WorldWideScience

Sample records for stream cipher design

  1. The Rabbit Stream Cipher

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Vesterager, Mette; Zenner, Erik

    2008-01-01

    The stream cipher Rabbit was first presented at FSE 2003, and no attacks against it have been published until now. With a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor, Rabbit does also provide very high performance. This paper gives a concise...... description of the Rabbit design and some of the cryptanalytic results available....

  2. BLOSTREAM: A HIGH SPEED STREAM CIPHER

    Directory of Open Access Journals (Sweden)

    ALI H. KASHMAR

    2017-04-01

    Full Text Available Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers. This paper presents the design of an improved efficient and secure stream cipher called Blostream, which is more secure than conventional stream ciphers that use XOR for mixing. The proposed cipher comprises two major components: the Pseudo Random Number Generator (PRNG using the Rabbit algorithm and a nonlinear invertible round function (combiner for encryption and decryption. We evaluate its performance in terms of implementation and security, presenting advantages and disadvantages, comparison of the proposed cipher with similar systems and a statistical test for randomness. The analysis shows that the proposed cipher is more efficient, high speed, and secure than current conventional stream ciphers.

  3. A MULTICORE COMPUTER SYSTEM FOR DESIGN OF STREAM CIPHERS BASED ON RANDOM FEEDBACK

    Directory of Open Access Journals (Sweden)

    Borislav BEDZHEV

    2013-01-01

    Full Text Available The stream ciphers are an important tool for providing information security in the present communication and computer networks. Due to this reason our paper describes a multicore computer system for design of stream ciphers based on the so - named random feedback shift registers (RFSRs. The interest to this theme is inspired by the following facts. First, the RFSRs are a relatively new type of stream ciphers which demonstrate a significant enhancement of the crypto - resistance in a comparison with the classical stream ciphers. Second, the studding of the features of the RFSRs is in very initial stage. Third, the theory of the RFSRs seems to be very hard, which leads to the necessity RFSRs to be explored mainly by the means of computer models. The paper is organized as follows. First, the basics of the RFSRs are recalled. After that, our multicore computer system for design of stream ciphers based on RFSRs is presented. Finally, the advantages and possible areas of application of the computer system are discussed.

  4. A chaotic stream cipher and the usage in video protection

    International Nuclear Information System (INIS)

    Lian Shiguo; Sun Jinsheng; Wang Jinwei; Wang Zhiquan

    2007-01-01

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  5. Stream ciphers and number theory

    CERN Document Server

    Cusick, Thomas W; Renvall, Ari R

    2004-01-01

    This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. · Unique book on interactions of stream ciphers and number theory. · Research monograph with many results not available elsewhere. · A revised edition with the most recent advances in this subject. · Over thirty research problems for stimulating interactions between the two areas. · Written by leading researchers in stream ciphers and number theory.

  6. Cryptanalysis of the full Spritz stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Isobe, Takanori

    2016-01-01

    Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on a short-term bias in the first two bytes of a keystream an...

  7. A Novel Image Stream Cipher Based On Dynamic Substitution

    OpenAIRE

    Elsharkawi, A.; El-Sagheer, R. M.; Akah, H.; Taha, H.

    2016-01-01

    Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution b...

  8. Why IV Setup for Stream Ciphers is Difficult

    DEFF Research Database (Denmark)

    Zenner, Erik

    2007-01-01

    In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.......In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography....

  9. A stream cipher based on a spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Li Ping; Li Zhong; Halang, Wolfgang A.; Chen Guanrong

    2007-01-01

    A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently

  10. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    be applied to the AES can be transferred to this block cipher, albeit with a higher attack complexity. The second publication introduces a new block cipher family which is targeted for new applications in fully homomorphic encryption and multi-party computation. We demonstrate the soundness of the design...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...... is an introduction to block ciphers and their cryptanalysis, the second part contains publications written and published during the PhD studies. The first publication evaluates the security of a modification of the AES in which the choice of S-box is unknown to the attacker. We find that some of the attacks that can...

  11. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

    Directory of Open Access Journals (Sweden)

    Vahid Amin Ghafari

    2018-03-01

    Full Text Available In Fast Software Encryption (FSE 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation, Sprout was proposed. Sprout was insecure and an improved version of Sprout was presented in FSE 2017. We introduced Fruit stream cipher informally in 2016 on the web page of IACR (eprint and few cryptanalysis were published on it. Fortunately, the main structure of Fruit was resistant. Now, Fruit-80 is presented as a final version which is easier to implement and is secure. The size of LFSR and NFSR in Fruit-80 is only 80 bits (for 80-bit security level, while for resistance to the classical time-memory-data tradeoff (TMDTO attacks, the internal state size should be at least twice that of the security level. To satisfy this rule and to design a concrete cipher, we used some new design ideas. It seems that the bottleneck of designing an ultra-lightweight stream cipher is TMDTO distinguishing attacks. A countermeasure was suggested, and another countermeasure is proposed here. Fruit-80 is better than other small-state stream ciphers in terms of the initialization speed and area size in hardware. It is possible to redesign many of the stream ciphers and achieve significantly smaller area size by using the new idea.

  12. A novel chaotic stream cipher and its application to palmprint template protection

    International Nuclear Information System (INIS)

    Heng-Jian, Li; Jia-Shu, Zhang

    2010-01-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. (general)

  13. A novel chaotic stream cipher and its application to palmprint template protection

    Science.gov (United States)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  14. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

    Science.gov (United States)

    Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur

    2017-12-01

    Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.

  15. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Chunlei Fan

    2018-06-01

    Full Text Available In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data. Two-dimensional discrete wavelet transform and Arnold mapping are used to scramble the pixel value of the original image. A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.

  16. On the Design of Error-Correcting Ciphers

    Directory of Open Access Journals (Sweden)

    Mathur Chetan Nanjunda

    2006-01-01

    Full Text Available Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless environment. In this paper, we take a joint encryption-error correction approach to ensure secure and robust communication over the wireless link. In particular, we design an error-correcting cipher (called the high diffusion cipher and prove bounds on its error-correcting capacity as well as its security. Towards this end, we propose a new class of error-correcting codes (HD-codes with built-in security features that we use in the diffusion layer of the proposed cipher. We construct an example, 128-bit cipher using the HD-codes, and compare it experimentally with two traditional concatenated systems: (a AES (Rijndael followed by Reed-Solomon codes, (b Rijndael followed by convolutional codes. We show that the HD-cipher is as resistant to linear and differential cryptanalysis as the Rijndael. We also show that any chosen plaintext attack that can be performed on the HD cipher can be transformed into a chosen plaintext attack on the Rijndael cipher. In terms of error correction capacity, the traditional systems using Reed-Solomon codes are comparable to the proposed joint error-correcting cipher and those that use convolutional codes require more data expansion in order to achieve similar error correction as the HD-cipher. The original contributions of this work are (1 design of a new joint error-correction-encryption system, (2 design of a new class of algebraic codes with built-in security criteria, called the high diffusion codes (HD-codes for use in the HD-cipher, (3 mathematical properties of these codes, (4 methods for construction of the codes, (5 bounds on the error-correcting capacity of the HD-cipher, (6 mathematical derivation of the bound on resistance of HD cipher to linear and differential cryptanalysis, (7 experimental comparison

  17. Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder

    Science.gov (United States)

    Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz

    2017-11-01

    Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.

  18. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.; Mansingka, Abhinav S.; Radwan, Ahmed Gomaa; Salama, Khaled N.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate

  19. Performance of Сellular Automata-based Stream Ciphers in GPU Implementation

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2016-01-01

    Full Text Available Earlier the author had developed methods to build high-performance generalized cellular automata-based symmetric ciphers, which allow obtaining the encryption algorithms that show extremely high performance in hardware implementation. However, their implementation based on the conventional microprocessors lacks high performance. The mere fact is quite common - it shows a scope of applications for these ciphers. Nevertheless, the use of graphic processors enables achieving an appropriate performance for a software implementation.The article is extension of a series of the articles, which study various aspects to construct and implement cryptographic algorithms based on the generalized cellular automata. The article is aimed at studying the capabilities to implement the GPU-based cryptographic algorithms under consideration.Representing a key generator, the implemented encryption algorithm comprises 2k generalized cellular automata. The cellular automata graphs are Ramanujan’s ones. The cells of produced k gamma streams alternate, thereby allowing the GPU capabilities to be better used.To implement was used OpenCL, as the most universal and platform-independent API. The software written in C ++ was designed so that the user could set various parameters, including the encryption key, the graph structure, the local communication function, various constants, etc. To test were used a variety of graphics processors (NVIDIA GTX 650; NVIDIA GTX 770; AMD R9 280X.Depending on operating conditions, and GPU used, a performance range is from 0.47 to 6.61 Gb / s, which is comparable to the performance of the countertypes.Thus, the article has demonstrated that using the GPU makes it is possible to provide efficient software implementation of stream ciphers based on the generalized cellular automata.This work was supported by the RFBR, the project №16-07-00542.

  20. Stream cipher based on pseudorandom number generation using optical affine transformation

    Science.gov (United States)

    Sasaki, Toru; Togo, Hiroyuki; Tanida, Jun; Ichioka, Yoshiki

    2000-07-01

    We propose a new stream cipher technique for 2D image data which can be implemented by iterative optical transformation. The stream cipher uses a pseudo-random number generator (PRNG) to generate pseudo-random bit sequence. The proposed method for the PRNG is composed of iterative operation of 2D affine transformation achieved by optical components, and modulo-n addition of the transformed images. The method is expected to be executed efficiently by optical parallel processing. We verify performance of the proposed method in terms of security strength and clarify problems on optical implementation by the optical fractal synthesizer.

  1. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate the bias from the original chaotic sequence. The proposed stream cipher utilises the processed chaotic output to mask and diffuse input pixels through several stages of XORing and bit permutations. The performance of the cipher is tested with several input images and compared with previously reported systems showing superior security and higher hardware efficiency. The system is experimentally verified on XilinxVirtex 4 field programmable gate array (FPGA) achieving small area utilisation and a throughput of 3.62 Gb/s. © The Institution of Engineering and Technology 2013.

  2. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  3. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

    Directory of Open Access Journals (Sweden)

    Subhrajyoti Deb

    2018-03-01

    Full Text Available A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a is a family of stream ciphers designed for low-end devices. Similarly, Espresso is a lightweight stream cipher that was developed recently for 5G wireless mobile communication. The randomness of the keystream produced by a stream cipher is a good indicator of its security strength. In this study, we have analyzed the randomness properties of the keystreams produced by both the Grain Family and Espresso ciphers using the statistical packages DieHarder and NIST STS. We also analyzed their performances in two constrained devices (ATmega328P and ESP8266 based on three attainable parameters, namely computation time, memory, and power consumption. Keywords: Stream cipher, Randomness, Dieharder, NIST STS

  4. A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher

    Science.gov (United States)

    Kumari, Manju; Gupta, Shailender

    2018-03-01

    As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.

  5. Experiments of 10 Gbit/sec quantum stream cipher applicable to optical Ethernet and optical satellite link

    Science.gov (United States)

    Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi

    2009-08-01

    The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.

  6. Some security results of the RC4+ stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Jha, Sonu

    2015-01-01

    to any even 8-bit constant other than 0xAA. Therefore, the question that naturally arises is whether the design of RC4+ can be protected by fixing the pad parameter to some constant odd value. In this paper, we try to answer this very question. We show that the design is still vulnerable by mounting...... in terms of number of faults required and the computational complexity. In fact, we reduce the number of faults by around 11264 on average, and our algorithm is around 26 times faster....

