

  16. MonetDB/DataCell: Online Analytics in a Streaming Column-Store

    NARCIS (Netherlands)

    E. Liarou (Erietta); S. Idreos (Stratos); S. Manegold (Stefan); M.L. Kersten (Martin)

    2012-01-01

    textabstractIn DataCell, we design streaming functionalities in a mod- ern relational database kernel which targets big data analyt- ics. This includes exploitation of both its storage/execution engine and its optimizer infrastructure. We investigate the opportunities and challenges that arise with

  17. MonetDB/DataCell: online analytics in a streaming column-store

    NARCIS (Netherlands)

    Liarou, E.; Idreos, S.; Manegold, S.; Kersten, M.

    2012-01-01

    In DataCell, we design streaming functionalities in a modern relational database kernel which targets big data analytics. This includes exploitation of both its storage/execution engine and its optimizer infrastructure. We investigate the opportunities and challenges that arise with such a direction

  18. HYLIFE-II reactor chamber mechanical design: Update

    International Nuclear Information System (INIS)

    House, P.A.

    1992-01-01

    Mechanical design features of the reactor chamber for the HYLIFE-II inertial confinement fusion power plant are presented. A combination of oscillating and steady, molten salt streams (Li 2 BeF 4 ) are used for shielding and blast protection of the chamber walls. The system is designed for a 6 Hz repetition rate. Beam path clearing, between shots, is accomplished with the oscillating flow. The mechanism for generating the oscillating streams is described. A design configuration of the vessel wall allows adequate cooling and provides extra shielding to reduce thermal stresses to tolerable levels. The bottom portion of the reactor chamber is designed to minimize splash back of the high velocity (17 m/s) salt streams and also recover up to half of the dynamic head. Cost estimates for a 1 GW e and 2 GW e reactor chamber are presented

  19. Cloud Computing Security Model with Combination of Data Encryption Standard Algorithm (DES) and Least Significant Bit (LSB)

    Science.gov (United States)

    Basri, M.; Mawengkang, H.; Zamzami, E. M.

    2018-03-01

    Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.

  20. Exploring the energy consumption of lightweight blockciphers in FPGA

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2015-01-01

    Internet of things and cyber-physical systems requiring security functionality has pushed for the design of a number of block ciphers and hash functions specifically developed for being implemented in resource constrained devices. Initially the optimization was mainly on area and power consumption...

  1. On-stream chemical element monitor

    International Nuclear Information System (INIS)

    Averitt, O.R.; Dorsch, R.R.

    1979-01-01

    An apparatus and method for on-stream chemical element monitoring are described wherein a multiplicity of sample streams are flowed continuously through individual analytical cells and fluorescence analyses are performed on the sample streams in sequence, together with a method of controlling the time duration of each analysis as a function of the concomitant radiation exposure of a preselected perforate reference material interposed in the sample-radiation source path

  2. ANOTHER LOOK AT THE EASTERN BANDED STRUCTURE: A STELLAR DEBRIS STREAM AND A POSSIBLE PROGENITOR

    International Nuclear Information System (INIS)

    Grillmair, C. J.

    2011-01-01

    Using the Sloan Digital Sky Survey Data Release 7, we re-examine the Eastern Banded Structure (EBS), a stellar debris stream first discovered in Data Release 5 and more recently detected in velocity space by Schlaufman et al. The visible portion of the stream is 18 0 long, lying roughly in the Galactic Anticenter direction and extending from Hydra to Cancer. At an estimated distance of 9.7 kpc, the stream is ∼170 pc across on the sky. The curvature of the stream implies a fairly eccentric box orbit that passes close to both the Galactic center and to the Sun, making it dynamically distinct from the nearby Monoceros, Anticenter, and GD-1 streams. Within the stream is a relatively strong, 2 0 -wide concentration of stars with a very similar color-magnitude distribution that we designate Hydra I. Given its prominence within the stream and its unusual morphology, we suggest that Hydra I is the last vestige of EBS's progenitor, possibly already unbound or in the final throes of tidal dissolution. Though both Hydra I and the EBS have a relatively high-velocity dispersion, given the comparatively narrow width of the stream and the high frequency of encounters with the bulge and massive constituents of the disk that such an eccentric orbit would entail, we suggest that the progenitor was likely a globular cluster and that both it and the stream have undergone significant heating over time.

  3. Reconfigurable Multicore Architectures for Streaming Applications

    NARCIS (Netherlands)

    Smit, Gerardus Johannes Maria; Kokkeler, Andre B.J.; Rauwerda, G.K.; Jacobs, J.W.M.; Nicolescu, G.; Mosterman, P.J.

    2009-01-01

    This chapter addresses reconfigurable heterogenous and homogeneous multicore system-on-chip (SoC) platforms for streaming digital signal processing applications, also called DSP applications. In streaming DSP applications, computations can be specified as a data flow graph with streams of data items

  4. Stretch-minimising stream surfaces

    KAUST Repository

    Barton, Michael; Kosinka, Jin; Calo, Victor M.

    2015-01-01

    We study the problem of finding stretch-minimising stream surfaces in a divergence-free vector field. These surfaces are generated by motions of seed curves that propagate through the field in a stretch minimising manner, i.e., they move without stretching or shrinking, preserving the length of their arbitrary arc. In general fields, such curves may not exist. How-ever, the divergence-free constraint gives rise to these 'stretch-free' curves that are locally arc-length preserving when infinitesimally propagated. Several families of stretch-free curves are identified and used as initial guesses for stream surface generation. These surfaces are subsequently globally optimised to obtain the best stretch-minimising stream surfaces in a given divergence-free vector field. Our algorithm was tested on benchmark datasets, proving its applicability to incompressible fluid flow simulations, where our stretch-minimising stream surfaces realistically reflect the flow of a flexible univariate object. © 2015 Elsevier Inc. All rights reserved.

  5. Stretch-minimising stream surfaces

    KAUST Repository

    Barton, Michael

    2015-05-01

    We study the problem of finding stretch-minimising stream surfaces in a divergence-free vector field. These surfaces are generated by motions of seed curves that propagate through the field in a stretch minimising manner, i.e., they move without stretching or shrinking, preserving the length of their arbitrary arc. In general fields, such curves may not exist. How-ever, the divergence-free constraint gives rise to these \\'stretch-free\\' curves that are locally arc-length preserving when infinitesimally propagated. Several families of stretch-free curves are identified and used as initial guesses for stream surface generation. These surfaces are subsequently globally optimised to obtain the best stretch-minimising stream surfaces in a given divergence-free vector field. Our algorithm was tested on benchmark datasets, proving its applicability to incompressible fluid flow simulations, where our stretch-minimising stream surfaces realistically reflect the flow of a flexible univariate object. © 2015 Elsevier Inc. All rights reserved.

  6. Self-focusing relativistic electron streams in plasmas

    International Nuclear Information System (INIS)

    Cox, J.L. Jr.

    1975-01-01

    A relativistic electron stream propagating through a dense plasma induces current and charge densities which determine how the stream can self-focus. Magnetic self-focusing is possible because stream-current neutralization, although extensive, is not complete. Electric self-focusing can occur because the stream charge becomes overneutralized when the net current is smaller than a critical value. Under some circumstances, the latter process can cause the stream to focus into a series of electron bunches

  7. Removal of sulfur from process streams

    International Nuclear Information System (INIS)

    Brignac, D.G.

    1984-01-01

    A process wherein water is added to a non-reactive gas stream, preferably a hydrogen or hydrogen-containing gas stream, sufficient to raise the water level thereof to from about 0.2 percent to about 50 percent, based on the total volume of the process gas stream, and the said moist gas stream is contacted, at elevated temperature, with a particulate mass of a sulfur-bearing metal alumina spinel characterized by the formula MAl 2 O 4 , wherein M is chromium, iron, cobalt, nickel, copper, cadmium, mercury, or zinc to desorb sulfur thereon. In the sulfur sorption cycle, due to the simultaneous adsorption of water and sulfur, the useful life of the metal alumina spinel for sulfur adsorption can be extended, and the sorbent made more easily regenerable after contact with a sulfur-bearing gas stream, notably sulfur-bearing wet hydrogen or wet hydrogen-rich gas streams

  8. Collaborative Media Streaming

    OpenAIRE

    Kahmann, Verena

    2008-01-01

    Mit Hilfe der IP-Technologie erbrachte Multimedia-Dienste wie IPTV oder Video-on-Demand sind zur Zeit ein gefragtes Thema. Technisch werden solche Dienste unter dem Begriff "Streaming" eingeordnet. Ein Server sendet Mediendaten kontinuierlich an Empfänger, welche die Daten sofort weiterverarbeiten und anzeigen. Über einen Rückkanal hat der Kunde die Möglichkeit der Einflussnahme auf die Wiedergabe. Eine Weiterentwicklung dieser Streaming-Dienste ist die Möglichkeit, gemeinsam mit anderen dens...

  9. Motion of shocks through interplanetary streams

    International Nuclear Information System (INIS)

    Burlaga, L.F.; Scudder, J.D.

    1975-01-01

    A model for the motion of flare-generated shocks through interplanetary streams is presented, illustrating the effects of a stream-shock interaction on the shock strength and geometry. It is a gas dynamic calculation based on Whitham's method and on an empirical approximation for the relevant characteristics of streams. The results show that the Mach number of a shock can decrease appreciably to near unity in the interaction region ahead of streams and that the interaction of a spherically symmetric shock with a spiral-shaped corotating stream can cause significant distortions of the initial shock front geometry. The geometry of the February 15--16, 1967, shock discussed by Lepping and Chao (1972) is qualitatively explained by this model

  10. Stream chemistry in the eastern United States. 2. Current sources of acidity in acidic and low acid-neutralizing-capacity streams

    International Nuclear Information System (INIS)

    Herlihy, A.T.; Kaufmann, P.R.; Mitch, M.E.

    1991-01-01

    The authors examined anion composition in National Stream Survey (NSS) data in order to evaluate the most probable sources of current acidity in acidic and low acid neutralizing capacity (ANC) streams in the eastern United States. Acidic streams that had almost no organic influence (less than 10% of total anions) and sulfate and nitrate concentrations indicative of evaporative concentration of atmospheric deposition were classified as acidic due to acidic deposition. These acidic streams were located in small forested watersheds in the Mid-Atlantic Highlands (an estimated 1950 km of stream length) and in the Mid-Atlantic Coastal Plain (1250 km). Acidic streams affected primarily by acidic deposition but also influenced by naturally occurring organic anions accounted for another 1180 km of acidic stream length and were located in the New Jersey Pine Barrens, plateau tops in the Mid-Atlantic and Southeast Highlands, and the Florida Panhandle. The total length of streams acidic due to acid mine drainage in the NSS (4590 km) was about the same as the total length of acidic streams likely affected by acidic deposition (4380 km). Acidic streams whose acid anion composition was dominated by organics were located in Florida and the Mid-Atlantic Coastal Plain. In Florida, most of the acidic streams were organic dominated, whereas about half of the streams in the Mid-Atlantic Coastal Plain were organic dominated. Organic-dominated acidic streams were not observed in the Mid-Atlantic and Southeast Highlands

  11. The effect of in-stream activities on the Njoro River, Kenya. Part I: Stream flow and chemical water quality

    Science.gov (United States)

    Yillia, Paul T.; Kreuzinger, Norbert; Mathooko, Jude M.