  7. Optical stream-cipher-like system for image encryption based on Michelson interferometer.

    Science.gov (United States)

    Yang, Bing; Liu, Zhengjun; Wang, Bo; Zhang, Yan; Liu, Shutian

    2011-01-31

    A novel optical image encryption scheme based on interference is proposed. The original image is digitally encoded into one phase-only mask by employing an improved Gerchberg-Saxton phase retrieval algorithm together with another predefined random phase mask which serves as the encryption key. The decryption process can be implemented optically based on Michelson interferometer by using the same key. The scheme can be regarded as a stream-cipher-like encryption system, the encryption and decryption keys are the same, however the operations are different. The position coordinates and light wavelength can also be used as additional keys during the decryption. Numerical simulations have demonstrated the validity and robustness of the proposed method.

  8. Cipher block based authentication module: A hardware design perspective

    NARCIS (Netherlands)

    Michail, H.E.; Schinianakis, D.; Goutis, C.E.; Kakarountas, A.P.; Selimis, G.

    2011-01-01

    Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the

  9. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  10. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  11. Block Cipher Analysis

    DEFF Research Database (Denmark)

    Miolane, Charlotte Vikkelsø

    ensurethat no attack violatesthe securitybounds specifiedbygeneric attack namely exhaustivekey search and table lookup attacks. This thesis contains a general introduction to cryptography with focus on block ciphers and important block cipher designs, in particular the Advanced Encryption Standard(AES...... on small scale variants of AES. In the final part of the thesis we present a new block cipher proposal Present and examine its security against algebraic and differential cryptanalysis in particular....

  12. Cryptanalysis on classical cipher based on Indonesian language

    Science.gov (United States)

    Marwati, R.; Yulianti, K.

    2018-05-01

    Cryptanalysis is a process of breaking a cipher in an illegal decryption. This paper discusses about encryption some classic cryptography, breaking substitution cipher and stream cipher, and increasing its security. Encryption and ciphering based on Indonesian Language text. Microsoft Word and Microsoft Excel were chosen as ciphering and breaking tools.

  13. Quantum-noise randomized ciphers

    International Nuclear Information System (INIS)

    Nair, Ranjith; Yuen, Horace P.; Kumar, Prem; Corndorf, Eric; Eguchi, Takami

    2006-01-01

    We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security. We describe a concrete system known as αη and show that it is equivalent to a random cipher in which the required randomization is affected by coherent-state quantum noise. We describe the currently known security features of αη and similar systems, including lower bounds on the unicity distances against ciphertext-only and known-plaintext attacks. We show how αη used in conjunction with any standard stream cipher such as the Advanced Encryption Standard provides an additional, qualitatively different layer of security from physical encryption against known-plaintext attacks on the key. We refute some claims in the literature that αη is equivalent to a nonrandom stream cipher

  14. Reflection ciphers

    DEFF Research Database (Denmark)

    Boura, Christina; Canteaut, Anne; Knudsen, Lars Ramkilde

    2017-01-01

    study the necessary properties for this coupling permutation. Special care has to be taken of some related-key distinguishers since, in the context of reflection ciphers, they may provide attacks in the single-key setting.We then derive some criteria for constructing secure reflection ciphers...

  15. Cryptanalysis of Selected Block Ciphers

    DEFF Research Database (Denmark)

    Alkhzaimi, Hoda A.

    , pseudorandom number generators, and authenticated encryption designs. For this reason a multitude of initiatives over the years has been established to provide a secure and sound designs for block ciphers as in the calls for Data Encryption Standard (DES) and Advanced Encryption Standard (AES), lightweight...... ciphers initiatives, and the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR). In this thesis, we first present cryptanalytic results on different ciphers. We propose attack named the Invariant Subspace Attack. It is utilized to break the full block cipher...

  16. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  17. Cryptanalysis of Some Lightweight Symmetric Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed Awadelkareem Mohamed Ahmed

    In recent years, the need for lightweight encryption systems has been increasing as many applications use RFID and sensor networks which have a very low computational power and thus incapable of performing standard cryptographic operations. In response to this problem, the cryptographic community...... on a variant of PRESENT with identical round keys. We propose a new attack named the Invariant Subspace Attack that was specifically mounted against the lightweight block cipher PRINTcipher. Furthermore, we mount several attacks on a recently proposed stream cipher called A2U2....... of the international standards in lightweight cryptography. This thesis aims at analyzing and evaluating the security of some the recently proposed lightweight symmetric ciphers with a focus on PRESENT-like ciphers, namely, the block cipher PRESENT and the block cipher PRINTcipher. We provide an approach to estimate...

  18. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    DEFF Research Database (Denmark)

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  19. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.; Radwan, Ahmed G.; Salama, Khaled N.

    2011-01-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  20. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  1. Round Gating for Low Energy Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    design techniques for implementing block ciphers in a low energy fashion. We concentrate on round based implementation and we discuss how gating, applied at round level can affect and improve the energy consumption of the most common lightweight block cipher currently used in the internet of things....... Additionally, we discuss how to needed gating wave can be generated. Experimental results show that our technique is able to reduce the energy consumption in most block ciphers by over 60% while incurring only a minimal overhead in hardware....

  2. Ganzua: A Cryptanalysis Tool for Monoalphabetic and Polyalphabetic Ciphers

    Science.gov (United States)

    Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose

    2006-01-01

    Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…

  3. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  4. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde

    2012-01-01

    We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream...... with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family...... of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  5. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  6. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul

    2013-01-01

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general......-purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. Our implementation with Intel AES-NI on a Sandy Bridge CPU architecture shows that both COPE and COPA are about 5 times faster than their closest competition: TC1, TC3, and McOE-G. This high factor of advantage emphasizes the paramount role of parallelizability on up...

  7. Cracking the Cipher Challenge

    CERN Document Server

    CERN. Geneva. Audiovisual Unit; Singh, Simon

    2002-01-01

    In the back of 'The Code Book', a history of cryptography, Simon Singh included a series of 10 encoded messages, each from a different period of history. The first person to crack all 10 messages would win a prize of £10,000. Now that the prize has been won, Simon can reveal the story behind the Cipher Challenge. Along the way he will show how mathematics can be used to crack codes, the role it played in World War Two and how it helps to guarantee security in the Information Age.

  8. A New Substitution Cipher - Random-X

    Directory of Open Access Journals (Sweden)

    Falguni Patel

    2015-08-01

    Full Text Available Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher Random-X that we introduce in this paper can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle the implementation ideas and testing of Random-X cipher.

  9. Progress in Y-00 physical cipher for Giga bit/sec optical data communications (intensity modulation method)

    Science.gov (United States)

    Hirota, Osamu; Futami, Fumio

    2014-10-01

    To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.

  10. Pilot-Streaming: Design Considerations for a Stream Processing Framework for High-Performance Computing

    OpenAIRE

    Andre Luckow; Peter Kasson; Shantenu Jha

    2016-01-01

    This White Paper (submitted to STREAM 2016) identifies an approach to integrate streaming data with HPC resources. The paper outlines the design of Pilot-Streaming, which extends the concept of Pilot-abstraction to streaming real-time data.

  11. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  12. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  13. Efficient configurations for block ciphers with unified ENC/DEC paths

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2017-01-01

    by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined......Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher......, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin...

  14. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  15. Hardware Implementation of Artificial Neural Network for Data Ciphering

    Directory of Open Access Journals (Sweden)

    Sahar L. Kadoory

    2016-10-01

    Full Text Available This paper introduces the design and realization of multiple blocks ciphering techniques on the FPGA (Field Programmable Gate Arrays. A back propagation neural networks have been built for substitution, permutation and XOR blocks ciphering using Neural Network Toolbox in MATLAB program. They are trained to encrypt the data, after obtaining the suitable weights, biases, activation function and layout. Afterward, they are described using VHDL and implemented using Xilinx Spartan-3E FPGA using two approaches: serial and parallel versions. The simulation results obtained with Xilinx ISE 9.2i software. The numerical precision is chosen carefully when implementing the Neural Network on FPGA. Obtained results from the hardware designs show accurate numeric values to cipher the data. As expected, the synthesis results indicate that the serial version requires less area resources than the parallel version. As, the data throughput in parallel version is higher than the serial version in rang between (1.13-1.5 times. Also, a slight difference can be observed in the maximum frequency.

  16. Neutron streaming analysis for shield design of FMIT Facility

    International Nuclear Information System (INIS)

    Carter, L.L.

    1980-12-01

    Applications of the Monte Carlo method have been summarized relevant to neutron streaming problems of interest in the shield design for the FMIT Facility. An improved angular biasing method has been implemented to further optimize the calculation of streaming and this method has been applied to calculate streaming within a double bend pipe

  17. Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

    Directory of Open Access Journals (Sweden)

    Hao Chen

    2017-01-01

    Full Text Available HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.

  18. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

    DEFF Research Database (Denmark)

    Beierle, Christof; Jovanovic, Philipp; Lauridsen, Martin Mehl

    2015-01-01

    Designing block ciphers and hash functions in a manner that resemble the AES in many aspects has been very popular since Rijndael was adopted as the Advanced Encryption Standard. However, in sharp contrast to the MixColumns operation, the security implications of the way the state is permuted...... by the operation resembling ShiftRows has never been studied in depth. Here, we provide the first structured study of the influence of ShiftRows-like operations, or more generally, word-wise permutations, in AES-like ciphers with respect to diffusion properties and resistance towards differential- and linear...... normal form. Using a mixed-integer linear programming approach, we obtain optimal parameters for a wide range of AES-like ciphers, and show improvements on parameters for Rijndael-192, Rijndael-256, PRIMATEs-80 and Prøst-128. As a separate result, we show for specific cases of the state geometry...

  19. Exploring Energy Efficiency of Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arrive at the conclusion that the energy consumed per cycle during the encryption operation of an r-round unrolled architecture of any block cipher is a quadratic function in r. We then apply our model to 9 well known...

  20. Coherent pulse position modulation quantum cipher

    Energy Technology Data Exchange (ETDEWEB)

    Sohma, Masaki; Hirota, Osamu [Quantum ICT Research Institute, Tamagawa University, 6-1-1 Tamagawa-gakuen, Machida, Tokyo 194-8610 (Japan)

    2014-12-04

    On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.

  1. Observations on the SIMON Block Cipher Family

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge

    2015-01-01

    In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those...

  2. Radiation streaming: the continuing problem of shield design

    International Nuclear Information System (INIS)

    Avery, A.F.

    1977-01-01

    The practical problems of shield design are reviewed and the major difficulties are shown to be those associated with streaming problems. The situations in which streaming occurs in various types of reactor are described including LMFBR's and fusion devices, and examples are given of ways in which the problems have been solved

  3. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  4. Cryptanalysis of an ergodic chaotic cipher

    International Nuclear Information System (INIS)

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G.

    2003-01-01

    In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we offer our results after having studied the security and possible attacks on a very interesting cipher algorithm based on the logistic map's ergodicity property. This algorithm has become very popular recently, as it has been taken as the development basis of new chaotic cryptosystems

  5. Design tradeoffs in long-term research for stream salamanders

    Science.gov (United States)

    Brand, Adrianne B,; Grant, Evan H. Campbell

    2017-01-01

    Long-term research programs can benefit from early and periodic evaluation of their ability to meet stated objectives. In particular, consideration of the spatial allocation of effort is key. We sampled 4 species of stream salamanders intensively for 2 years (2010–2011) in the Chesapeake and Ohio Canal National Historical Park, Maryland, USA to evaluate alternative distributions of sampling locations within stream networks, and then evaluated via simulation the ability of multiple survey designs to detect declines in occupancy and to estimate dynamic parameters (colonization, extinction) over 5 years for 2 species. We expected that fine-scale microhabitat variables (e.g., cobble, detritus) would be the strongest determinants of occupancy for each of the 4 species; however, we found greater support for all species for models including variables describing position within the stream network, stream size, or stream microhabitat. A monitoring design focused on headwater sections had greater power to detect changes in occupancy and the dynamic parameters in each of 3 scenarios for the dusky salamander (Desmognathus fuscus) and red salamander (Pseudotriton ruber). Results for transect length were more variable, but across all species and scenarios, 25-m transects are most suitable as a balance between maximizing detection probability and describing colonization and extinction. These results inform sampling design and provide a general framework for setting appropriate goals, effort, and duration in the initial planning stages of research programs on stream salamanders in the eastern United States.

  6. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. In this paper, we have identified the candidates of block ciphers

  7. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  8. Red River Stream Improvement Final Design Nez Perce National Forest.

    Energy Technology Data Exchange (ETDEWEB)

    Watershed Consulting, LLC

    2007-03-15

    This report details the final stream improvement design along the reach of Red River between the bridge below Dawson Creek, upstream for approximately 2 miles, Idaho County, Idaho. Geomorphic mapping, hydrologic profiles and cross-sections were presented along with existing fish habitat maps in the conceptual design report. This information is used to develop a stream improvement design intended to improve aquatic habitat and restore riparian health in the reach. The area was placer mined using large bucket dredges between 1938 and 1957. This activity removed most of the riparian vegetation in the stream corridor and obliterated the channel bed and banks. The reach was also cut-off from most valley margin tributaries. In the 50 years since large-scale dredging ceased, the channel has been re-established and parts of the riparian zone have grown in. However, the recruitment of large woody debris to the stream has been extremely low and overhead cover is poor. Pool habitat makes up more than 37% of the reach, and habitat diversity is much better than the project reach on Crooked River. There is little large woody debris in the stream to provide cover for spawning and juvenile rearing, because the majority of the woody debris does not span a significant part of the channel, but is mainly on the side slopes of the stream. Most of the riparian zone has very little soil or subsoil left after the mining and so now consists primarily of unconsolidated cobble tailings or heavily compacted gravel tailings. Knapweed and lodgepole pine are the most successful colonizers of these post mining landforms. Tributary fans which add complexity to many other streams in the region, have been isolated from the main reach due to placer mining and road building.

  9. Ciphers for MPC and FHE

    DEFF Research Database (Denmark)

    R. Albrecht, Martin; Rechberger, Christian; Schneider, Thomas

    2015-01-01

    that when encrypting larger amounts of data the new design strategy translates into improvements in computation and communication complexity by up to a factor of 5 compared to AES-128, which incidentally is one of the most competitive classical designs. Furthermore, we identify cases where “free XORs” can...... of symmetric-key primitives that minimize the multiplicative size and depth of their descriptions. This is motivated by recent progress in practical instantiations of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where linear computations are, compared...

  10. STREAM

    DEFF Research Database (Denmark)

    Godsk, Mikkel

    This paper presents a flexible model, ‘STREAM’, for transforming higher science education into blended and online learning. The model is inspired by ideas of active and collaborative learning and builds on feedback strategies well-known from Just-in-Time Teaching, Flipped Classroom, and Peer...... Instruction. The aim of the model is to provide both a concrete and comprehensible design toolkit for adopting and implementing educational technologies in higher science teaching practice and at the same time comply with diverse ambitions. As opposed to the above-mentioned feedback strategies, the STREAM...... model supports a relatively diverse use of educational technologies and may also be used to transform teaching into completely online learning. So far both teachers and educational developers have positively received the model and the initial design experiences show promise....

  11. Design methods of Coanda effect nozzle with two streams

    Directory of Open Access Journals (Sweden)

    Michele TRANCOSSI

    2014-03-01

    Full Text Available This paper continues recent research of the authors about the ACHEON Coanda effect two streams nozzle. This nozzle aims to produce an effective deflection of a propulsive jet with a correspondent deviation of the thrust vector in a 2D plane. On the basis of a previously published mathematical model, based on integral equations, it tries to produce an effective design guideline, which can be adopted for design activities of the nozzle for aeronautic propulsion. The presented model allows defining a governing method for this innovative two stream synthetic jet nozzle. The uncertainness level of the model are discussed and novel aircraft architectures based on it are presented. A CFD validation campaign is produced focusing on validating the model and the designs produced.

  12. From Greeks to Today: Cipher Trees and Computer Cryptography.

    Science.gov (United States)

    Grady, M. Tim; Brumbaugh, Doug

    1988-01-01

    Explores the use of computers for teaching mathematical models of transposition ciphers. Illustrates the ideas, includes activities and extensions, provides a mathematical model and includes computer programs to implement these topics. (MVL)

  13. Improved cryptanalysis of the block cipher KASUMI

    DEFF Research Database (Denmark)

    Jia, Keting; Li, Leibo; Rechberger, Christian

    2013-01-01

    KASUMI is a block cipher which consists of eight Feistel rounds with a 128-bit key. Proposed more than 10 years ago, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. In the practically interesting single key setting, only up to 6 rounds have...... been attacked so far. In this paper we use some observations on the FL and FO functions. Combining these observations with a key schedule weakness, we select some special input and output values to refine the general 5-round impossible differentials and propose the first 7-round attack on KASUMI...... with time and data complexities similar to the previously best 6-round attacks. This leaves now only a single round of security margin. The new impossible differential attack on the last 7 rounds needs 2114.3 encryptions with 252.5 chosen plaintexts. For the attack on the first 7 rounds, the data complexity...

  14. Cache Timing Analysis of LFSR-based Stream Ciphers

    DEFF Research Database (Denmark)

    Zenner, Erik; Leander, Gregor; Hawkes, Philip

    2009-01-01

    Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated against the Advanced Encryption Standard (AES), but have more recently also been applied against other cryptographic...

  15. Co-creation, Prevailing Streams and a Future Design Trajectory

    DEFF Research Database (Denmark)

    Degnegaard, Rex

    2014-01-01

    of the literature on co-creation to explore what the existing literature relates to and indeed to pinpoint if any patterns or streams can be identified. The paper illustrates how the use of the concept of co-creation suggests a necessity for focusing further on specific co-creation-related issues and challenges...... of significance to business and society. The paper highlights new co-creation-related issues and challenges. Further, the paper crystallises an emerging design trajectory in theory and practice....

  16. Two-dimensional Value Stream Mapping: Integrating the design of the MPC system in the value stream map

    DEFF Research Database (Denmark)

    Powell, Daryl; Olesen, Peter Bjerg

    2013-01-01

    Companies use value stream mapping to identify waste, often in the early stages of a lean implementation. Though the tool helps users to visualize material and information flows and to identify improvement opportunities, a limitation of this approach is the lack of an integrated method...... for analysing and re-designing the MPC system in order to support lean improvement. We reflect on the current literature regarding value stream mapping, and use practical insights in order to develop and propose a two-dimensional value stream mapping tool that integrates the design of the MPC system within...... the material and information flow map....

  17. A fast image encryption algorithm based on only blocks in cipher text

    Science.gov (United States)

    Wang, Xing-Yuan; Wang, Qian

    2014-03-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.

  18. A fast image encryption algorithm based on only blocks in cipher text

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Wang Qian

    2014-01-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks

  19. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  20. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Energy Technology Data Exchange (ETDEWEB)

    Zacek, Petr; Jasek, Roman; Malanik, David [Faculty of applied Informatics, Tomas Bata University in Zlin, Zlin, Czech Republic zacek@fai.utb.cz, jasek@fai.utb.cz, dmalanik@fai.utb.cz (Czech Republic)

    2016-06-08

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  1. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Science.gov (United States)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-06-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  2. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    International Nuclear Information System (INIS)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-01-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  3. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...

  4. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

    DEFF Research Database (Denmark)

    Beierle, Christof; Jean, Jérémy; Kölbl, Stefan

    2016-01-01

    We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/ software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks. In particular, unlike SIMON, we are able...... to provide strong bounds for all versions, and not only in the single-key model, but also in the related-key or related-tweak model. SKINNY has flexible block/key/tweak sizes and can also benefit from very efficient threshold implementations for sidechannel protection. Regarding performances, it outperforms...

  5. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time

  6. A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator

    Science.gov (United States)

    Tong, Xiaojun; Cui, Minggen; Wang, Zhu

    2009-07-01

    The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.

  7. Toward Design Guidelines for Stream Restoration Structures: Measuring and Modeling Unsteady Turbulent Flows in Natural Streams with Complex Hydraulic Structures

    Science.gov (United States)

    Lightbody, A.; Sotiropoulos, F.; Kang, S.; Diplas, P.

    2009-12-01

    Despite their widespread application to prevent lateral river migration, stabilize banks, and promote aquatic habitat, shallow transverse flow training structures such as rock vanes and stream barbs lack quantitative design guidelines. Due to the lack of fundamental knowledge about the interaction of the flow field with the sediment bed, existing engineering standards are typically based on various subjective criteria or on cross-sectionally-averaged shear stresses rather than local values. Here, we examine the performance and stability of in-stream structures within a field-scale single-threaded sand-bed meandering stream channel in the newly developed Outdoor StreamLab (OSL) at the St. Anthony Falls Laboratory (SAFL). Before and after the installation of a rock vane along the outer bank of the middle meander bend, high-resolution topography data were obtained for the entire 50-m-long reach at 1-cm spatial scale in the horizontal and sub-millimeter spatial scale in the vertical. In addition, detailed measurements of flow and turbulence were obtained using acoustic Doppler velocimetry at twelve cross-sections focused on the vicinity of the structure. Measurements were repeated at a range of extreme events, including in-bank flows with an approximate flow rate of 44 L/s (1.4 cfs) and bankfull floods with an approximate flow rate of 280 L/s (10 cfs). Under both flow rates, the structure reduced near-bank shear stresses and resulted in both a deeper thalweg and near-bank aggradation. The resulting comprehensive dataset has been used to validate a large eddy simulation carried out by SAFL’s computational fluid dynamics model, the Virtual StreamLab (VSL). This versatile computational framework is able to efficiently simulate 3D unsteady turbulent flows in natural streams with complex in-stream structures and as a result holds promise for the development of much-needed quantitative design guidelines.

  8. Political and Economic Geomorphology: The Effect of Market Forces on Stream Restoration Designs

    Science.gov (United States)

    Singh, J.; Doyle, M. W.; Lave, R.; Robertson, M.

    2013-12-01

    Stream restoration in the U.S. is increasingly driven by compensatory mitigation; impacts to streams associated with typical land development activities must be offset via restoration of streams elsewhere. This policy application creates conditions in which restored stream ';credits' are traded under market-like conditions, comparable to wetland mitigation, carbon offsets, or endangered species habitat banking. The effect of this relatively new mechanism to finance stream restoration on design and construction is unknown. This research explores whether the introduction of a credit-based mitigation apparatus results in streams designed to maximize credit yields (i.e., ';credit-chasing') rather than focusing on restoring natural systems or functions. In other words, are market-based restored streams different from those designed for non-market purposes? We quantified geomorphic characteristics (e.g. hydraulic geometry, sinuosity, profile, bed sediment, LWD) of three types of streams: (1) a random sample of non-restored reaches, (2) streams restored for compensatory mitigation, and (3) streams restored under alternative funding sources (e.g., government grant programs, non-profit activities). We also compared the location of the types of stream reaches to determine whether there is a spatiality of restored streams. Physical data were complemented with a series of semi-structured interviews with key personnel in the stream restoration industry to solicit information on the influence of policy interpretation and market-driven factors on the design process. Preliminary analysis suggests that restoration is driving a directional shift in stream morphology in North Carolina. As a simple example, in the Piedmont, non-restored and restored channels had mean sinuosity of 1.17 and 1.23, respectively (p sale of restored stream credits, was seen as critically important rather than the marginal gains to be made by manipulating particular stream designs to glean more credits

  9. Cryptanalysis of a chaotic block cipher with external key and its improved version

    International Nuclear Information System (INIS)

    Li Chengqing; Li Shujun; Alvarez, Gonzalo; Chen Guanrong; Lo, K.-T.