    For shallow streams in sub-Saharan Africa, in-stream activities could be described as the actions by people and livestock, which take place within or besides stream channels. This study examined the nature of in-stream activities along a rural stream in Kenya and established the inequality in water allocation for various livelihood needs, as well as the negative impact they have on dry weather stream flow and chemical water quality. Seven locations along the stream were studied in wet and dry weather of 2006. Enumeration consisted of making head counts of people and livestock and tallying visitors at hourly intervals from 6 a.m. to 7 p.m. To estimate water abstraction, filled containers of known volume were counted and the stream was sampled to examine the impact on water quality. Water samples were obtained upstream and downstream of in-stream activities before (6 a.m.) and during (11 a.m., 6 p.m.) activities. Samples were analyzed for suspended solids, turbidity, BOD 5, total nitrogen and total phosphorus. The daily total abstraction at the middle reaches during dry weather was 120-150 m 3 day -1. More than 60% of abstraction was done by water vendors. Vended water from the stream was sold at US 3.5-7.5 per m 3 and vendors earned between US 3-6 a day. Abstracted water contributed approximately 40-60% of the total daily consumptive water use in the riparian area during dry weather but >30% of the morning stream flow was abstracted thereby upsetting stream flow in the lower reaches. The daily total water abstraction correlated positively ( R2, 0.98) and significantly ( p < 0.05) with the daily total human visit, which was diurnally periodic with two peaks, occurring between 9 a.m. and 10 a.m. and from 4 p.m. to 5 p.m. This diurnal pattern of visits and the corresponding in-stream activities affected water quality. In particular, suspended solids, turbidity and BOD 5 levels increased significantly ( p < 0.05) downstream during in-stream activities. It was concluded

  12. Restoring Wood-Rich Hotspots in Mountain Stream Networks

    Science.gov (United States)

    Wohl, E.; Scott, D.

    2016-12-01

    Mountain streams commonly include substantial longitudinal variability in valley and channel geometry, alternating repeatedly between steep, narrow and relatively wide, low gradient segments. Segments that are wider and lower gradient than neighboring steeper sections are hotspots with respect to: retention of large wood (LW) and finer sediment and organic matter; uptake of nutrients; and biomass and biodiversity of aquatic and riparian organisms. These segments are also more likely to be transport-limited with respect to floodplain and instream LW. Management designed to protect and restore riverine LW and the physical and ecological processes facilitated by the presence of LW is likely to be most effective if focused on relatively low-gradient stream segments. These segments can be identified using a simple, reach-scale gradient analysis based on high-resolution DEMs, with field visits to identify factors that potentially limit or facilitate LW recruitment and retention, such as forest disturbance history or land use. Drawing on field data from the western US, this presentation outlines a procedure for mapping relatively low-gradient segments in a stream network and for identifying those segments where LW reintroduction or retention is most likely to balance maximizing environmental benefits derived from the presence of LW while minimizing hazards associated with LW.

  13. Stream Intermittency Sensors Monitor the Onset and Duration of Stream Flow Along a Channel Network During Storms

    Science.gov (United States)

    Jensen, C.; McGuire, K. J.

    2017-12-01

    Headwater streams are spatially extensive, accounting for a majority of global stream length, and supply downstream water bodies with water, sediment, organic matter, and pollutants. Much of this transmission occurs episodically during storms when stream flow and connectivity are high. Many headwaters are temporary streams that expand and contract in length in response to storms and seasonality. Understanding where and when streams carry flow is critical for conserving headwaters and protecting downstream water quality, but storm events are difficult to study in small catchments. The rise and fall of stream flow occurs rapidly in headwaters, making observation of the entire stream network difficult. Stream intermittency sensors that detect the presence or absence of water can reveal wetting and drying patterns over short time scales. We installed 50 intermittency sensors along the channel network of a small catchment (35 ha) in the Valley and Ridge of southwest Virginia. Previous work shows stream length is highly variable in this shale catchment, as the drainage density spans two orders of magnitude. The sensors record data every 15 minutes for one year to capture different seasons, antecedent moisture conditions, and precipitation rates. We seek to determine whether hysteresis between stream flow and network length occurs on the rising and falling limbs of events and if reach-scale characteristics such as valley width explain spatial patterns of flow duration. Our results indicate reaches with a wide, sediment-filled valley floor carry water for shorter periods of time than confined channel segments with steep valley side slopes. During earlier field mapping surveys, we only observed flow in a few of the tributaries for the wettest conditions mapped. The sensors now show that these tributaries flow more frequently during much smaller storms, but only for brief periods of time (hour). The high temporal sampling resolution of the sensors permits a more realistic

  14. Environmental Characteristics and Geographic Information System Applications for the Development of Nutrient Thresholds in Oklahoma Streams

    Science.gov (United States)

    Masoner, Jason R.; Haggard, Brian E.; Rea, Alan

    2002-01-01

    The U.S.Environmental Protection Agency has developed nutrient criteria using ecoregions to manage and protect rivers and streams in the United States. Individual states and tribes are encouraged by the U.S. Environmental Protection Agency to modify or improve upon the ecoregion approach. The Oklahoma Water Resources Board uses a dichotomous process that stratifies streams using environmental characteristics such as stream order and stream slope. This process is called the Use Support Assessment Protocols, subchapter15. The Use Support Assessment Protocols can be used to identify streams threatened by excessive amounts of nutrients, dependant upon a beneficial use designation for each stream. The Use Support Assessment Protocols, subchapter 15 uses nutrient and environmental characteristic thresholds developed from a study conducted in the Netherlands, but the Oklahoma Water Resources Board wants to modify the thresholds to reflect hydrologic and ecological conditions relevant to Oklahoma streams and rivers. Environmental characteristics thought to affect impairment from nutrient concentrations in Oklahoma streams and rivers were determined for 798 water-quality sites in Oklahoma. Nutrient, chlorophyll, water-properties, and location data were retrieved from the U.S. Environmental Protection Agency STORET database including data from the U.S. Geological Survey, Oklahoma Conservation Commission, and Oklahoma Water Resources Board. Drainage-basin area, stream order, stream slope, and land-use proportions were determined for each site using a Geographic Information System. The methods, procedures, and data sets used to determine the environmental characteristics are described.

  15. Influences of wildfire and channel reorganization on spatial and temporal variation in stream temperature and the distribution of fish and amphibians

    Science.gov (United States)

    Dunham, J.B.; Rosenberger, A.E.; Luce, C.H.; Rieman, B.E.

    2007-01-01

    Wildfire can influence a variety of stream ecosystem properties. We studied stream temperatures in relation to wildfire in small streams in the Boise River Basin, located in central Idaho, USA. To examine the spatio-temporal aspects of temperature in relation to wildfire, we employed three approaches: a pre-post fire comparison of temperatures between two sites (one from a burned stream and one unburned) over 13 years, a short-term (3 year) pre-post fire comparison of a burned and unburned stream with spatially extensive data, and a short-term (1 year) comparative study of spatial variability in temperatures using a "space for time" substitutive design across 90 sites in nine streams (retrospective comparative study). The latter design included streams with a history of stand-replacing wildfire and streams with severe post-fire reorganization of channels due to debris flows and flooding. Results from these three studies indicated that summer maximum water temperatures can remain significantly elevated for at least a decade following wildfire, particularly in streams with severe channel reorganization. In the retrospective comparative study we investigated occurrence of native rainbow trout (Oncorhynchus mykiss) and tailed frog larvae (Ascaphus montanus) in relation to maximum stream temperatures during summer. Both occurred in nearly every site sampled, but tailed frog larvae were found in much warmer water than previously reported in the field (26.6??C maximum summer temperature). Our results show that physical stream habitats can remain altered (for example, increased temperature) for many years following wildfire, but that native aquatic vertebrates can be resilient. In a management context, this suggests wildfire may be less of a threat to native species than human influences that alter the capacity of stream-living vertebrates to persist in the face of natural disturbance. ?? 2007 Springer Science+Business Media, LLC.

  16. Energy from streaming current and potential

    NARCIS (Netherlands)

    Olthuis, Wouter; Schippers, Bob; Eijkel, Jan C.T.; van den Berg, Albert

    2005-01-01

    It is investigated how much energy can be delivered by a streaming current source. A streaming current and subsequent streaming potential originate when double layer charge is transported by hydrodynamic flow. Theory and a network model of such a source is presented and initial experimental results

  17. Wadeable Streams Assessment Data

    Science.gov (United States)

    The Wadeable Streams Assessment (WSA) is a first-ever statistically-valid survey of the biological condition of small streams throughout the U.S. The U.S. Environmental Protection Agency (EPA) worked with the states to conduct the assessment in 2004-2005. Data for each parameter sampled in the Wadeable Streams Assessment (WSA) are available for downloading in a series of files as comma separated values (*.csv). Each *.csv data file has a companion text file (*.txt) that lists a dataset label and individual descriptions for each variable. Users should view the *.txt files first to help guide their understanding and use of the data.

  18. Industrial-Strength Streaming Video.

    Science.gov (United States)

    Avgerakis, George; Waring, Becky

    1997-01-01

    Corporate training, financial services, entertainment, and education are among the top applications for streaming video servers, which send video to the desktop without downloading the whole file to the hard disk, saving time and eliminating copyrights questions. Examines streaming video technology, lists ten tips for better net video, and ranks…

  19. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  20. Size-based sorting of micro-particles using microbubble streaming

    Science.gov (United States)

    Wang, Cheng; Jalikop, Shreyas; Hilgenfeldt, Sascha

    2009-11-01

    Oscillating microbubbles driven by ultrasound have shown great potential in microfluidic applications, such as transporting particles and promoting mixing [1-3]. The oscillations generate secondary steady streaming that can also trap particles. We use the streaming to develop a method of sorting particles of different sizes in an initially well-mixed solution. The solution is fed into a channel consisting of bubbles placed periodically along a side wall. When the bubbles are excited by an ultrasound piezo-electric transducer to produce steady streaming, the flow field is altered by the presence of the particles. This effect is dependent on particle size and results in size-based sorting of the particles. The effectiveness of the separation depends on the dimensions of the bubbles and particles as well as on the ultrasound frequency. Our experimental studies are aimed at a better understanding of the design and control of effective microfluidic separating devices. Ref: [1] P. Marmottant and S. Hilgenfeldt, Nature 423, 153 (2003). [2] P. Marmottant and S. Hilgenfeldt, Proc. Natl. Acad. Science USA, 101, 9523 (2004). [3] P. Marmottant, J.-P. Raven, H. Gardeniers, J. G. Bomer, and S. Hilgenfeldt, J. Fluid Mech., vol.568, 109 (2006).