    2008-01-01

    Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: (1) a number of weak keys exist; (2) some important intermediate data of the cipher are not sufficiently random; (3) the whole secret key can be broken by a known-plaintext attack with only 120 consecutive known plain-bytes in one known plaintext. In addition, it is pointed out that an improved version of the chaotic cipher proposed by Wei et al. still suffers from all the same security defects

  10. Block cipher based on modular arithmetic and methods of information compression

    Science.gov (United States)

    Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.

    2017-10-01

    The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.

  11. CIPHER: coded imager and polarimeter for high-energy radiation

    CERN Document Server

    Caroli, E; Dusi, W; Bertuccio, G; Sampietro, M

    2000-01-01

    The CIPHER instrument is a hard X- and soft gamma-ray spectroscopic and polarimetric coded mask imager based on an array of cadmium telluride micro-spectrometers. The position-sensitive detector (PSD) will be arranged in 4 modules of 32x32 crystals, each of 2x2 mm sup 2 cross section and 10 mm thickness giving a total active area of about 160 cm sup 2. The micro-spectrometer characteristics allow a wide operating range from approx 10 keV to 1 MeV, while the PSD is actively shielded by CsI crystals on the bottom in order to reduce background. The mask, based on a modified uniformly redundant array (MURA) pattern, is four times the area of the PSD and is situated at about 100 cm from the CdTe array top surface. The CIPHER instrument is proposed for a balloon experiment, both in order to assess the performance of such an instrumental concept for a small/medium-size satellite survey mission and to perform an innovative measurement of the Crab polarisation level. The CIPHER's field of view allows the instrument to...

  12. Buffering Implications for the Design Space of Streaming MEMS Storage

    NARCIS (Netherlands)

    Khatib, M.G.; Abelmann, Leon; Preas, Kathy

    2011-01-01

    Emerging nanotechnology-based systems encounter new non-functional requirements. This work addresses MEMS storage, an emerging technology that promises ultrahigh density and energy-efficient storage devices. We study the buffering requirement of MEMS storage in streaming applications. We show that

  13. Effects of natural-channel-design restoration on habitat quality in Catskill Mountain streams, New York

    Science.gov (United States)

    Ernst, Anne G.; Baldigo, Barry P.; Mulvihill, Christiane; Vian, Mark

    2010-01-01

    Stream restoration has received much attention in recent years, yet there has been little effort to evaluate its impacts on physical habitat, stability, and biota. A popular but controversial stream restoration approach is natural channel design (NCD), which cannot be adequately evaluated without a long-term, independent assessment of its effects on stream habitat. Six reaches of five Catskill Mountain streams in southeastern New York were restored during 2000–2003 following NCD techniques to decrease bed and bank degradation, decrease sediment loads, and improve water quality. Habitat surveys were conducted during summer low flows from 2001 to 2007. The effects of the NCD projects on stream condition were assessed via a before–after–control–impact study design to quantify the net changes in stream and bank habitat variables relative to those in unaltered control reaches. Analysis of variance tests of three different measures of bank stability show that on average stream stability increased at treatment sites for 2–5 years after restoration. Mean channel depth, thalweg depth, and the pool–riffle ratio generally increased, whereas mean channel width, percent streambank coverage by trees, and shade decreased. Habitat suitability indices for local salmonid species increased at four of six reaches after restoration. The changes in channel dimensions rendered them generally more characteristic of stabler stream forms in the given valley settings. Although these studies were done relatively soon after project completion, our findings demonstrate that habitat conditions can be improved in degraded Catskill Mountain streams through NCD restoration.

  14. Characterization of HIFU transducers designed for sonochemistry application: Acoustic streaming.

    Science.gov (United States)

    Hallez, L; Touyeras, F; Hihn, J-Y; Bailly, Y

    2016-03-01

    Cavitation distribution in a High Intensity Focused Ultrasound sonoreactors (HIFU) has been extensively described in the recent literature, including quantification by an optical method (Sonochemiluminescence SCL). The present paper provides complementary measurements through the study of acoustic streaming generated by the same kind of HIFU transducers. To this end, results of mass transfer measurements (electrodiffusional method) were compared to optical method ones (Particle Image Velocimetry). This last one was used in various configurations: with or without an electrode in the acoustic field in order to have the same perturbation of the wave propagation. Results show that the maximum velocity is not located at the focal but shifted near the transducer, and that this shift is greater for high powers. The two cavitation modes (stationary and moving bubbles) are greatly affect the hydrodynamic behavior of our sonoreactors: acoustic streaming and the fluid generated by bubble motion. The results obtained by electrochemical measurements show the same low hydrodynamic activity in the transducer vicinity, the same shift of the active focal toward the transducer, and the same absence of activity in the post-focal axial zone. The comparison with theoretical Eckart's velocities (acoustic streaming in non-cavitating media) confirms a very high activity at the "sonochemical focal", accounted for by wave distortion, which induced greater absorption coefficients. Moreover, the equivalent liquid velocities are one order of magnitude larger than the ones measured by PIV, confirming the enhancement of mass transfer by bubbles oscillation and collapse close to the surface, rather than from a pure streaming effect. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Bridge scour and stream instability countermeasures : experience, selection, and design guidance : third edition. Volume 1

    Science.gov (United States)

    2009-09-01

    This document identifies and provides design guidelines for bridge scour and stream instability countermeasures that have been implemented by various State departments of transportation (DOTs) in the United States. Countermeasure experience, selectio...

  16. Bridge scour and stream instability countermeasures : experience, selection, and design guidance : third edition. Volume 2

    Science.gov (United States)

    2009-09-01

    This document identifies and provides design guidelines for bridge scour and stream instability countermeasures that have been implemented by various State departments of transportation (DOTs) in the United States. Countermeasure experience, selectio...

  17. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  18. Layer-based buffer aware rate adaptation design for SHVC video streaming

    Science.gov (United States)

    Gudumasu, Srinivas; Hamza, Ahmed; Asbun, Eduardo; He, Yong; Ye, Yan

    2016-09-01

    This paper proposes a layer based buffer aware rate adaptation design which is able to avoid abrupt video quality fluctuation, reduce re-buffering latency and improve bandwidth utilization when compared to a conventional simulcast based adaptive streaming system. The proposed adaptation design schedules DASH segment requests based on the estimated bandwidth, dependencies among video layers and layer buffer fullness. Scalable HEVC video coding is the latest state-of-art video coding technique that can alleviate various issues caused by simulcast based adaptive video streaming. With scalable coded video streams, the video is encoded once into a number of layers representing different qualities and/or resolutions: a base layer (BL) and one or more enhancement layers (EL), each incrementally enhancing the quality of the lower layers. Such layer based coding structure allows fine granularity rate adaptation for the video streaming applications. Two video streaming use cases are presented in this paper. The first use case is to stream HD SHVC video over a wireless network where available bandwidth varies, and the performance comparison between proposed layer-based streaming approach and conventional simulcast streaming approach is provided. The second use case is to stream 4K/UHD SHVC video over a hybrid access network that consists of a 5G millimeter wave high-speed wireless link and a conventional wired or WiFi network. The simulation results verify that the proposed layer based rate adaptation approach is able to utilize the bandwidth more efficiently. As a result, a more consistent viewing experience with higher quality video content and minimal video quality fluctuations can be presented to the user.

  19. Structural Responses of a Stream Community to a Channel Relocation Using a Natural Channel Design Approach

    Science.gov (United States)

    Jack, J.; Word, D.; Daniel, W.; Pritchard, S.; Parola, A.; Vesely, B.

    2005-05-01

    Streams have been heavily impacted by historical and contemporary management practices. Restorations are seen as a way to enhance stream ecosystem integrity, but there are few restoration sites where pre- and post-restoration data are available to assess "success." In 2003, a channelized reach of Wilson Creek (Kentucky, USA) was relocated using a natural channel design approach. We compared the structural and functional responses of the stream pre- and post restoration/relocation at sites within Wilson and two reference streams. Despite the construction disturbance, water chemistry parameters such as nitrate and turbidity were nearly identical at sampling stations above and below the relocation for 2003-2004. Macroinvertebrate colonization of the relocation sites was rapid, with communities dominated by Cheumatopsyche, Perlesta and Baetis. Assessments of CPOM transport indicated that the new stream channel is more retentive of leaf and woody debris material than the pre-restoration Wilson sites or unrestored reference stream sites. The restoration of suitable habitat and the presence of "source populations" for colonization may compensate for even large-scale (but short-term) construction disturbance. More research is needed to assess the balance between the disturbance impacts of restoration installation and the long term benefits of stream ecological improvement.

  20. Cache Timing Analysis of eStream Finalists

    DEFF Research Database (Denmark)

    Zenner, Erik

    2009-01-01

    Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the AES. However, their applicability to other cryptographic primitives is less well researched. In this talk, we give an overview over our analysis of the stream ciphers that were selected for phase 3...

  1. Development of Ecogeomorphological (EGM Stream Design and Assessment Tools for the Piedmont of Alabama, USA

    Directory of Open Access Journals (Sweden)

    Brian Helms

    2016-04-01

    Full Text Available Regional data needed for effective stream restoration include hydraulic geometry relationships (i.e., regional curves and reference channel morphology parameters. Increasingly ecological conditions are being considered when designing, implementing, and assessing restoration efforts. We provide morphology relationships and associated ecological endpoint curves for reference streams in the Alabama piedmont. Twenty-one reference stream reaches were identified in the Tallapoosa drainage of Alabama, ranging from 0.2 to 242 km2 drainage area. Geomorphic surveys were conducted in each stream to measure riffle cross-sections and longitudinal profiles and related to drainage area to develop regional curves. Fish, crayfish, and benthic macroinvertebrates were collected from each surveyed reach and related to drainage area and geomorphic data to provide associated biological community endpoints. Bankfull channel cross-section area, width, mean depth, and estimated discharge were strongly correlated to watershed drainage area, similar to efforts in other areas of the Piedmont ecoregion. Multiple measures of fish assemblages and crayfish size were strongly predicted by drainage area and geomorphic dimensions. Macroinvertebrates showed no taxonomic and limited functional relationships with drainage area and geomorphic dimension. These tools, which integrate geomorphological and ecological conditions, can result in improved stream evaluations and designs increasing the effectiveness of stream restoration projects.

  2. Design and methods of the Southeast Stream Quality Assessment (SESQA), 2014

    Science.gov (United States)

    Journey, Celeste A.; Van Metre, Peter C.; Bell, Amanda H.; Button, Daniel T.; Garrett, Jessica D.; Nakagaki, Naomi; Qi, Sharon L.; Bradley, Paul M.

    2015-07-15

    During 2014, the U.S. Geological Survey (USGS) National Water-Quality Assessment Program (NAWQA) assessed stream quality across the Piedmont and southern Appalachian Mountain regions of the southeastern United States. This Southeast Stream Quality Assessment (SESQA) simultaneously characterized watershed and stream-reach water-quality stressors along with instream biological conditions, in order to better understand regional stressor-effects relations. The goal of SESQA is to provide communities and policymakers with information about those human and environmental factors that have the greatest impact on stream quality across the region. The SESQA design focused on hydrologic alteration and urbanization because of their importance as ecological stressors of particular concern to Southeast region resource managers.

  3. A new block cipher based on chaotic map and group theory

    International Nuclear Information System (INIS)

    Yang Huaqian; Liao Xiaofeng; Wong Kwokwo; Zhang Wei; Wei Pengcheng

    2009-01-01

    Based on the study of some existing chaotic encryption algorithms, a new block cipher is proposed. In the proposed cipher, two sequences of decimal numbers individually generated by two chaotic piecewise linear maps are used to determine the noise vectors by comparing the element of the two sequences. Then a sequence of decimal numbers is used to define a bijection map. The modular multiplication operation in the group Z 2 8 +1 * and permutations are alternately applied on plaintext with block length of multiples of 64 bits to produce ciphertext blocks of the same length. Analysis show that the proposed block cipher does not suffer from the flaws of pure chaotic cryptosystems.

  4. Cryptanalysis of PRESENT-like ciphers with secret S-boxes

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor

    2011-01-01

    At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully cryptanalysed two and a half rounds. This paper considers PRESENT-like ciphers in a similar manner. We focus on the settings...... where the S-boxes are key dependent, and repeated for every round. We break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore...

  5. Stream Deniable-Encryption Algorithms

    Directory of Open Access Journals (Sweden)

    N.A. Moldovyan

    2016-04-01

    Full Text Available A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed with the secret and fake data streams so that the output ciphertext looks like the ciphertext produced by some probabilistic encryption algorithm applied to the fake message, while using the fake key. When the receiver or/and sender of the ciphertext are coerced to open the encryption key and the source message, they open the fake key and the fake message. To disclose their lie the coercer should demonstrate possibility of the alternative decryption of the ciphertext, however this is a computationally hard problem.

  6. Experimental design for estimating parameters of rate-limited mass transfer: Analysis of stream tracer studies

    Science.gov (United States)

    Wagner, Brian J.; Harvey, Judson W.

    1997-01-01

    Tracer experiments are valuable tools for analyzing the transport characteristics of streams and their interactions with shallow groundwater. The focus of this work is the design of tracer studies in high-gradient stream systems subject to advection, dispersion, groundwater inflow, and exchange between the active channel and zones in surface or subsurface water where flow is stagnant or slow moving. We present a methodology for (1) evaluating and comparing alternative stream tracer experiment designs and (2) identifying those combinations of stream transport properties that pose limitations to parameter estimation and therefore a challenge to tracer test design. The methodology uses the concept of global parameter uncertainty analysis, which couples solute transport simulation with parameter uncertainty analysis in a Monte Carlo framework. Two general conclusions resulted from this work. First, the solute injection and sampling strategy has an important effect on the reliability of transport parameter estimates. We found that constant injection with sampling through concentration rise, plateau, and fall provided considerably more reliable parameter estimates than a pulse injection across the spectrum of transport scenarios likely encountered in high-gradient streams. Second, for a given tracer test design, the uncertainties in mass transfer and storage-zone parameter estimates are strongly dependent on the experimental Damkohler number, DaI, which is a dimensionless combination of the rates of exchange between the stream and storage zones, the stream-water velocity, and the stream reach length of the experiment. Parameter uncertainties are lowest at DaI values on the order of 1.0. When DaI values are much less than 1.0 (owing to high velocity, long exchange timescale, and/or short reach length), parameter uncertainties are high because only a small amount of tracer interacts with storage zones in the reach. For the opposite conditions (DaI ≫ 1.0), solute

  7. Cryptanalysis of a chaos block cipher for wireless sensor network

    Science.gov (United States)

    Yang, Jiyun; Xiao, Di; Xiang, Tao

    2011-02-01

    Based on the analysis of a chaos block cipher for wireless sensor network (WSN), it is found that there is a fatal flaw in its security because the number of rounds is too small and the calculation precision of round function is too short. The scheme could be cryptanalyzed by utilizing differential cryptanalysis theory. First, the third round key is recovered by chosen plaintext attack according to the characteristics of the round function. Then, the second round key can be deduced from the relationship of the sub-keys between the second and the third rounds. Based on the above successful attacks, the first round key could also be broken by brute-force attack. Finally, by employing the characteristics of Feistel structure, the fourth round key could also be obtained. Since all round keys have been cryptanalyzed, the plaintext can then be decrypted. The encryption scheme is proven to be insecure consequently.

  8. Identifying Watershed, Landscape, and Engineering Design Factors that Influence the Biotic Condition of Restored Streams

    Directory of Open Access Journals (Sweden)

    Barbara Doll

    2016-04-01

    Full Text Available Restored stream reaches at 79 sites across North Carolina were sampled for aquatic macroinvertebrates using a rapid bioassessment protocol. Morphological design parameters and geographic factors, including watershed and landscape parameters (e.g., valley slope, substrate, were also compiled for these streams. Principal component regression analyses revealed correlations between design and landscape variables with macroinvertebrate metrics. The correlations were strengthened by adding watershed variables. Ridge regression was used to find the best-fit model for predicting dominant taxa from the “pollution sensitive” orders of Ephemeroptera (mayflies, Plecoptera (stoneflies, and Trichoptera (caddisflies, or EPT taxa, resulting in coefficient weights that were most interpretable relative to site selection and design parameters. Results indicate that larger (wider streams located in the mountains and foothills where there are steeper valleys, larger substrate, and undeveloped watersheds are expected to have higher numbers of dominant EPT taxa. In addition, EPT taxa numbers are positively correlated with accessible floodplain width and negatively correlated with width-to-depth ratio and sinuosity. This study indicates that both site selection and design should be carefully considered in order to maximize the resulting biotic condition and associated potential ecological uplift of the stream.

  9. Output channel design for collecting closely-spaced particle streams from spiral inertial separation devices

    Directory of Open Access Journals (Sweden)

    Caffiyar Mohamed Yousuff

    2017-08-01

    Full Text Available Recent advances in inertial microfluidics designs have enabled high throughput, label-free separation of cells for a variety of bioanalytical applications. Various device configurations have been proposed for binary separation with a focus on enhancing the separation distance between particle streams to improve the efficiency of separate particle collection. These configurations have not demonstrated scaling beyond 3 particle streams either because the channel width is a constraint at the collection outlets or particle streams would be too closely spaced to be collected separately. We propose a method to design collection outlets for inertial focusing and separation devices which can collect closely-spaced particle streams and easily scale to an arbitrary number of collection channels without constraining the outlet channel width, which is the usual cause of clogging or cell damage. According to our approach, collection outlets are a series of side-branching channels perpendicular to the main channel of egress. The width and length of the outlets can be chosen subject to constraints from the position of the particle streams and fluidic resistance ratio computed from fluid dynamics simulations. We show the efficacy of this approach by demonstrating a successful collection of upto 3 particle streams of 7μm, 10μm and 15μm fluorescent beads which have been focused and separated by a spiral inertial device with a separation distance of only 10μm -15μm. With a throughput of 1.8mL/min, we achieved collection efficiency exceeding 90% for each particle at the respective collection outlet. The flexibility to use wide collection channels also enabled us to fabricate the microfluidic device with an epoxy mold that was created using xurography, a low cost, and imprecise fabrication technique.

  10. Cross-Layer Design of Source Rate Control and Congestion Control for Wireless Video Streaming

    Directory of Open Access Journals (Sweden)

    Peng Zhu

    2007-01-01

    Full Text Available Cross-layer design has been used in streaming video over the wireless channels to optimize the overall system performance. In this paper, we extend our previous work on joint design of source rate control and congestion control for video streaming over the wired channel, and propose a cross-layer design approach for wireless video streaming. First, we extend the QoS-aware congestion control mechanism (TFRCC proposed in our previous work to the wireless scenario, and provide a detailed discussion about how to enhance the overall performance in terms of rate smoothness and responsiveness of the transport protocol. Then, we extend our previous joint design work to the wireless scenario, and a thorough performance evaluation is conducted to investigate its performance. Simulation results show that by cross-layer design of source rate control at application layer and congestion control at transport layer, and by taking advantage of the MAC layer information, our approach can avoid the throughput degradation caused by wireless link error, and better support the QoS requirements of the application. Thus, the playback quality is significantly improved, while good performance of the transport protocol is still preserved.

  11. Digital dashboard design using multiple data streams for disease surveillance with influenza surveillance as an example.

    Science.gov (United States)

    Cheng, Calvin K Y; Ip, Dennis K M; Cowling, Benjamin J; Ho, Lai Ming; Leung, Gabriel M; Lau, Eric H Y

    2011-10-14

    Great strides have been made exploring and exploiting new and different sources of disease surveillance data and developing robust statistical methods for analyzing the collected data. However, there has been less research in the area of dissemination. Proper dissemination of surveillance data can facilitate the end user's taking of appropriate actions, thus maximizing the utility of effort taken from upstream of the surveillance-to-action loop. The aims of the study were to develop a generic framework for a digital dashboard incorporating features of efficient dashboard design and to demonstrate this framework by specific application to influenza surveillance in Hong Kong. Based on the merits of the national websites and principles of efficient dashboard design, we designed an automated influenza surveillance digital dashboard as a demonstration of efficient dissemination of surveillance data. We developed the system to synthesize and display multiple sources of influenza surveillance data streams in the dashboard. Different algorithms can be implemented in the dashboard for incorporating all surveillance data streams to describe the overall influenza activity. We designed and implemented an influenza surveillance dashboard that utilized self-explanatory figures to display multiple surveillance data streams in panels. Indicators for individual data streams as well as for overall influenza activity were summarized in the main page, which can be read at a glance. Data retrieval function was also incorporated to allow data sharing in standard format. The influenza surveillance dashboard serves as a template to illustrate the efficient synthesization and dissemination of multiple-source surveillance data, which may also be applied to other diseases. Surveillance data from multiple sources can be disseminated efficiently using a dashboard design that facilitates the translation of surveillance information to public health actions.

  12. Use of Ecohydraulic-Based Mesohabitat Classification and Fish Species Traits for Stream Restoration Design

    Directory of Open Access Journals (Sweden)

    John S. Schwartz

    2016-11-01

    Full Text Available Stream restoration practice typically relies on a geomorphological design approach in which the integration of ecological criteria is limited and generally qualitative, although the most commonly stated project objective is to restore biological integrity by enhancing habitat and water quality. Restoration has achieved mixed results in terms of ecological successes and it is evident that improved methodologies for assessment and design are needed. A design approach is suggested for mesohabitat restoration based on a review and integration of fundamental processes associated with: (1 lotic ecological concepts; (2 applied geomorphic processes for mesohabitat self-maintenance; (3 multidimensional hydraulics and habitat suitability modeling; (4 species functional traits correlated with fish mesohabitat use; and (5 multi-stage ecohydraulics-based mesohabitat classification. Classification of mesohabitat units demonstrated in this article were based on fish preferences specifically linked to functional trait strategies (i.e., feeding resting, evasion, spawning, and flow refugia, recognizing that habitat preferences shift by season and flow stage. A multi-stage classification scheme developed under this premise provides the basic “building blocks” for ecological design criteria for stream restoration. The scheme was developed for Midwest US prairie streams, but the conceptual framework for mesohabitat classification and functional traits analysis can be applied to other ecoregions.

  13. Cipher image damage and decisions in real time

    Science.gov (United States)

    Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David

    2015-01-01

    This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.