  1. A multi-scaled approach to evaluating the fish assemblage structure within southern Appalachian streams USA.

    Science.gov (United States)

    Kirsch, Joseph; Peterson, James T.

    2014-01-01

    There is considerable uncertainty about the relative roles of stream habitat and landscape characteristics in structuring stream-fish assemblages. We evaluated the relative importance of environmental characteristics on fish occupancy at the local and landscape scales within the upper Little Tennessee River basin of Georgia and North Carolina. Fishes were sampled using a quadrat sample design at 525 channel units within 48 study reaches during two consecutive years. We evaluated species–habitat relationships (local and landscape factors) by developing hierarchical, multispecies occupancy models. Modeling results suggested that fish occupancy within the Little Tennessee River basin was primarily influenced by stream topology and topography, urban land coverage, and channel unit types. Landscape scale factors (e.g., urban land coverage and elevation) largely controlled the fish assemblage structure at a stream-reach level, and local-scale factors (i.e., channel unit types) influenced fish distribution within stream reaches. Our study demonstrates the utility of a multi-scaled approach and the need to account for hierarchy and the interscale interactions of factors influencing assemblage structure prior to monitoring fish assemblages, developing biological management plans, or allocating management resources throughout a stream system.

  2. STREAMS - Technology Programme. Yearbook 2003

    International Nuclear Information System (INIS)

    2003-01-01

    The STREAMS Technology Programme addresses municipal waste. Municipal waste is composed of waste from households and small businesses. The programme focuses on five areas Waste prevention, Collection, transportation, and management of waste streams, Waste treatment technologies, Waste recycling into raw materials and new products, Landfill technologies. The development projects of the STREAMS Programme utilize a number of different technologies, such as biotechnology, information technology, materials technology, measurement and analysis, and automation technology. Finnish expertise in materials recycling technologies and related electronics and information technology is extremely high on a worldwide scale even though the companies represent SMEs. Started in 2001, the STREAMS programme has a total volume of 27 million euros, half of which is funded by Tekes. The programme runs through the end of 2004. (author)

  3. Nutrient spiraling in streams and river networks

    Science.gov (United States)

    Ensign, Scott H.; Doyle, Martin W.

    2006-12-01

    Over the past 3 decades, nutrient spiraling has become a unifying paradigm for stream biogeochemical research. This paper presents (1) a quantitative synthesis of the nutrient spiraling literature and (2) application of these data to elucidate trends in nutrient spiraling within stream networks. Results are based on 404 individual experiments on ammonium (NH4), nitrate (NO3), and phosphate (PO4) from 52 published studies. Sixty-nine percent of the experiments were performed in first- and second-order streams, and 31% were performed in third- to fifth-order streams. Uptake lengths, Sw, of NH4 (median = 86 m) and PO4 (median = 96 m) were significantly different (α = 0.05) than NO3 (median = 236 m). Areal uptake rates of NH4 (median = 28 μg m-2 min-1) were significantly different than NO3 and PO4 (median = 15 and 14 μg m-2 min-1, respectively). There were significant differences among NH4, NO3, and PO4 uptake velocity (median = 5, 1, and 2 mm min-1, respectively). Correlation analysis results were equivocal on the effect of transient storage on nutrient spiraling. Application of these data to a stream network model showed that recycling (defined here as stream length ÷ Sw) of NH4 and NO3 generally increased with stream order, while PO4 recycling remained constant along a first- to fifth-order stream gradient. Within this hypothetical stream network, cumulative NH4 uptake decreased slightly with stream order, while cumulative NO3 and PO4 uptake increased with stream order. These data suggest the importance of larger rivers to nutrient spiraling and the need to consider how stream networks affect nutrient flux between terrestrial and marine ecosystems.

  4. Stream Lifetimes Against Planetary Encounters

    Science.gov (United States)

    Valsecchi, G. B.; Lega, E.; Froeschle, Cl.

    2011-01-01

    We study, both analytically and numerically, the perturbation induced by an encounter with a planet on a meteoroid stream. Our analytical tool is the extension of pik s theory of close encounters, that we apply to streams described by geocentric variables. The resulting formulae are used to compute the rate at which a stream is dispersed by planetary encounters into the sporadic background. We have verified the accuracy of the analytical model using a numerical test.

  5. A PCA-Based Change Detection Framework for Multidimensional Data Streams

    KAUST Repository

    Qahtan, Abdulhakim Ali Ali

    2015-08-10

    Detecting changes in multidimensional data streams is an important and challenging task. In unsupervised change detection, changes are usually detected by comparing the distribution in a current (test) window with a reference window. It is thus essential to design divergence metrics and density estimators for comparing the data distributions, which are mostly done for univariate data. Detecting changes in multidimensional data streams brings difficulties to the density estimation and comparisons. In this paper, we propose a framework for detecting changes in multidimensional data streams based on principal component analysis, which is used for projecting data into a lower dimensional space, thus facilitating density estimation and change-score calculations. The proposed framework also has advantages over existing approaches by reducing computational costs with an efficient density estimator, promoting the change-score calculation by introducing effective divergence metrics, and by minimizing the efforts required from users on the threshold parameter setting by using the Page-Hinkley test. The evaluation results on synthetic and real data show that our framework outperforms two baseline methods in terms of both detection accuracy and computational costs.

  6. THE PAL 5 STAR STREAM GAPS

    International Nuclear Information System (INIS)

    Carlberg, R. G.; Hetherington, Nathan; Grillmair, C. J.

    2012-01-01

    Pal 5 is a low-mass, low-velocity-dispersion, globular cluster with spectacular tidal tails. We use the Sloan Digital Sky Survey Data Release 8 data to extend the density measurements of the trailing star stream to 23 deg distance from the cluster, at which point the stream runs off the edge of the available sky coverage. The size and the number of gaps in the stream are measured using a filter which approximates the structure of the gaps found in stream simulations. We find 5 gaps that are at least 99% confidence detections with about a dozen gaps at 90% confidence. The statistical significance of a gap is estimated using bootstrap resampling of the control regions on either side of the stream. The density minimum closest to the cluster is likely the result of the epicyclic orbits of the tidal outflow and has been discounted. To create the number of 99% confidence gaps per unit length at the mean age of the stream requires a halo population of nearly a thousand dark matter sub-halos with peak circular velocities above 1 km s –1 within 30 kpc of the galactic center. These numbers are a factor of about three below cold stream simulation at this sub-halo mass or velocity but, given the uncertainties in both measurement and more realistic warm stream modeling, are in substantial agreement with the LCDM prediction.

  7. Fish populations in Plynlimon streams

    Directory of Open Access Journals (Sweden)

    D. T. Crisp

    1997-01-01

    Full Text Available In Plynlimon streams, brown trout (Salmo trutta L. are widespread in the upper Wye at population densities of 0.03 to 0.32 fish m-2 and show evidence of successful recruitment in most years. In the upper Severn, brown trout are found only in an area of c. 1670 -2 downstream of Blaenhafren Falls at densities of 0.03 to 0.24 fish -2 and the evidence suggests very variable year to year success in recruitment (Crisp & Beaumont, 1996. Analyses of the data show that temperature differences between afforested and unafforested streams may affect the rates of trout incubation and growth but are not likely to influence species survival. Simple analyses of stream discharge data suggest, but do not prove, that good years for recruitment in the Hafren population were years of low stream discharge. This may be linked to groundwater inputs detected in other studies in this stream. More research is needed to explain the survival of the apparently isolated trout population in the Hafren.

  8. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

    Directory of Open Access Journals (Sweden)

    Jeyamala Chandrasekaran

    2015-01-01

    Full Text Available Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES and (ii generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  9. Stream Response to an Extreme Defoliation Event

    Science.gov (United States)

    Gold, A.; Loffredo, J.; Addy, K.; Bernhardt, E. S.; Berdanier, A. B.; Schroth, A. W.; Inamdar, S. P.; Bowden, W. B.

    2017-12-01

    Extreme climatic events are known to profoundly impact stream flow and stream fluxes. These events can also exert controls on insect outbreaks, which may create marked changes in stream characteristics. The invasive Gypsy Moth (Lymantria dispar dispar) experiences episodic infestations based on extreme climatic conditions within the northeastern U.S. In most years, gypsy moth populations are kept in check by diseases. In 2016 - after successive years of unusually warm, dry spring and summer weather -gypsy moth caterpillars defoliated over half of Rhode Island's 160,000 forested ha. No defoliation of this magnitude had occurred for more than 30 years. We examined one RI headwater stream's response to the defoliation event in 2016 compared with comparable data in 2014 and 2015. Stream temperature and flow was gauged continuously by USGS and dissolved oxygen (DO) was measured with a YSI EXO2 sonde every 30 minutes during a series of deployments in the spring, summer and fall from 2014-2016. We used the single station, open channel method to estimate stream metabolism metrics. We also assessed local climate and stream temperature data from 2009-2016. We observed changes in stream responses during the defoliation event that suggest changes in ET, solar radiation and heat flux. Although the summer of 2016 had more drought stress (PDSI) than previous years, stream flow occurred throughout the summer, in contrast to several years with lower drought stress when stream flow ceased. Air temperature in 2016 was similar to prior years, but stream temperature was substantially higher than the prior seven years, likely due to the loss of canopy shading. DO declined dramatically in 2016 compared to prior years - more than the rising stream temperatures would indicate. Gross Primary Productivity was significantly higher during the year of the defoliation, indicating more total fixation of inorganic carbon from photo-autotrophs. In 2016, Ecosystem Respiration was also higher and Net

  10. Performance Modeling in CUDA Streams - A Means for High-Throughput Data Processing.

    Science.gov (United States)

    Li, Hao; Yu, Di; Kumar, Anand; Tu, Yi-Cheng

    2014-10-01

    Push-based database management system (DBMS) is a new type of data processing software that streams large volume of data to concurrent query operators. The high data rate of such systems requires large computing power provided by the query engine. In our previous work, we built a push-based DBMS named G-SDMS to harness the unrivaled computational capabilities of modern GPUs. A major design goal of G-SDMS is to support concurrent processing of heterogenous query processing operations and enable resource allocation among such operations. Understanding the performance of operations as a result of resource consumption is thus a premise in the design of G-SDMS. With NVIDIA's CUDA framework as the system implementation platform, we present our recent work on performance modeling of CUDA kernels running concurrently under a runtime mechanism named CUDA stream . Specifically, we explore the connection between performance and resource occupancy of compute-bound kernels and develop a model that can predict the performance of such kernels. Furthermore, we provide an in-depth anatomy of the CUDA stream mechanism and summarize the main kernel scheduling disciplines in it. Our models and derived scheduling disciplines are verified by extensive experiments using synthetic and real-world CUDA kernels.

  11. Successive measurements of streaming potential and electroosmotic pressure with the same core-holder

    Science.gov (United States)

    Yin, Chenggang; Hu, Hengshan; Yu, Chunhao; Wang, Jun

    2018-05-01

    Successive measurements of the streaming potential and electroosmotic pressure of each core sample are important for understanding the mechanisms of electrokinetic effects. In previous studies, one plug of the core-holder needs to be replaced in these two experiments, which causes the change of the fluid parameters and the boundary conditions in the core. We design a new core-holder to permit successive experiments without plug replacement, which ensures the consistency of the measurement environment. A two-direction harmonic pressure-driving source is accordingly designed. Using this new equipment, electrokinetic experiments conducted ten core samples at 0.4 mol/L NaCl solution. The results show good agreement between the electrokinetically deduced permeability and premeasured gas permeability. For high salinity saturated samples, the permeability can be inverted from electroosmotic effect instead of the streaming potential.

  12. Generation of gamma-ray streaming kernels through cylindrical ducts via Monte Carlo method

    International Nuclear Information System (INIS)

    Kim, Dong Su

    1992-02-01

    Since radiation streaming through penetrations is often the critical consideration in protection against exposure of personnel in a nuclear facility, it has been of great concern in radiation shielding design and analysis. Several methods have been developed and applied to the analysis of the radiation streaming in the past such as ray analysis method, single scattering method, albedo method, and Monte Carlo method. But they may be used for order-of-magnitude calculations and where sufficient margin is available, except for the Monte Carlo method which is accurate but requires a lot of computing time. This study developed a Monte Carlo method and constructed a data library of solutions using the Monte Carlo method for radiation streaming through a straight cylindrical duct in concrete walls of a broad, mono-directional, monoenergetic gamma-ray beam of unit intensity. The solution named as plane streaming kernel is the average dose rate at duct outlet and was evaluated for 20 source energies from 0 to 10 MeV, 36 source incident angles from 0 to 70 degrees, 5 duct radii from 10 to 30 cm, and 16 wall thicknesses from 0 to 100 cm. It was demonstrated that average dose rate due to an isotropic point source at arbitrary positions can be well approximated using the plane streaming kernel with acceptable error. Thus, the library of the plane streaming kernels can be used for the accurate and efficient analysis of radiation streaming through a straight cylindrical duct in concrete walls due to arbitrary distributions of gamma-ray sources

  13. Pesticide load dynamics during stormwater flow events in Mediterranean coastal streams: Alexander stream case study.

    Science.gov (United States)

    Topaz, Tom; Egozi, Roey; Eshel, Gil; Chefetz, Benny

    2018-06-01

    Cultivated land is a major source of pesticides, which are transported with the runoff water and eroded soil during rainfall events and pollute riverine and estuarine environments. Common ecotoxicological assessments of riverine systems are mainly based on water sampling and analysis of only the dissolved phase, and address a single pesticide's toxicological impact under laboratory conditions. A clear overview of mixtures of pesticides in the adsorbed and dissolved phases is missing, and therefore the full ecotoxicological impact is not fully addressed. The aim of this study was to characterize and quantify pesticide concentrations in both suspended sediment and dissolved phases, to provide a better understanding of pesticide-load dynamics during storm events in coastal streams in a Mediterranean climate. High-resolution sampling campaigns of seven flood events were conducted during two rainy seasons in Alexander stream, Israel. Samples of suspended sediments were separated from the solution and both media were analyzed separately for 250 pesticides. A total of 63 pesticides were detected; 18 and 16 pesticides were found solely in the suspended sediments and solution, respectively. Significant differences were observed among the pesticide groups: only 7% of herbicide, 20% of fungicide and 42% of insecticide load was transported with the suspended sediments. However, in both dissolved and adsorbed phases, a mix of pesticides was found which were graded from "mobile" to "non-mobile" with varied distribution coefficients. Diuron, and tebuconazole were frequently found in large quantities in both phases. Whereas insecticide and fungicide transport is likely governed by application time and method, the governing factor for herbicide load was the magnitude of the stream discharge. The results show a complex dynamic of pesticide load affected by excessive use of pesticides, which should be taken into consideration when designing projects to monitor riverine and estuarine

  14. Resource synergy in stream periphyton communities

    Energy Technology Data Exchange (ETDEWEB)

    Hill, Walter [University of Illinois, Urbana-Champaign; Fanta, S.E. [University of Illinois; Roberts, Brian J [ORNL; Francoeur, Steven N. [Eastern Michigan University, Ypsilanti, MI

    2011-03-01

    1. Light and nutrients play pivotal roles in determining the growth of autotrophs, yet the potential for synergistic interactions between the two resources in algal communities is poorly understood, especially in stream ecosystems. In this study, light and phosphorus were manipulated in large experimental streams to examine resource colimitation and synergy in stream periphyton. 2. Whole-stream metabolism was simultaneously limited by light and phosphorus. Increasing the supply of either light or phosphorus resulted in significant increases in primary production and the transformation of the streams from heterotrophy to autotrophy. 3. Resource-driven changes in periphyton community structure occurred in concert with changes in production. Algal assemblages in highly shaded streams were composed primarily of small diatoms such as Achnanthidium minutissima, whereas larger diatoms such as Melosira varians predominated at higher irradiances. Phosphorus enrichment had relatively little effect on assemblage structure, but it did substantially diminish the abundance of Meridion circulare, a diatom whose mucilaginous colonies were conspicuously abundant in phosphorus-poor, high-light streams. Bacterial biomass declined relative to algal biomass with increases in primary productivity, regardless of whether the increases were caused by light or phosphorus. 4. Synergistic effects on primary production appeared to occur because the availability of one resource facilitated the utilization of the other. Light increased the abundance of large diatoms, which are known to convert high concentrations of nutrients into primary production more effectively than smaller taxa. Phosphorus enrichment led to the replacement of Meridion circulare by non-mucilaginous taxa in phosphorus-enriched streams, and we hypothesize that this change enabled more efficient use of light in photosynthesis. Higher ratios of chlorophyll a : biomass in phosphorus-enriched streams may have also led to more

  15. Discharge modulates stream metabolism dependence on fine particulate organic carbon in a Mediterranean WWTP-influenced stream

    Science.gov (United States)

    Drummond, J. D.; Bernal, S.; Meredith, W.; Schumer, R.; Martí Roca, E.

    2017-12-01

    Waste water treatment plant (WWTP) effluents constitute point source inputs of fine sediment, nutrients, carbon, and microbes to stream ecosystems. A range of responses to these inputs may be observed in recipient streams, including increases in respiration rates, which augment CO2 emissions to the atmosphere. Yet, little is known about which fractions of organic carbon (OC) contribute the most to stream metabolism in WWTP-influenced streams. Fine particulate OC (POC) represents ca. 40% of the total mass of OC in river networks, and is generally more labile than dissolved OC. Therefore, POC inputs from WWTPs could contribute disproportionately to higher rates of heterotrophic metabolism by stream microbial communities. The aim of this study was to investigate the influence of POC inputs from a WWTP effluent on the metabolism of a Mediterranean stream over a wide range of hydrologic conditions. We hypothesized that POC inputs would have a positive effect on respiration rates, and that the response to POC availability would be larger during low flows when the dilution capacity of the recipient stream is negligible. We focused on the easily resuspended fine sediment near the sediment-water interface (top 3 cm), as this region is a known hot spot for biogeochemical processes. For one year, samples of resuspended sediment were collected bimonthly at 7 sites from 0 to 800 m downstream of the WWTP point source. We measured total POC, organic matter (OM) content (%), and the associated metabolic activity of the resuspended sediment using the resazurin-resorufin smart tracer system as a proxy for aerobic ecosystem respiration. Resuspended sediment showed no difference in total POC over the year, while the OM content increased with decreasing discharge. This result together with the decreasing trend of total POC observed downstream of the point source during autumn after a long dry period, suggests that the WWTP effluent was the main contributor to stream POC. Furthermore

  16. Fast algorithm for automatically computing Strahler stream order

    Science.gov (United States)

    Lanfear, Kenneth J.

    1990-01-01

    An efficient algorithm was developed to determine Strahler stream order for segments of stream networks represented in a Geographic Information System (GIS). The algorithm correctly assigns Strahler stream order in topologically complex situations such as braided streams and multiple drainage outlets. Execution time varies nearly linearly with the number of stream segments in the network. This technique is expected to be particularly useful for studying the topology of dense stream networks derived from digital elevation model data.

  17. Efficient Estimation of Dynamic Density Functions with Applications in Streaming Data

    KAUST Repository

    Qahtan, Abdulhakim

    2016-05-11

    Recent advances in computing technology allow for collecting vast amount of data that arrive continuously in the form of streams. Mining data streams is challenged by the speed and volume of the arriving data. Furthermore, the underlying distribution of the data changes over the time in unpredicted scenarios. To reduce the computational cost, data streams are often studied in forms of condensed representation, e.g., Probability Density Function (PDF). This thesis aims at developing an online density estimator that builds a model called KDE-Track for characterizing the dynamic density of the data streams. KDE-Track estimates the PDF of the stream at a set of resampling points and uses interpolation to estimate the density at any given point. To reduce the interpolation error and computational complexity, we introduce adaptive resampling where more/less resampling points are used in high/low curved regions of the PDF. The PDF values at the resampling points are updated online to provide up-to-date model of the data stream. Comparing with other existing online density estimators, KDE-Track is often more accurate (as reflected by smaller error values) and more computationally efficient (as reflected by shorter running time). The anytime available PDF estimated by KDE-Track can be applied for visualizing the dynamic density of data streams, outlier detection and change detection in data streams. In this thesis work, the first application is to visualize the taxi traffic volume in New York city. Utilizing KDE-Track allows for visualizing and monitoring the traffic flow on real time without extra overhead and provides insight analysis of the pick up demand that can be utilized by service providers to improve service availability. The second application is to detect outliers in data streams from sensor networks based on the estimated PDF. The method detects outliers accurately and outperforms baseline methods designed for detecting and cleaning outliers in sensor data. The

  18. Waste streams from reprocessing operations

    International Nuclear Information System (INIS)

    Andersson, B.; Ericsson, A.-M.