  14. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  15. Penerapan CIELab dan Chaos sebagai Cipher pada Aplikasi Kriptografi Citra Digital

    Directory of Open Access Journals (Sweden)

    Linna Oktaviana Sari

    2013-04-01

    Full Text Available The development of Internet supports people to transmit information, such as text, images and other media quickly. However, digital images transmitted over the Internet are very vulnerable to attacks, for examples modification and duplication by unauthorized people. Therefore, cryptography as one of method for data security has been developed. This research proposed a combination of color structure CIELab and key randomization by logistic map from chaos as new cipher in digital image cryptographic applications. Cipher is applied to the encryption and decryption process. Implementation of new cipher in cryptographic digital images application was built with Matlab R2010a. Based on the research that has been done, it was found that combination CIELab and chaos can be applied as a new cipher on the encryption and decryption of digital images for cryptographic applications with processing time less than 1 second. Under possible maximum key range on RGB image by 5,2x 1033, the cipher was sufficiently secure against brute-force attack. Decrypted image has good quality with PSNR greater than 50 dB for digital image formatted in “tiff” and “png”.

  16. An enhanced chaotic key-based RC5 block cipher adapted to image encryption

    Science.gov (United States)

    Faragallah, Osama S.

    2012-07-01

    RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.

  17. On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers

    DEFF Research Database (Denmark)

    Blondeau, Celine; Bogdanov, Andrey; Wang, Meiqin

    2014-01-01

    or inequivalence has not been formally addressed so far in a constructive practical way.In this paper, we aim to bridge this gap in the understanding of the links between the ID and ZC properties. We tackle this problem at the example of two wide classes of ciphers, namely, Feistel- and Skipjack-type ciphers...

  18. Design for real-time data acquisition based on streaming technology

    International Nuclear Information System (INIS)

    Nakanishi, Hideya; Kojima, Mamoru

    2001-04-01

    For the LHD project a long-pulse plasma experiment of one-hour duration is planned. In this quasi steady-state operation, the data acquisition system will be required to continuously transfer the diagnostic data from the digitizer front-end and display them in real-time. The Compact PCI standard is used to replace the conventional CAMAC digitizers in LHD, because it provides good functionality for real-time data streaming and also a connectivity with modern PC technology. The digitizer scheme, interface to the host computer, adoption of data compression, and downstream applications are discussed in detail to design and implement this new real-time data streaming system for LHD plasma diagnostics. (author)

  19. A Design of Experiments Investigation of Offset Streams for Supersonic Jet Noise Reduction

    Science.gov (United States)

    Henderson, Brenda; Papamoschou, Dimitri

    2014-01-01

    An experimental investigation into the noise characteristics of a dual-stream jet with four airfoils inserted in the fan nozzle was conducted. The intent of the airfoils was to deflect the fan stream relative to the core stream and, therefore, impact the development of the secondary potential core and noise radiated in the peak jet-noise direction. The experiments used a full-factorial Design of Experiments (DoE) approach to identify parameters and parameter interactions impacting noise radiation at two azimuthal microphone array locations, one of which represented a sideline viewing angle. The parameters studied included airfoil angle-of-attack, airfoil azimuthal location within the fan nozzle, and airfoil axial location relative to the fan-nozzle trailing edge. Jet conditions included subsonic and supersonic fan-stream Mach numbers. Heated jets conditions were simulated with a mixture of helium and air to replicate the exhaust velocity and density of the hot jets. The introduction of the airfoils was shown to impact noise radiated at polar angles in peak-jet noise direction and to have no impact on noise radiated at small and broadside polar angles and to have no impact on broadband-shock-associated noise. The DoE analysis showed the main effects impacting noise radiation at sideline-azimuthal-viewing angles included airfoil azimuthal angle for the airfoils on the lower side of the jet near the sideline array and airfoil trailing edge distance (with airfoils located at the nozzle trailing edge produced the lowest sound pressure levels). For an array located directly beneath the jet (and on the side of the jet from which the fan stream was deflected), the main effects impacting noise radiation included airfoil angle-of-attack and airfoil azimuthal angle for the airfoils located on the observation side of the jet as well and trailing edge distance. Interaction terms between multiple configuration parameters were shown to have significant impact on the radiated

  20. Design and methods of the Midwest Stream Quality Assessment (MSQA), 2013

    Science.gov (United States)

    Garrett, Jessica D.; Frey, Jeffrey W.; Van Metre, Peter C.; Journey, Celeste A.; Nakagaki, Naomi; Button, Daniel T.; Nowell, Lisa H.

    2017-10-18

    During 2013, the U.S. Geological Survey (USGS) National Water-Quality Assessment Project (NAWQA), in collaboration with the USGS Columbia Environmental Research Center, the U.S. Environmental Protection Agency (EPA) National Rivers and Streams Assessment (NRSA), and the EPA Office of Pesticide Programs assessed stream quality across the Midwestern United States. This Midwest Stream Quality Assessment (MSQA) simultaneously characterized watershed and stream-reach water-quality stressors along with instream biological conditions, to better understand regional stressor-effects relations. The MSQA design focused on effects from the widespread agriculture in the region and urban development because of their importance as ecological stressors of particular concern to Midwest region resource managers.A combined random stratified selection and a targeted selection based on land-use data were used to identify and select sites representing gradients in agricultural intensity across the region. During a 14-week period from May through August 2013, 100 sites were selected and sampled 12 times for contaminants, nutrients, and sediment. This 14-week water-quality “index” period culminated with an ecological survey of habitat, periphyton, benthic macroinvertebrates, and fish at all sites. Sediment was collected during the ecological survey for analysis of sediment chemistry and toxicity testing. Of the 100 sites, 50 were selected for the MSQA random stratified group from 154 NRSA sites planned for the region, and the other 50 MSQA sites were selected as targeted sites to more evenly cover agricultural and urban stressor gradients in the study area. Of the 50 targeted sites, 12 were in urbanized watersheds and 21 represented “good” biological conditions or “least disturbed” conditions. The remaining 17 targeted sites were selected to improve coverage of the agricultural intensity gradient or because of historical data collection to provide temporal context for the

  1. A thermal design method for the performance optimization of multi-stream plate-fin heat exchangers

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Zhe; Li, Yanzhong [Xi’an Jiaotong University, Xi’an (China); Sunden, Bengt [Lund University, Lund (Sweden); Han, Fenghui [Dalian Maritime University, Dalian (China)

    2017-06-15

    An optimization design method based on field synergy principle is developed for Multi-stream plate-fin heat exchangers (MPHEs) with a segmented differential model. The heat exchanger is divided into a number of sub-exchangers along the main stream, and each sub-exchanger consists of N passages along the height of the exchanger. Compared with the traditional heat exchanger design, this method allows temperature and pressure fields to be obtained via coupling calculation with consideration of variable physical properties and the axial heat loss of the heat exchanger. Finally, the heat exchanger is optimally designed using a temperature-difference uniformity optimization factor based on field synergy principle. This design model can provide an accurate temperature field and pressure field, because the stream properties are determined by the mean temperature and pressure of each local sub-exchanger. Optimum results indicate that the temperature distribution on the cross section of the heat exchanger is relatively uniform and that the temperature difference of heat transfer for each stream is always a small value. These characteristics prove the feasibility and effectiveness of this design model. In this paper, a case of five stream plate-fin heat exchangers for an ethylene plant is designed under a practical cold box operating condition with the proposed model, the structure and heat transfer of which are optimally determined. The design model and optimization method proposed in this work can provide theoretical and technical support to the optimization design of MPHEs.

  2. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    Science.gov (United States)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  3. The (related-key) impossible boomerang attack and its application to the AES block cipher

    NARCIS (Netherlands)

    Lu, J.

    2011-01-01

    The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005. Impossible differential cryptanalysis and

  4. Implementation of Rivest Shamir Adleman Algorithm (RSA and Vigenere Cipher In Web Based Information System

    Directory of Open Access Journals (Sweden)

    Aryanti Aryanti

    2018-01-01

    Full Text Available Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  5. Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function

    NARCIS (Netherlands)

    Liu, Bozhong; Gong, Zheng; Chen, Xiaohong; Qiu, Weidong; Zheng, Dong

    2010-01-01

    Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second

  6. Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq

    DEFF Research Database (Denmark)

    Courtois, Nicolas T.; Bard, Gregory V.; Bogdanov, Andrey

    2008-01-01

    ]. In this paper we study a unique way of attacking KeeLoq, in which the periodic property of KeeLoq is used in to distinguish 512 rounds of KeeLoq from a random permutation. Our attacks require the knowledge of the entire code-book and are not among the fastest attacks known on this cipher. However one of them...

  7. Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed

    2012-01-01

    We use large but sparse correlation and transition-difference-probability submatrices to find the best linear and differential approximations respectively on PRESENT-like ciphers. This outperforms the branch and bound algorithm when the number of low-weight differential and linear characteristics...

  8. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    DEFF Research Database (Denmark)

    Bilgin, Begul; Bogdanov, Andrey; Knezevic, Miroslav

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security...

  9. The Effects of the Impedance of the Flow Source on the Design of Tidal Stream Generators

    Science.gov (United States)

    Salter, S.

    2011-12-01

    The maximum performance of a wind turbine is set by the well-known Betz limit. If the designer of a wind turbine uses too fast a rotation, too large a blade chord or too high an angle of blade pitch, the air flow can take an easier path over or around the rotor. Most estimates of the tidal stream resource use equations borrowed from wind and would be reasonably accurate for a single unit. But water cannot flow through the seabed or over rotors which reach to the surface. If contra-rotating, vertical-axis turbines with a rectangular flow-window are placed close to one another and reach from the surface close to the seabed, the leakage path is blocked and they become more like turbines in a closed duct. Instead of an equation with area times velocity-cubed we should use the first power of volume flow rate though the rotor times the pressure difference across it. A long channel with a rough bed will already be losing lots of energy and will behave more like a high impedance flow. Attempts to block it with closely-packed turbines will increase the head across the turbines with only a small effect on flow rate. The same thing will occur if a close-packed line of turbines is built out to sea from a headland. It is necessary to understand the impedance of the flow source all the way out to mid-ocean. In deep seas where the current velocities at the seabed are too slow to disturb the ooze the friction coefficients will be similar to those of gloss paint, perhaps 0.0025. But the higher velocities in shallow water will remove ooze and quite large sediments leaving rough, bare rock and leading to higher friction-coefficients. Energy dissipation will be set by the higher friction coefficients and the cube of the higher velocities. The presence of turbines will reduce seabed losses and about one third of the present loss can be converted to electricity. The velocity reduction would be about 10%. In many sites the energy output will be far higher than the wind turbine equations

  10. Selecting the optimum plot size for a California design-based stream and wetland mapping program.

    Science.gov (United States)

    Lackey, Leila G; Stein, Eric D

    2014-04-01

    Accurate estimates of the extent and distribution of wetlands and streams are the foundation of wetland monitoring, management, restoration, and regulatory programs. Traditionally, these estimates have relied on comprehensive mapping. However, this approach is prohibitively resource-intensive over large areas, making it both impractical and statistically unreliable. Probabilistic (design-based) approaches to evaluating status and trends provide a more cost-effective alternative because, compared with comprehensive mapping, overall extent is inferred from mapping a statistically representative, randomly selected subset of the target area. In this type of design, the size of sample plots has a significant impact on program costs and on statistical precision and accuracy; however, no consensus exists on the appropriate plot size for remote monitoring of stream and wetland extent. This study utilized simulated sampling to assess the performance of four plot sizes (1, 4, 9, and 16 km(2)) for three geographic regions of California. Simulation results showed smaller plot sizes (1 and 4 km(2)) were most efficient for achieving desired levels of statistical accuracy and precision. However, larger plot sizes were more likely to contain rare and spatially limited wetland subtypes. Balancing these considerations led to selection of 4 km(2) for the California status and trends program.