    1978-03-01

    The three main products from reprocessing operations are uranium, plutonium and vitrified high-level-waste. The purpose of this report is to identify and quantify additional waste streams containing radioactive isotops. Special emphasis is laid on Sr, Cs and the actinides. The main part, more than 99 % of both the fission-products and the transuranic elements are contained in the HLW-stream. Small quantities sometimes contaminate the U- and Pu-streams and the rest is found in the medium-level-waste

  19. Enhancing the Dialogue in Simultaneous Class-Based and Live Video-Streamed Teaching

    DEFF Research Database (Denmark)

    Jelsbak, Vibe Alopaeus; Ørngreen, Rikke; Thorsen, Jonas

    2015-01-01

    teaching. This paper describes a work-in-progress project focused on developing possibilities for a more dialogue-based approach to live video-streamed teaching. We present our new setup and argue for educational designs which this is believed to support, and we outline the research design for collecting...... and analysing data. The first analysis and interpretations will be discussed at the ECEL 2015 conference poster session....

  20. Potential stream density in Mid-Atlantic US watersheds.

    Science.gov (United States)

    Elmore, Andrew J; Julian, Jason P; Guinn, Steven M; Fitzpatrick, Matthew C

    2013-01-01

    Stream network density exerts a strong influence on ecohydrologic processes in watersheds, yet existing stream maps fail to capture most headwater streams and therefore underestimate stream density. Furthermore, discrepancies between mapped and actual stream length vary between watersheds, confounding efforts to understand the impacts of land use on stream ecosystems. Here we report on research that predicts stream presence from coupled field observations of headwater stream channels and terrain variables that were calculated both locally and as an average across the watershed upstream of any location on the landscape. Our approach used maximum entropy modeling (MaxEnt), a robust method commonly implemented to model species distributions that requires information only on the presence of the entity of interest. In validation, the method correctly predicts the presence of 86% of all 10-m stream segments and errors are low (stream density and compare our results with the National Hydrography Dataset (NHD). We find that NHD underestimates stream density by up to 250%, with errors being greatest in the densely urbanized cities of Washington, DC and Baltimore, MD and in regions where the NHD has never been updated from its original, coarse-grain mapping. This work is the most ambitious attempt yet to map stream networks over a large region and will have lasting implications for modeling and conservation efforts.

  1. Stream periphyton responses to mesocosm treatments of ...

    Science.gov (United States)

    A stream mesocosm experiment was designed to compare biotic responses among streams exposed to an equal excess specific conductivity target of 850 µS/cm relative to a control that was set for 200 µS/cm and three treatments comprised of different major ion contents. Each treatment and the control was replicated 4 times at the mesocosm scale (16 mesocosms total). The treatments were based on dosing the background mesocosm water, a continuous flow-through mixture of natural river water and reverse osmosis treated water, with stock salt solutions prepared from 1) a mixture of sodium chloride and calcium chloride (Na/Cl chloride), 2) sodium bicarbonate, and 3) magnesium sulfate. The realized average specific conductance over the first 28d of continuous dosing was 827, 829, and 847 µS/cm, for the chloride, bicarbonate, and sulfate based treatments, respectively, and did not differ significantly. The controls averaged 183 µS/cm. Here we focus on comparing stream periphyton communities across treatments based on measurements obtained from a Pulse-Amplitude Modulated (PAM) fluorometer. The fluorometer is used in situ and with built in algorithms distributes the total aerial algal biomass (µg/cm2) of the periphyton among cyanobacteria, diatoms, and green algae. A measurement is recorded in a matter of seconds and, therefore, many different locations can be measured with in each mesocosm at a high return frequency. Eight locations within each of the 1 m2 (0.3 m W x 3

  2. Modeling the effects of LID practices on streams health at watershed scale

    Science.gov (United States)

    Shannak, S.; Jaber, F. H.

    2013-12-01

    Increasing impervious covers due to urbanization will lead to an increase in runoff volumes, and eventually increase flooding. Stream channels adjust by widening and eroding stream bank which would impact downstream property negatively (Chin and Gregory, 2001). Also, urban runoff drains in sediment bank areas in what's known as riparian zones and constricts stream channels (Walsh, 2009). Both physical and chemical factors associated with urbanization such as high peak flows and low water quality further stress aquatic life and contribute to overall biological condition of urban streams (Maxted et al., 1995). While LID practices have been mentioned and studied in literature for stormwater management, they have not been studied in respect to reducing potential impact on stream health. To evaluate the performance and the effectiveness of LID practices at a watershed scale, sustainable detention pond, bioretention, and permeable pavement will be modeled at watershed scale. These measures affect the storm peak flows and base flow patterns over long periods, and there is a need to characterize their effect on stream bank and bed erosion, and aquatic life. These measures will create a linkage between urban watershed development and stream conditions specifically biological health. The first phase of this study is to design and construct LID practices at the Texas A&M AgriLife Research and Extension Center-Dallas, TX to collect field data about the performance of these practices on a smaller scale. The second phase consists of simulating the performance of LID practices on a watershed scale. This simulation presents a long term model (23 years) using SWAT to evaluate the potential impacts of these practices on; potential stream bank and bed erosion, and potential impact on aquatic life in the Blunn Watershed located in Austin, TX. Sub-daily time step model simulations will be developed to simulate the effectiveness of the three LID practices with respect to reducing

  3. Performance of the air2stream model that relates air and stream water temperatures depends on the calibration method

    Science.gov (United States)

    Piotrowski, Adam P.; Napiorkowski, Jaroslaw J.

    2018-06-01

    A number of physical or data-driven models have been proposed to evaluate stream water temperatures based on hydrological and meteorological observations. However, physical models require a large amount of information that is frequently unavailable, while data-based models ignore the physical processes. Recently the air2stream model has been proposed as an intermediate alternative that is based on physical heat budget processes, but it is so simplified that the model may be applied like data-driven ones. However, the price for simplicity is the need to calibrate eight parameters that, although have some physical meaning, cannot be measured or evaluated a priori. As a result, applicability and performance of the air2stream model for a particular stream relies on the efficiency of the calibration method. The original air2stream model uses an inefficient 20-year old approach called Particle Swarm Optimization with inertia weight. This study aims at finding an effective and robust calibration method for the air2stream model. Twelve different optimization algorithms are examined on six different streams from northern USA (states of Washington, Oregon and New York), Poland and Switzerland, located in both high mountains, hilly and lowland areas. It is found that the performance of the air2stream model depends significantly on the calibration method. Two algorithms lead to the best results for each considered stream. The air2stream model, calibrated with the chosen optimization methods, performs favorably against classical streamwater temperature models. The MATLAB code of the air2stream model and the chosen calibration procedure (CoBiDE) are available as Supplementary Material on the Journal of Hydrology web page.

  4. Alignment data streams for the ATLAS inner detector

    CERN Document Server

    Pinto, B; Pereira, P; Elsing, M; Hawkings, R; Schieck, J; García, S; Schaffer, A; Ma, H; Anjos, A

    2008-01-01

    The ATLAS experiment uses a complex trigger strategy to be able to reduce the Event Filter rate output, down to a level that allows the storage and processing of these data. These concepts are described in the ATLAS Computing Model which embraces Grid paradigm. The output coming from the Event Filter consists of four main streams: physical stream, express stream, calibration stream, and diagnostic stream. The calibration stream will be transferred to the Tier-0 facilities that will provide the prompt reconstruction of this stream with a minimum latency of 8 hours, producing calibration constants of sufficient quality to allow a first-pass processing. The Inner Detector community is developing and testing an independent common calibration stream selected at the Event Filter after track reconstruction. It is composed of raw data, in byte-stream format, contained in Readout Buffers (ROBs) with hit information of the selected tracks, and it will be used to derive and update a set of calibration and alignment cons...

  5. Stream Habitat Reach Summary - NCWAP [ds158

    Data.gov (United States)

    California Natural Resource Agency — The Stream Habitat - NCWAP - Reach Summary [ds158] shapefile contains in-stream habitat survey data summarized to the stream reach level. It is a derivative of the...

  6. Predicting Vulnerability of the Integrity and Connectivity Associated with Culverts in Low Order Streams of Northern Michigan

    Science.gov (United States)

    King, C. H.; Wagenbrenner, J.; Fedora, M.; Watkins, D.; Watkins, M. K.; Huckins, C.

    2017-12-01

    The Great Lakes Region of North America has experienced more frequent extreme precipitation events in recent decades, resulting in a large number of stream crossing failures. While there are accepted methods for designing stream crossings to accommodate peak storm discharges, less attention has been paid to assessing the risk of failure. To evaluate failure risk and potential impacts, coarse-resolution stream crossing surveys were completed on 51 stream crossings and dams in the North Branch Paint River watershed in Michigan's Upper Peninsula. These inventories determined stream crossing dimensions along with stream and watershed characteristics. Eleven culverts were selected from the coarse surveys for high resolution hydraulic analysis to estimate discharge conditions expected at crossing failure. Watershed attributes upstream of the crossing, including area, slope, and storage, were acquired. Sediment discharge and the economic impact associated with a failure event were also estimated for each stream crossing. Impacts to stream connectivity and fish passability were assessed from the coarse-level surveys. Using information from both the coarse and high-resolution surveys, we also developed indicators to predict failure risk without the need for complex hydraulic modeling. These passability scores and failure risk indicators will help to prioritize infrastructure replacement and improve the overall connectivity of river systems throughout the upper Great Lakes Region.