  11. WorkStream-- A Design Pattern for Multicore-Enabled Finite Element Computations

    KAUST Repository

    Turcksin, Bruno

    2016-08-31

    Many operations that need to be performed in modern finite element codes can be described as an operation that needs to be done independently on every cell, followed by a reduction of these local results into a global data structure. For example, matrix assembly, estimating discretization errors, or converting nodal values into data structures that can be output in visualization file formats all fall into this class of operations. Using this realization, we identify a software design pattern that we callWorkStream and that can be used to model such operations and enables the use of multicore shared memory parallel processing. We also describe in detail how this design pattern can be efficiently implemented, and we provide numerical scalability results from its use in the DEAL.II software library.

  12. VoIP Speech Encryption System Using Stream Cipher with Chaotic ...

    African Journals Online (AJOL)

    pc

    2018-03-22

    Mar 22, 2018 ... The technologies of Internet doesn't give any security mechanism and there is ... VoIP system, both digital (e.g., PC, PDA) and analog (e.g., telephone) devices ... the protection to speech through traditional encryption schemes ...

  13. Lorenz's attractor applied to the stream cipher (Ali-Pacha generator)

    International Nuclear Information System (INIS)

    Ali-Pacha, Adda; Hadj-Said, Naima; M'Hamed, A.; Belgoraf, A.

    2007-01-01

    The safety of information is primarily founded today on the calculation of algorithms whose confidentiality depends on the number of the necessary bits for the definition of a cryptographic key. If this type of system has proved reliable, then the increasing power of the means of calculation threatens the confidentiality of these methods. The powerful computers are certainly able to quantify and decipher information quickly, but their computing speed allows parallel cryptanalysis, which aims 'to break' a code by discovering the key, for example, by testing all the possible keys. The only evocation of the principle of the quantum computer, with the potentially colossal capacities of calculation, has started a shock, even in the most savaged who are convinced of algorithmic cryptography. To mitigate this concern, we will introduce in this article a new cryptographic system based on chaotic concepts

  14. Frequency-Dependent Streaming Potential of Porous Media—Part 1: Experimental Approaches and Apparatus Design

    Directory of Open Access Journals (Sweden)

    P. W. J. Glover

    2012-01-01

    Full Text Available Electrokinetic phenomena link fluid flow and electrical flow in porous and fractured media such that a hydraulic flow will generate an electrical current and vice versa. Such a link is likely to be extremely useful, especially in the development of the electroseismic method. However, surprisingly few experimental measurements have been carried out, particularly as a function of frequency because of their difficulty. Here we have considered six different approaches to make laboratory determinations of the frequency-dependent streaming potential coefficient. In each case, we have analyzed the mechanical, electrical, and other technical difficulties involved in each method. We conclude that the electromagnetic drive is currently the only approach that is practicable, while the piezoelectric drive may be useful for low permeability samples and at specified high frequencies. We have used the electro-magnetic drive approach to design, build, and test an apparatus for measuring the streaming potential coefficient of unconsolidated and disaggregated samples such as sands, gravels, and soils with a diameter of 25.4 mm and lengths between 50 mm and 300 mm.

  15. Breaking teleprinter ciphers at Bletchley Park an edition of I.J. Good, D. Michie and G. Timms : general report on tunny with emphasis on statistical methods (1945)

    CERN Document Server

    Diffie, W; Field, J

    2015-01-01

    This detailed technical account of breaking Tunny is an edition of a report written in 1945, with extensive modern commentary Breaking Teleprinter Ciphers at Bletchley Park gives the full text of the General Report on Tunny (GRT) of 1945, making clear how the ideas, notation and the specially designed machines that were used differ from what was generally accepted in 1945, and, where a modern reader might be misled, from what is understood now. The editors of this book clarify the sometimes slightly strange language of the GRT and explain the text within a variety of contexts in several separate historical story lines, some only implicit in the GRT itself. The first story, told by the authors of the GRT, describes how, using specially designed machines, including from 1944 the "Colossus", the British broke the enciphered teleprinter messages sent by the highest command levels of the Germany Army. The cipher machines the Germans used were the Loren SZ 40 series, called "Tunny" by the British. The second stor...

  16. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher

    Science.gov (United States)

    Panduranga, H. T.; Naveen Kumar, S. K.; Kiran, HASH(0x22c8da0)

    2014-06-01

    In this paper we presented a image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The proposed method consists of permutation and substitution process. In permutation process, plain image is permuted according to chaotic sequence generated using chaotic map. In substitution process, based on secrete key of 256 bit generate a Latin Square Image Cipher (LSIC) and this LSIC is used as key image and perform XOR operation between permuted image and key image. The proposed method can applied to any plain image with unequal width and height as well and also resist statistical attack, differential attack. Experiments carried out for different images of different sizes. The proposed method possesses large key space to resist brute force attack.

  17. Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher

    International Nuclear Information System (INIS)

    Skrobek, Adrian

    2008-01-01

    Many cryptographic schemes based on M.S. Baptista algorithm were created. The original algorithm and some of the versions that based upon it were put to test with various cryptanalytic techniques. This Letter shows the new approach to Baptista's cipher cryptanalysis. The presumption is that the attacker knows the mapping in between the characters of the plaintext and the numbers of the ε-interval. Then, depending on the amount of the knowledge about the key possessed, the estimation of all components of the key requires a different computational complexity, however it is possible. This Letter also takes into consideration, independently, all the components of the key from the M.S. Baptista's original algorithm. The main aim is the use of the approximation of the blurred chaotic orbit's real value in Baptista-type cipher cryptanalysis

  18. Field performance of timber bridges. 17, Ciphers stress-laminated deck bridge

    Science.gov (United States)

    James P. Wacker; James A. Kainz; Michael A. Ritter

    In September 1989, the Ciphers bridge was constructed within the Beltrami Island State Forest in Roseau County, Minnesota. The bridge superstructure is a two-span continuous stress-laminated deck that is approximately 12.19 m long, 5.49 m wide, and 305 mm deep (40 ft long, 18 ft wide, and 12 in. deep). The bridge is one of the first to utilize red pine sawn lumber for...

  19. Application and Misapplication of the Czechoslovak STP Cipher During WWII – Report on an Unpublished Manuscript

    Czech Academy of Sciences Publication Activity Database

    Porubský, Štefan

    2017-01-01

    Roč. 70, č. 1 (2017), s. 41-91 ISSN 1210-3195 Institutional support: RVO:67985807 Keywords : STP cipher * Josef Růžek * Karol Cigáň * František Moravec * Czechoslovak military cryptography * Word War II Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) https://tatra.mat.savba.sk/paper.php?id_paper=1412

  20. Design of a static mixer reactor for copper recovery from waste streams

    NARCIS (Netherlands)

    Van Wageningen, W.F.C.

    2005-01-01

    The main goal of the project was the development of a plug flow reactor for the reduction of heavy metals (Cu2+) from industrial waste streams. Potential application of the reduction process inside The Netherlands lies in the IC and galvanic industry, where small waste streams containing aqueous

  1. Design and implementation of streaming media server cluster based on FFMpeg.

    Science.gov (United States)

    Zhao, Hong; Zhou, Chun-long; Jin, Bao-zhao

    2015-01-01

    Poor performance and network congestion are commonly observed in the streaming media single server system. This paper proposes a scheme to construct a streaming media server cluster system based on FFMpeg. In this scheme, different users are distributed to different servers according to their locations and the balance among servers is maintained by the dynamic load-balancing algorithm based on active feedback. Furthermore, a service redirection algorithm is proposed to improve the transmission efficiency of streaming media data. The experiment results show that the server cluster system has significantly alleviated the network congestion and improved the performance in comparison with the single server system.

  2. Design and Implementation of Streaming Media Server Cluster Based on FFMpeg

    Science.gov (United States)

    Zhao, Hong; Zhou, Chun-long; Jin, Bao-zhao

    2015-01-01

    Poor performance and network congestion are commonly observed in the streaming media single server system. This paper proposes a scheme to construct a streaming media server cluster system based on FFMpeg. In this scheme, different users are distributed to different servers according to their locations and the balance among servers is maintained by the dynamic load-balancing algorithm based on active feedback. Furthermore, a service redirection algorithm is proposed to improve the transmission efficiency of streaming media data. The experiment results show that the server cluster system has significantly alleviated the network congestion and improved the performance in comparison with the single server system. PMID:25734187

  3. Design and methods of the Pacific Northwest Stream Quality Assessment (PNSQA), 2015

    Science.gov (United States)

    Sheibley, Rich W.; Morace, Jennifer L.; Journey, Celeste A.; Van Metre, Peter C.; Bell, Amanda H.; Nakagaki, Naomi; Button, Daniel T.; Qi, Sharon L.

    2017-08-25

    In 2015, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) project conducted the Pacific Northwest Stream Quality Assessment (PNSQA) to investigate stream quality across the western part of the Pacific Northwest. The goal of the PNSQA was to assess the health of streams in the region by characterizing multiple water-quality factors that are stressors to in-stream aquatic life and by evaluating the relation between these stressors and the condition of biological communities. The effects of urbanization and agriculture on stream quality for the Puget Lowland and Willamette Valley Level III Ecoregions were the focus of this regional study. Findings will help inform the public and policymakers about human and environmental factors that are the most critical in affecting stream quality and, thus, provide insights into possible strategies to protect or improve the health of streams in the region.Land-use data were used in the study to identify and select sites within the region that ranged in levels of urban and agricultural development. A total of 88 sites were selected across the region—69 were on streams that explicitly spanned a range of urban land use in their watersheds, 8 were on streams in agricultural watersheds, and 11 were reference sites with little or no development in their watersheds. Depending on the type of land use, sites were sampled for contaminants, nutrients, and sediment for either a 4- or 10-week period during April, May, and June 2015. This water-quality “index period” was immediately followed with an ecological survey of all sites that included stream habitat, benthic algae, benthic macroinvertebrates, and fish. Additionally, streambed sediment was collected during the ecological survey for analysis of sediment chemistry and toxicity testing.This report provides a detailed description of the specific study components and methods of the PNSQA, including (1) surveys of stream habitat and aquatic biota, (2) discrete

  4. Regulatory, design and methodological impacts in determining tidal-in-stream power resource potential

    International Nuclear Information System (INIS)

    Atwater, Joel F.; Lawrence, Gregory A.

    2011-01-01

    Tidal-in-Stream energy has been heralded by many as a significant potential source for clean power, a scheme where kinetic energy is extracted from tidal currents. A number of estimates have suggested that tidal power may become a sizeable fraction of overall electricity generation, however these estimates have been largely based on a resource assessment methodology that dramatically oversimplifies the physical phenomenon at play. This paper develops a model that considers the effect of energy extraction on the bulk flow, showing that tidal energy inventories that assess solely kinetic energy flux may represent both an order-of-magnitude overestimation of the resource and a significant oversimplification of regulatory impacts. The interplay between the characteristics of a flow and the regulatory and economic issues will likely limit tidal power generation to levels significantly below the physical maximums. Permitted flow reduction, turbine design and staging of development all have significant and predictable impacts on the extractible resource. Energy planners must therefore understand these relationships in order to appropriately assess the magnitude of generation that can be realistically be produced from tidal energy. - Research highlights: → Inventorying kinetic energy is not appropriate for assessing the tidal energy potential and may overestimate the resource by orders of magnitude. → The physical maximum for tidal power extraction is 38% of the total fluid power of a channel and causes a flow reduction of 42%. → Any amount of tidal power generation will reduce the flow rate in a channel. → Limiting the permitted reduction in flow significantly reduces the available resource. → Turbine efficiency is important as extraneous resistance depletes the resource without providing power generation.