  7. Quadrature demodulation based circuit implementation of pulse stream for ultrasonic signal FRI sparse sampling

    International Nuclear Information System (INIS)

    Shoupeng, Song; Zhou, Jiang

    2017-01-01

    Converting ultrasonic signal to ultrasonic pulse stream is the key step of finite rate of innovation (FRI) sparse sampling. At present, ultrasonic pulse-stream-forming techniques are mainly based on digital algorithms. No hardware circuit that can achieve it has been reported. This paper proposes a new quadrature demodulation (QD) based circuit implementation method for forming an ultrasonic pulse stream. Elaborating on FRI sparse sampling theory, the process of ultrasonic signal is explained, followed by a discussion and analysis of ultrasonic pulse-stream-forming methods. In contrast to ultrasonic signal envelope extracting techniques, a quadrature demodulation method (QDM) is proposed. Simulation experiments were performed to determine its performance at various signal-to-noise ratios (SNRs). The circuit was then designed, with mixing module, oscillator, low pass filter (LPF), and root of square sum module. Finally, application experiments were carried out on pipeline sample ultrasonic flaw testing. The experimental results indicate that the QDM can accurately convert ultrasonic signal to ultrasonic pulse stream, and reverse the original signal information, such as pulse width, amplitude, and time of arrival. This technique lays the foundation for ultrasonic signal FRI sparse sampling directly with hardware circuitry. (paper)

  8. Numeric Analysis for Relationship-Aware Scalable Streaming Scheme

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2014-01-01

    Full Text Available Frequent packet loss of media data is a critical problem that degrades the quality of streaming services over mobile networks. Packet loss invalidates frames containing lost packets and other related frames at the same time. Indirect loss caused by losing packets decreases the quality of streaming. A scalable streaming service can decrease the amount of dropped multimedia resulting from a single packet loss. Content providers typically divide one large media stream into several layers through a scalable streaming service and then provide each scalable layer to the user depending on the mobile network. Also, a scalable streaming service makes it possible to decode partial multimedia data depending on the relationship between frames and layers. Therefore, a scalable streaming service provides a way to decrease the wasted multimedia data when one packet is lost. However, the hierarchical structure between frames and layers of scalable streams determines the service quality of the scalable streaming service. Even if whole packets of layers are transmitted successfully, they cannot be decoded as a result of the absence of reference frames and layers. Therefore, the complicated relationship between frames and layers in a scalable stream increases the volume of abandoned layers. For providing a high-quality scalable streaming service, we choose a proper relationship between scalable layers as well as the amount of transmitted multimedia data depending on the network situation. We prove that a simple scalable scheme outperforms a complicated scheme in an error-prone network. We suggest an adaptive set-top box (AdaptiveSTB to lower the dependency between scalable layers in a scalable stream. Also, we provide a numerical model to obtain the indirect loss of multimedia data and apply it to various multimedia streams. Our AdaptiveSTB enhances the quality of a scalable streaming service by removing indirect loss.

  9. Probing dark matter streams with CoGeNT

    International Nuclear Information System (INIS)

    Natarajan, Aravind; Savage, Christopher; Freese, Katherine

    2011-01-01

    We examine the future sensitivity of CoGeNT to the presence of dark matter streams and find that consideration of streams in the data may lead to differences in the interpretation of the results. We show the allowed particle mass and cross section for different halo parameters, assuming spin-independent elastic scattering. As an example, we choose a stream with the same velocity profile as that of the Sagittarius stream (and in the Solar neighborhood) and find that, with an exposure of ∼10 kg yr, the CoGeNT results can be expected to exclude the standard-halo-model-only halo in favor of a standard halo model+stream halo at the 95% (99.7%) confidence level, provided the stream contributes 3% (5%) of the local dark matter density. The presence of a significant stream component may result in incorrect estimates of the particle mass and cross section unless the presence of the stream is taken into account. We conclude that the CoGeNT experiment is sensitive to streams and care should be taken to include the possibility of streams when analyzing experimental results.

  10. Streaming Compression of Hexahedral Meshes

    Energy Technology Data Exchange (ETDEWEB)

    Isenburg, M; Courbet, C

    2010-02-03

    We describe a method for streaming compression of hexahedral meshes. Given an interleaved stream of vertices and hexahedral our coder incrementally compresses the mesh in the presented order. Our coder is extremely memory efficient when the input stream documents when vertices are referenced for the last time (i.e. when it contains topological finalization tags). Our coder then continuously releases and reuses data structures that no longer contribute to compressing the remainder of the stream. This means in practice that our coder has only a small fraction of the whole mesh in memory at any time. We can therefore compress very large meshes - even meshes that do not file in memory. Compared to traditional, non-streaming approaches that load the entire mesh and globally reorder it during compression, our algorithm trades a less compact compressed representation for significant gains in speed, memory, and I/O efficiency. For example, on the 456k hexahedra 'blade' mesh, our coder is twice as fast and uses 88 times less memory (only 3.1 MB) with the compressed file increasing about 3% in size. We also present the first scheme for predictive compression of properties associated with hexahedral cells.

  11. DETECTION OF A NEARBY HALO DEBRIS STREAM IN THE WISE AND 2MASS SURVEYS

    Energy Technology Data Exchange (ETDEWEB)

    Grillmair, Carl J. [Spitzer Science Center, 1200 E. California Blvd., Pasadena, CA 91125 (United States); Cutri, Roc; Masci, Frank J.; Conrow, Tim [Infrared Processing and Analysis Center, California Institute of Technology, Pasadena, CA 91125 (United States); Sesar, Branimir [Division of Physics, Mathematics, and Astronomy, California Institute of Technology, Pasadena, CA 91125 (United States); Eisenhardt, Peter R. M. [Jet Propulsion Laboratory, California Institute of Technology, MS 169-327, 4800 Oak Grove Drive, Pasadena, CA 91109 (United States); Wright, Edward L., E-mail: carl@ipac.caltech.edu, E-mail: roc@ipac.caltech.edu, E-mail: fmasci@ipac.caltech.edu, E-mail: tim@ipac.caltech.edu, E-mail: bsesar@astro.caltech.edu, E-mail: peter.r.eisenhardt@jpl.nasa.gov, E-mail: wright@astro.ucla.edu [Department of Physics, University of California, Los Angeles, CA 90095 (United States)

    2013-06-01

    Combining the Wide-Field Infrared Survey Explorer All-Sky Release with the Two Micron All Sky Survey Point Source Catalog, we detect a nearby, moderately metal-poor stellar debris stream spanning 24° across the southern sky. The stream, which we designate Alpheus, is at an estimated distance of ∼1.9 kpc. Its position, orientation, width, estimated metallicity, and, to some extent, its distance, are in approximate agreement with what one might expect of the leading tidal tail of the southern globular cluster NGC 288.

  12. The modelling and design of radio tomography antennas

    CSIR Research Space (South Africa)

    Vogt, DR

    2000-09-01

    Full Text Available , as are the in- terfaces between layers of different materials. By contrast, RT is a transmission technique. It can produce images of targets where there is no clearly defined boundary between the target and the host rock. Disseminated sulphide mineralization... stream_source_info Vogt_2000.pdf.txt stream_content_type text/plain stream_size 311829 Content-Encoding UTF-8 stream_name Vogt_2000.pdf.txt Content-Type text/plain; charset=UTF-8 The Modelling and Design of Radio...

  13. Urban Stream Burial Increases Watershed-Scale Nitrate Export.

    Directory of Open Access Journals (Sweden)

    Jake J Beaulieu

    Full Text Available Nitrogen (N uptake in streams is an important ecosystem service that reduces nutrient loading to downstream ecosystems. Here we synthesize studies that investigated the effects of urban stream burial on N-uptake in two metropolitan areas and use simulation modeling to scale our measurements to the broader watershed scale. We report that nitrate travels on average 18 times farther downstream in buried than in open streams before being removed from the water column, indicating that burial substantially reduces N uptake in streams. Simulation modeling suggests that as burial expands throughout a river network, N uptake rates increase in the remaining open reaches which somewhat offsets reduced N uptake in buried reaches. This is particularly true at low levels of stream burial. At higher levels of stream burial, however, open reaches become rare and cumulative N uptake across all open reaches in the watershed rapidly declines. As a result, watershed-scale N export increases slowly at low levels of stream burial, after which increases in export become more pronounced. Stream burial in the lower, more urbanized portions of the watershed had a greater effect on N export than an equivalent amount of stream burial in the upper watershed. We suggest that stream daylighting (i.e., uncovering buried streams can increase watershed-scale N retention.

  14. High-Performance Parallel and Stream Processing of X-ray Microdiffraction Data on Multicores

    International Nuclear Information System (INIS)

    Bauer, Michael A; McIntyre, Stewart; Xie Yuzhen; Biem, Alain; Tamura, Nobumichi

    2012-01-01

    We present the design and implementation of a high-performance system for processing synchrotron X-ray microdiffraction (XRD) data in IBM InfoSphere Streams on multicore processors. We report on the parallel and stream processing techniques that we use to harvest the power of clusters of multicores to analyze hundreds of gigabytes of synchrotron XRD data in order to reveal the microtexture of polycrystalline materials. The timing to process one XRD image using one pipeline is about ten times faster than the best C program at present. With the support of InfoSphere Streams platform, our software is able to be scaled up to operate on clusters of multi-cores for processing multiple images concurrently. This system provides a high-performance processing kernel to achieve near real-time data analysis of image data from synchrotron experiments.

  15. Innovation in radioactive wastewater-stream management. Pt. 1

    International Nuclear Information System (INIS)

    Karameldin, A.

    2002-01-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m 3 /day (when maintaining SDTs at the temperature 75 C) is less than 90 m 3 /h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  16. RStorm: Developing and Testing Streaming Algorithms in R

    NARCIS (Netherlands)

    Kaptein, M.C.

    2014-01-01

    Streaming data, consisting of indefinitely evolving sequences, are becoming ubiquitous in many branches of science and in various applications. Computer scientists have developed streaming applications such as Storm and the S4 distributed stream computing platform1 to deal with data streams.

  17. RStorm : Developing and testing streaming algorithms in R

    NARCIS (Netherlands)

    Kaptein, M.C.

    2014-01-01

    Streaming data, consisting of indefinitely evolving sequences, are becoming ubiquitous in many branches of science and in various applications. Computer scientists have developed streaming applications such as Storm and the S4 distributed stream computing platform1 to deal with data streams.

  18. Sampling, Splitting and Merging in Coinductive Stream Calculus

    NARCIS (Netherlands)

    M. Niqui (Milad); J.J.M.M. Rutten (Jan); C. Bolduc; J. Desharnais; B. Ktari

    2010-01-01

    textabstractWe study various operations for partitioning, projecting and merging streams of data. These operations are motivated by their use in dataflow programming and the stream processing languages. We use the framework of \\emph{stream calculus} and \\emph{stream circuits} for defining and

  19. Sampling, splitting and merging in coinductive stream calculus

    NARCIS (Netherlands)

    M. Niqui (Milad); J.J.M.M. Rutten (Jan)

    2009-01-01

    htmlabstractWe study various operations for partitioning, projecting and merging streams of data. These operations are motivated by their use in dataflow programming and the stream processing languages. We use the framework of stream calculus and stream circuits for defining and proving properties

  20. Ebullitive methane emissions from oxygenated wetland streams

    Science.gov (United States)

    Crawford, John T.; Stanley, Emily H.; Spawn, Seth A.; Finlay, Jacques C.; Striegl, Robert G.

    2014-01-01

    Stream and river carbon dioxide emissions are an important component of the global carbon cycle. Methane emissions from streams could also contribute to regional or global greenhouse gas cycling, but there are relatively few data regarding stream and river methane emissions. Furthermore, the available data do not typically include the ebullitive (bubble-mediated) pathway, instead focusing on emission of dissolved methane by diffusion or convection. Here, we show the importance of ebullitive methane emissions from small streams in the regional greenhouse gas balance of a lake and wetland-dominated landscape in temperate North America and identify the origin of the methane emitted from these well-oxygenated streams. Stream methane flux densities from this landscape tended to exceed those of nearby wetland diffusive fluxes as well as average global wetland ebullitive fluxes. Total stream ebullitive methane flux at the regional scale (103 Mg C yr−1; over 6400 km2) was of the same magnitude as diffusive methane flux previously documented at the same scale. Organic-rich stream sediments had the highest rates of bubble release and higher enrichment of methane in bubbles, but glacial sand sediments also exhibited high bubble emissions relative to other studied environments. Our results from a database of groundwater chemistry support the hypothesis that methane in bubbles is produced in anoxic near-stream sediment porewaters, and not in deeper, oxygenated groundwaters. Methane interacts with other key elemental cycles such as nitrogen, oxygen, and sulfur, which has implications for ecosystem changes such as drought and increased nutrient loading. Our results support the contention that streams, particularly those draining wetland landscapes of the northern hemisphere, are an important component of the global methane cycle.

  1. Rotenone persistence model for montane streams

    Science.gov (United States)

    Brown, Peter J.; Zale, Alexander V.

    2012-01-01

    The efficient and effective use of rotenone is hindered by its unknown persistence in streams. Environmental conditions degrade rotenone, but current label instructions suggest fortifying the chemical along a stream based on linear distance or travel time rather than environmental conditions. Our objective was to develop models that use measurements of environmental conditions to predict rotenone persistence in streams. Detailed measurements of ultraviolet radiation, water temperature, dissolved oxygen, total dissolved solids (TDS), conductivity, pH, oxidation–reduction potential (ORP), substrate composition, amount of organic matter, channel slope, and travel time were made along stream segments located between rotenone treatment stations and cages containing bioassay fish in six streams. The amount of fine organic matter, biofilm, sand, gravel, cobble, rubble, small boulders, slope, pH, TDS, ORP, light reaching the stream, energy dissipated, discharge, and cumulative travel time were each significantly correlated with fish death. By using logistic regression, measurements of environmental conditions were paired with the responses of bioassay fish to develop a model that predicted the persistence of rotenone toxicity in streams. This model was validated with data from two additional stream treatment reaches. Rotenone persistence was predicted by a model that used travel time, rubble, and ORP. When this model predicts a probability of less than 0.95, those who apply rotenone can expect incomplete eradication and should plan on fortifying rotenone concentrations. The significance of travel time has been previously identified and is currently used to predict rotenone persistence. However, rubble substrate, which may be associated with the degradation of rotenone by adsorption and volatilization in turbulent environments, was not previously considered.

  2. Neotropical Amphibian Declines Affect Stream Ecosystem Properties

    Science.gov (United States)

    Connelly, S.; Pringle, C. M.; Bixby, R. J.; Whiles, M. R.; Lips, K. R.; Brenes, R.; Colon-Gaud, J. C.; Kilham, S.; Hunte-Brown, M.

    2005-05-01

    Global declines of amphibians are well documented, yet effects of these dramatic losses on ecosystem structure and function are poorly understood. As part of a larger collaborative project, we compared two upland Panamanian streams. Both streams are biologically and geologically similar; however, one stream (Fortuna) has recently experienced almost complete extirpation of stream-dwelling frogs, while the other (Cope) still has intact populations. We experimentally excluded tadpoles from localized areas in each stream. We then compared chlorophyll a, algal community composition, ash-free dry mass (AFDM), inorganic matter, and insect assemblages in control and exclusion areas. Additionally, we sampled the natural substrate of both streams monthly for chlorophyll a, algal community composition, AFDM, and inorganic matter. At Cope, chlorophyll a, AFDM, and inorganic matter were greater in areas where tadpoles were excluded than in their presence. Numbers of dominant algal species (e.g., Nupela praecipua and Eunotia siolii) were greater in the exclusion versus control treatments. Monthly sampling of natural substrate indicated higher chlorophyll a and AFDM at Cope compared to Fortuna. Our data suggest that stream-dwelling anuran larvae have significant impacts on algal communities. These results also have implications for predicting the relevance of short-term experimental manipulations to long-term, whole-stream processes.

  3. Online feature selection with streaming features.

    Science.gov (United States)

    Wu, Xindong; Yu, Kui; Ding, Wei; Wang, Hao; Zhu, Xingquan

    2013-05-01

    We propose a new online feature selection framework for applications with streaming features where the knowledge of the full feature space is unknown in advance. We define streaming features as features that flow in one by one over time whereas the number of training examples remains fixed. This is in contrast with traditional online learning methods that only deal with sequentially added observations, with little attention being paid to streaming features. The critical challenges for Online Streaming Feature Selection (OSFS) include 1) the continuous growth of feature volumes over time, 2) a large feature space, possibly of unknown or infinite size, and 3) the unavailability of the entire feature set before learning starts. In the paper, we present a novel Online Streaming Feature Selection method to select strongly relevant and nonredundant features on the fly. An efficient Fast-OSFS algorithm is proposed to improve feature selection performance. The proposed algorithms are evaluated extensively on high-dimensional datasets and also with a real-world case study on impact crater detection. Experimental results demonstrate that the algorithms achieve better compactness and higher prediction accuracy than existing streaming feature selection algorithms.

  4. Effect of multi-stream heat exchanger on performance of natural gas liquefaction with mixed refrigerant

    Science.gov (United States)

    Chang, Ho-Myung; Lim, Hye Su; Choe, Kun Hyung

    2012-12-01

    A thermodynamic study is carried out to investigate the effect of multi-stream heat exchanger on the performance of natural gas (NG) liquefaction with mixed refrigerant (MR). A cold stream (low-pressure MR) is in thermal contact with opposite flow of two hot streams (high-pressure MR and NG feed) at the same time. In typical process simulation with commercial software (such as Aspen HYSYS®), the liquefaction performance is estimated with a method of minimum temperature approach, simply assuming that two hot streams have the same temperature. In this study, local energy balance equations are rigorously solved with temperature-dependent properties of MR and NG feed, and are linked to the thermodynamic cycle analysis. The figure of merit (FOM) is quantitatively examined in terms of UA (the product of overall heat transfer coefficient and heat exchange area) between respective streams. In a single-stage MR process, it is concluded that the temperature profile from HYSYS is difficult to realize in practice, and the FOM value from HYSYS is an over-estimate, but can be closely achieved with a proper heat-exchanger design. It is also demonstrated that there exists a unique optimal ratio in three UA's, and no direct heat exchanger between hot streams is recommended.

  5. Stream-Groundwater Interaction Buffers Seasonal Changes in Urban Stream Water Quality

    Science.gov (United States)

    Ledford, S. H.; Lautz, L. K.

    2013-12-01

    Urban streams in the northeastern United States have large road salt inputs during winter, increased nonpoint sources of inorganic nitrogen, and decreased short-term and permanent storage of nutrients. Meadowbrook Creek, a first order stream in Syracuse, New York, flows along a negative urbanization gradient, from a channelized and armored stream running through the middle of a roadway to a pool-riffle stream meandering through a broad, vegetated floodplain with a riparian aquifer. In this study we investigated how reconnection to groundwater and introduction of riparian vegetation impacted surface water chemistry by making bi-weekly longitudinal surveys of stream water chemistry in the creek from May 2012 until June 2013. Chloride concentrations in the upstream, urban reach of Meadowbrook Creek were strongly influenced by discharge of road salt to the creek during snow melt events in winter and by the chemistry of water draining an upstream retention basin in summer. Chloride concentrations ranged from 161.2 mg/L in August to 2172 mg/L in February. Chloride concentrations in the downstream, 'connected' reach had less temporal variation, ranging from 252.0 mg/L in August to 1049 mg/L in January, and were buffered by groundwater discharge, as the groundwater chloride concentrations during the sampling period ranged from 84.0 to 655.4 mg/L. Groundwater discharge resulted in higher chloride concentrations in summer and lower concentrations in winter in the connected reach relative to the urban reach, minimizing annual variation. In summer, there was little-to-no nitrate in the urban reach due to a combination of limited sources and high primary productivity. In contrast, during the summer, nitrate concentrations reached over 1 mg N/L in the connected reach due to the presence of riparian vegetation and lower nitrate uptake due to cooler temperatures and shading. During the winter, when temperatures fell below freezing, nitrate concentrations in the urban reach

  6. Temperature of the Gulf Stream

    Science.gov (United States)

    2002-01-01

    The Gulf Stream is one of the strong ocean currents that carries warm water from the sunny tropics to higher latitudes. The current stretches from the Gulf of Mexico up the East Coast of the United States, departs from North America south of the Chesapeake Bay, and heads across the Atlantic to the British Isles. The water within the Gulf Stream moves at the stately pace of 4 miles per hour. Even though the current cools as the water travels thousands of miles, it remains strong enough to moderate the Northern European climate. The image above was derived from the infrared measurements of the Moderate-resolution Imaging Spectroradiometer (MODIS) on a nearly cloud-free day over the east coast of the United States. The coldest waters are shown as purple, with blue, green, yellow, and red representing progressively warmer water. Temperatures range from about 7 to 22 degrees Celsius. The core of the Gulf Stream is very apparent as the warmest water, dark red. It departs from the coast at Cape Hatteras, North Carolina. The cool, shelf water from the north entrains the warmer outflows from the Chesapeake and Delaware Bays. The north wall of the Gulf Stream reveals very complex structure associated with frontal instabilities that lead to exchanges between the Gulf Stream and inshore waters. Several clockwise-rotating warm core eddies are evident north of the core of the Gulf Stream, which enhance the exchange of heat and water between the coastal and deep ocean. Cold core eddies, which rotate counter clockwise, are seen south of the Gulf Stream. The one closest to Cape Hatteras is entraining very warm Gulf Stream waters on its northwest circumference. Near the coast, shallower waters have warmed due to solar heating, while the deeper waters offshore are markedly cooler (dark blue). MODIS made this observation on May 8, 2000, at 11:45 a.m. EDT. For more information, see the MODIS-Ocean web page. The sea surface temperature image was created at the University of Miami using

  7. Estimated vapor pressure for WTP process streams

    Energy Technology Data Exchange (ETDEWEB)

    Pike, J. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Poirier, M. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-01-01

    Design assumptions during the vacuum refill phase of the Pulsed Jet Mixers (PJMs) in the Hanford Waste Treatment and Immobilization Plant (WTP) equate the vapor pressure of all process streams to that of water when calculating the temperature at which the vacuum refill is reduced or eliminated. WTP design authority asked the authors to assess this assumption by performing calculations on proposed feed slurries to calculate the vapor pressure as a function of temperature. The vapor pressure was estimated for each WTP waste group. The vapor pressure suppression caused by dissolved solids is much greater than the increase caused by organic components such that the vapor pressure for all of the waste group compositions is less than that of pure water. The vapor pressure for each group at 145°F ranges from 81% to 98% of the vapor pressure of water. If desired, the PJM could be operated at higher temperatures for waste groups with high dissolved solids that suppress vapor pressure. The SO4 group with the highest vapor pressure suppression could be operated up to 153°F before reaching the same vapor pressure of water at 145°F. However, most groups would reach equivalent vapor pressure at 147 to 148°F. If any of these waste streams are diluted, the vapor pressure can exceed the vapor pressure of water at mass dilution ratios greater than 10, but the overall effect is less than 0.5%.

  8. A survey of systems for massive stream analytics

    OpenAIRE

    Singh, Maninder Pal; Hoque, Mohammad A.; Tarkoma, Sasu

    2016-01-01

    The immense growth of data demands switching from traditional data processing solutions to systems, which can process a continuous stream of real time data. Various applications employ stream processing systems to provide solutions to emerging Big Data problems. Open-source solutions such as Storm, Spark Streaming, and S4 are the attempts to answer key stream processing questions. The recent introduction of real time stream processing commercial solutions such as Amazon Kinesis, IBM Infospher...

  9. ATLAS Live: Collaborative Information Streams

    CERN Document Server

    Goldfarb, S; The ATLAS collaboration

    2011-01-01

    I report on a pilot project launched in 2010 focusing on facilitating communication and information exchange within the ATLAS Collaboration, through the combination of digital signage software and webcasting. The project, called ATLAS Live, implements video streams of information, ranging from detailed detector and data status to educational and outreach material. The content, including text, images, video and audio, is collected, visualised and scheduled using digital signage software. The system is robust and flexible, utilizing scripts to input data from remote sources, such as the CERN Document Server, Indico, or any available URL, and to integrate these sources into professional-quality streams, including text scrolling, transition effects, inter and intra-screen divisibility. Information is published via the encoding and webcasting of standard video streams, viewable on all common platforms, using a web browser or other common video tool. Authorisation is enforced at the level of the streaming and at th...

  10. Cellular Subcompartments through Cytoplasmic Streaming.

    Science.gov (United States)

    Pieuchot, Laurent; Lai, Julian; Loh, Rachel Ann; Leong, Fong Yew; Chiam, Keng-Hwee; Stajich, Jason; Jedd, Gregory

    2015-08-24

    Cytoplasmic streaming occurs in diverse cell types, where it generally serves a transport function. Here, we examine streaming in multicellular fungal hyphae and identify an additional function wherein regimented streaming forms distinct cytoplasmic subcompartments. In the hypha, cytoplasm flows directionally from cell to cell through septal pores. Using live-cell imaging and computer simulations, we identify a flow pattern that produces vortices (eddies) on the upstream side of the septum. Nuclei can be immobilized in these microfluidic eddies, where they form multinucleate aggregates and accumulate foci of the HDA-2 histone deacetylase-associated factor, SPA-19. Pores experiencing flow degenerate in the absence of SPA-19, suggesting that eddy-trapped nuclei function to reinforce the septum. Together, our data show that eddies comprise a subcellular niche favoring nuclear differentiation and that subcompartments can be self-organized as a consequence of regimented cytoplasmic streaming. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. URBAN STREAM BURIAL INCREASES WATERSHED-SCALE NITRATE EXPORT

    Science.gov (United States)

    Nitrogen (N) uptake in streams is an important ecosystem service that may be affected by the widespread burial of streams in stormwater pipes in urban watersheds. We predicted that stream burial reduces the capacity of streams to remove nitrate (NO3-) from the water column by in...

  12. Sampling the stream landscape: Improving the applicability of an ecoregion-level capture probability model for stream fishes

    Science.gov (United States)

    Mollenhauer, Robert; Mouser, Joshua B.; Brewer, Shannon K.

    2018-01-01

    Temporal and spatial variability in streams result in heterogeneous gear capture probability (i.e., the proportion of available individuals identified) that confounds interpretation of data used to monitor fish abundance. We modeled tow-barge electrofishing capture probability at multiple spatial scales for nine Ozark Highland stream fishes. In addition to fish size, we identified seven reach-scale environmental characteristics associated with variable capture probability: stream discharge, water depth, conductivity, water clarity, emergent vegetation, wetted width–depth ratio, and proportion of riffle habitat. The magnitude of the relationship between capture probability and both discharge and depth varied among stream fishes. We also identified lithological characteristics among stream segments as a coarse-scale source of variable capture probability. The resulting capture probability model can be used to adjust catch data and derive reach-scale absolute abundance estimates across a wide range of sampling conditions with similar effort as used in more traditional fisheries surveys (i.e., catch per unit effort). Adjusting catch data based on variable capture probability improves the comparability of data sets, thus promoting both well-informed conservation and management decisions and advances in stream-fish ecology.

  13. Two tales of legacy effects on stream nutrient behaviour

    Science.gov (United States)

    Bieroza, M.; Heathwaite, A. L.

    2017-12-01

    historical loads of nutrients) has different effects on nutrients stream responses, depending on their dominant sources and pathways. Both types of time lags, biogeochemical for phosphorus and hydrologic for nitrate, need to be taken into account when designing and evaluating the effectiveness of the agri-environmental mitigation measures.

  14. The relative influence of nutrients and habitat on stream metabolism in agricultural streams

    Science.gov (United States)

    Frankforter, J.D.; Weyers, H.S.; Bales, J.D.; Moran, P.W.; Calhoun, D.L.

    2010-01-01

    Stream metabolism was measured in 33 streams across a gradient of nutrient concentrations in four agricultural areas of the USA to determine the relative influence of nutrient concentrations and habitat on primary production (GPP) and respiration (CR-24). In conjunction with the stream metabolism estimates, water quality and algal biomass samples were collected, as was an assessment of habitat in the sampling reach. When data for all study areas were combined, there were no statistically significant relations between gross primary production or community respiration and any of the independent variables. However, significant regression models were developed for three study areas for GPP (r 2 = 0.79-0.91) and CR-24 (r 2 = 0.76-0.77). Various forms of nutrients (total phosphorus and area-weighted total nitrogen loading) were significant for predicting GPP in two study areas, with habitat variables important in seven significant models. Important physical variables included light availability, precipitation, basin area, and in-stream habitat cover. Both benthic and seston chlorophyll were not found to be important explanatory variables in any of the models; however, benthic ash-free dry weight was important in two models for GPP. ?? 2009 The Author(s).

  15. Temporal analysis of static priority preemptive scheduled cyclic streaming applications using CSDF models

    NARCIS (Netherlands)

    Kurtin, Philip Sebastian; Bekooij, Marco Jan Gerrit

    2016-01-01

    Real-time streaming applications with cyclic data dependencies that are executed on multiprocessor systems with processor sharing usually require a temporal analysis to give guarantees on their temporal behavior at design time. Current accurate analysis techniques for cyclic applications that are

  16. Round-Robin Streaming with Generations

    DEFF Research Database (Denmark)

    Li, Yao; Vingelmann, Peter; Pedersen, Morten Videbæk

    2012-01-01

    We consider three types of application layer coding for streaming over lossy links: random linear coding, systematic random linear coding, and structured coding. The file being streamed is divided into sub-blocks (generations). Code symbols are formed by combining data belonging to the same...

  17. Stream Evaluation

    Data.gov (United States)

    Kansas Data Access and Support Center — Digital representation of the map accompanying the "Kansas stream and river fishery resource evaluation" (R.E. Moss and K. Brunson, 1981.U.S. Fish and Wildlife...

  18. Fragmentation and quench behavior of corium melt streams in water

    International Nuclear Information System (INIS)

    Spencer, B.W.; Wang, K.; Blomquist, C.A.; McUmber, L.M.; Schneider, J.P.

    1994-02-01

    The interaction of molten core materials with water has been investigated for the pour stream mixing mode. This interaction plays a crucial role during the later stages of in-vessel core melt progression inside a light water reactor such as during the TMI-2 accident. The key issues which arise during the molten core relocation include: (i) the thermal attack and possible damage to the RPV lower head from the impinging molten fuel stream and/or the debris bed, (ii) the molten fuel relocation pathways including the effects of redistribution due to core support structure and the reactor lower internals, (iii) the quench rate of the molten fuel through the water in the lower plenum, (iv) the steam generation and hydrogen generation during the interaction, (v) the transient pressurization of the primary system, and (vi) the possibility of a steam explosion. In order to understand these issues, a series of six experiments (designated CCM-1 through -6) was performed in which molten corium passed through a deep pool of water in a long, slender pour stream mode. Results discussed include the transient temperatures and pressures, the rate and magnitude of steam/hydrogen generation, and the posttest debris characteristics

  19. Overview of gap streaming experiments for ITER at JAERI/FNS

    International Nuclear Information System (INIS)

    Konno, Ch.; Maekawa, F.; Oyama, Y.; Uno, Y.; Kasugai, Y.; Wada, M.; Maekawa, H.; Ikeda, Y.

    1998-01-01

    Gap streaming experiments were performed by using a D-T neutron source, FNS, at Japan Atomic Energy Research Institute as a part of an ITER/EDA R and D Task (T-218), in order to investigate the influence of neutron streaming due to gap between shielding blanket modules in ITER. The direct gap increased 14-MeV neutron flux by 20 times at the cavity center and rear surface of the experimental assembly, while the offset gap increased by 3 times. On the other hand the increase of neutrons below 1 MeV and gamma-rays was less than a few tens % even for the direct gap assemblies. This result suggests that gap streaming has a large influence on helium production and radiation damage sensitive to high energy neutrons rather than on gamma heating. Calculated values agreed within ±30 % with most of the experimental data. This result demonstrates that the MCNP code with the FENDL/E-1.1 and JENDL Fusion File cross section libraries can be used with reliance for shield designs of ITER for configuration with gap if the geometry is modeled precisely. (authors)

  20. Stream dynamics: An overview for land managers

    Science.gov (United States)

    Burchard H. Heede

    1980-01-01

    Concepts of stream dynamics are demonstrated through discussion of processes and process indicators; theory is included only where helpful to explain concepts. Present knowledge allows only qualitative prediction of stream behavior. However, such predictions show how management actions will affect the stream and its environment.