  5. Communication and control by listening: towards optimal design of a two-class auditory streaming brain-computer interface

    Directory of Open Access Journals (Sweden)

    N. Jeremy Hill

    2012-12-01

    Full Text Available Most brain-computer interface (BCI systems require users to modulate brain signals in response to visual stimuli. Thus, they may not be useful to people with limited vision, such as those with severe paralysis. One important approach for overcoming this issue is auditory streaming, an approach whereby a BCI system is driven by shifts of attention between two dichotically presented auditory stimulus streams. Motivated by the long-term goal of translating such a system into a reliable, simple yes-no interface for clinical usage, we aim to answer two main questions. First, we asked which of two previously-published variants provides superior performance: a fixed-phase (FP design in which the streams have equal period and opposite phase, or a drifting-phase (DP design where the periods are unequal. We found FP to be superior to DP (p = 0.002: average performance levels were 80% and 72% correct, respectively. We were also able to show, in a pilot with one subject, that auditory streaming can support continuous control and neurofeedback applications: by shifting attention between ongoing left and right auditory streams, the subject was able to control the position of a paddle in a computer game. Second, we examined whether the system is dependent on eye movements, since it is known that eye movements and auditory attention may influence each other, and any dependence on the ability to move one’s eyes would be a barrier to translation to paralyzed users. We discovered that, despite instructions, some subjects did make eye movements that were indicative of the direction of attention. However, there was no correlation, across subjects, between the reliability of the eye movement signal and the reliability of the BCI system, indicating that our system was configured to work independently of eye movement. Together, these findings are an encouraging step forward toward BCIs that provide practical communication and control options for the most severely

  6. Communication and control by listening: toward optimal design of a two-class auditory streaming brain-computer interface.

    Science.gov (United States)

    Hill, N Jeremy; Moinuddin, Aisha; Häuser, Ann-Katrin; Kienzle, Stephan; Schalk, Gerwin

    2012-01-01

    Most brain-computer interface (BCI) systems require users to modulate brain signals in response to visual stimuli. Thus, they may not be useful to people with limited vision, such as those with severe paralysis. One important approach for overcoming this issue is auditory streaming, an approach whereby a BCI system is driven by shifts of attention between two simultaneously presented auditory stimulus streams. Motivated by the long-term goal of translating such a system into a reliable, simple yes-no interface for clinical usage, we aim to answer two main questions. First, we asked which of two previously published variants provides superior performance: a fixed-phase (FP) design in which the streams have equal period and opposite phase, or a drifting-phase (DP) design where the periods are unequal. We found FP to be superior to DP (p = 0.002): average performance levels were 80 and 72% correct, respectively. We were also able to show, in a pilot with one subject, that auditory streaming can support continuous control and neurofeedback applications: by shifting attention between ongoing left and right auditory streams, the subject was able to control the position of a paddle in a computer game. Second, we examined whether the system is dependent on eye movements, since it is known that eye movements and auditory attention may influence each other, and any dependence on the ability to move one's eyes would be a barrier to translation to paralyzed users. We discovered that, despite instructions, some subjects did make eye movements that were indicative of the direction of attention. However, there was no correlation, across subjects, between the reliability of the eye movement signal and the reliability of the BCI system, indicating that our system was configured to work independently of eye movement. Together, these findings are an encouraging step forward toward BCIs that provide practical communication and control options for the most severely paralyzed users.

  7. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Jessica

    2018-03-01

    This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

  8. Designer solvents for the extraction of glycols and alcohols from aqueous streams

    NARCIS (Netherlands)

    Garcia Chavez, L.Y.

    2013-01-01

    The separation of polar compounds from aqueous streams is one of the most energy intensive operations within the chemical industry, because of the formation of hydrogen bonds that should be broken and the high heat of vaporization of water. Important bulk chemicals like glycols and alcohols produced

  9. Design of the study on transitions in employment, ability and motivation (STREAM)

    NARCIS (Netherlands)

    Geuskens, G.A.; Ybema, J.F.; Heuvel, S.G. van den; Wind, A. de; Leijten, M.S.; Joling, C.I.; Blatter, B.M. van; Burdorf, A.; Beek, A.J. van der; Bongers, P.M.

    2013-01-01

    The objective of the Study on Transitions in Employment, Ability and Motivation (STREAM) is to acquire knowledge on determinants of healthy and productive work participation among persons aged 45–64 years. A research framework was developed with main outcomes of productivity and transitions in

  10. Codes, Ciphers, and Cryptography--An Honors Colloquium

    Science.gov (United States)

    Karls, Michael A.

    2010-01-01

    At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…

  11. ThermoData Engine: Extension to Solvent Design and Multi-component Process Stream Property Calculations with Uncertainty Analysis

    DEFF Research Database (Denmark)

    Diky, Vladimir; Chirico, Robert D.; Muzny, Chris

    ThermoData Engine (TDE, NIST Standard Reference Databases 103a and 103b) is the first product that implements the concept of Dynamic Data Evaluation in the fields of thermophysics and thermochemistry, which includes maintaining the comprehensive and up-to-date database of experimentally measured...... property values and expert system for data analysis and generation of recommended property values at the specified conditions along with uncertainties on demand. The most recent extension of TDE covers solvent design and multi-component process stream property calculations with uncertainty analysis...... variations). Predictions can be compared to the available experimental data, and uncertainties are estimated for all efficiency criteria. Calculations of the properties of multi-component streams including composition at phase equilibria (flash calculations) are at the heart of process simulation engines...

  12. Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis

    Science.gov (United States)

    Lu, Jiqiang; Kim, Jongsung

    SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. It is a NESSIE selected block cipher algorithm. In this paper, we observe that, when checking whether a candidate quartet is useful in a (related-key) rectangle attack, we can check the two pairs from the quartet one after the other, instead of checking them simultaneously; if the first pair does not meet the expected conditions, we can discard the quartet immediately. We next exploit a 35-round related-key rectangle distinguisher with probability 2-460 for the first 35 rounds of SHACAL-2, which is built on an existing 24-round related-key differential and a new 10-round differential. Finally, taking advantage of the above observation, we use the distinguisher to mount a related-key rectangle attack on the first 44 rounds of SHACAL-2. The attack requires 2233 related-key chosen plaintexts, and has a time complexity of 2497.2 computations. This is better than any previously published cryptanalytic results on SHACAL-2 in terms of the numbers of attacked rounds.

  13. Implementation of RC5 and RC6 block ciphers on digital images

    International Nuclear Information System (INIS)

    Belhaj Mohamed, A.; Zaibi, G.; Kachouri, A.

    2011-01-01

    With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality, and integrity must be implemented within their community. For this reason, several cryptographic algorithms have been developed to ensure the safety and reliability of this transmission. In this paper, we investigate the encryption efficiency of RC5 and RC6 block cipher applied to digital images by including a statistical and differential analysis then, and also we investigate those two block ciphers against errors in ambient noise. The security analysis shows that RC6 algorithm is more secure than RC5. However, using RC6 to encrypt images in rough environment (low signal to noise ratio) leads to more errors (almost double of RC5) and may increase energy consumption by retransmitting erroneous packets. A compromise security/energy must be taken into account for the good choice of encryption algorithm.

  14. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  15. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  16. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  17. Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs

    Directory of Open Access Journals (Sweden)

    William Diehl

    2018-04-01

    Full Text Available Lightweight block ciphers are an important topic in the Internet of Things (IoT since they provide moderate security while requiring fewer resources than the Advanced Encryption Standard (AES. Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA, and the ability to apply countermeasures. While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is difficult, since researchers typically use varied architectures, optimization strategies, technologies, and evaluation techniques. In this research, we leverage the Test Vector Leakage Assessment (TVLA methodology and the FOBOS SCA framework to compare FPGA implementations of AES, SIMON, SPECK, PRESENT, LED, and TWINE, using a choice of architecture targeted to optimize throughput-to-area (TP/A ratio and suitable for introducing countermeasures to Differential Power Analysis (DPA. We then apply an equivalent level of protection to the above ciphers using 3-share threshold implementations (TI and verify the improved resistance to DPA. We find that SIMON has the highest absolute TP/A ratio of protected versions, as well as the lowest relative cost of protection in terms of TP/A ratio. Additionally, PRESENT uses the least energy per bit (E/bit of all protected implementations, while AES has the lowest relative cost of protection in terms of increased E/bit.

  18. Design, Implementation and Evaluation of Congestion Control Mechanism for Video Streaming

    OpenAIRE

    Hiroshi Noborio; Hiroyuki Hisamatsu; Hiroki Oda

    2011-01-01

    In recent years, video streaming services over TCP, such as YouTube, have become more and more popular. TCP NewReno, the current TCP standard, performs greedy congestion control, which increases the congestion window size until packet loss occurs. Therefore, because TCP transmits data at a much higher rate than the video playback rate, the probability of packet loss in the network increases, which in turn takes bandwidth from other network traffic. In this paper, we propose a new transport-la...

  19. Variable responses of fish assemblages, habitat, and stability to natural-channel-design restoration in Catskill Mountain streams

    Science.gov (United States)

    Baldigo, Barry P.; Ernst, Anne G.; Warren, Dana R.; Miller, Sarah J.

    2010-01-01

    Natural-channel-design (NCD) restorations were recently implemented within large segments of five first- and second-order streams in the Catskill Mountains of New York in an attempt to increase channel stability, reduce bed and bank erosion, and sustain water quality. In conjunction with these efforts, 54 fish and habitat surveys were done from 1999 to 2007 at six restored reaches and five stable control reaches to evaluate the effects of NCD restoration on fish assemblages, habitat, and bank stability. A before–after–control–impact study design and two-factor analysis of variance were used to quantify the net changes in habitat and fish population and community indices at treatment reaches relative to those at unaltered control reaches. The density and biomass of fish communities were often dominated by one or two small prey species and no or few predator species before restoration and by one or more trout (Salmonidae) species after restoration. Significant increases in community richness (30%), diversity (40%), species or biomass equitability (32%), and total biomass (up to 52%) in at least four of the six restored reaches demonstrate that NCD restorations can improve the health and sustainability of fish communities in geomorphically unstable Catskill Mountain streams over the short to marginally long term. Bank stability, stream habitat, and trout habitat suitability indices (HSIs) generally improved significantly at the restored reaches, but key habitat features and trout HSIs did not change or decreased at two of them. Fish communities and trout populations at these two reaches were not positively affected by NCD restorations. Though NCD restorations often had a positive effect on habitat and fish communities, our results show that the initial habitat conditions limit the relative improvements than can be achieved, habitat quality and stability do not necessarily respond in unison, and biotic and abiotic responses cannot always be generalized.

  20. DAEDALUS: System-Level Design Methodology for Streaming Multiprocessor Embedded Systems on Chips

    NARCIS (Netherlands)

    Stefanov, T.; Pimentel, A.; Nikolov, H.; Ha, S.; Teich, J.

    2017-01-01

    The complexity of modern embedded systems, which are increasingly based on heterogeneous multiprocessor system-on-chip (MPSoC) architectures, has led to the emergence of system-level design. To cope with this design complexity, system-level design aims at raising the abstraction level of the design

  1. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

    Science.gov (United States)

    Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi

    2018-01-01

    Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.

  2. Extended substitution-diffusion based image cipher using chaotic standard map

    Science.gov (United States)

    Kumar, Anil; Ghose, M. K.

    2011-01-01

    This paper proposes an extended substitution-diffusion based image cipher using chaotic standard map [1] and linear feedback shift register to overcome the weakness of previous technique by adding nonlinearity. The first stage consists of row and column rotation and permutation which is controlled by the pseudo-random sequences which is generated by standard chaotic map and linear feedback shift register, second stage further diffusion and confusion is obtained in the horizontal and vertical pixels by mixing the properties of the horizontally and vertically adjacent pixels, respectively, with the help of chaotic standard map. The number of rounds in both stage are controlled by combination of pseudo-random sequence and original image. The performance is evaluated from various types of analysis such as entropy analysis, difference analysis, statistical analysis, key sensitivity analysis, key space analysis and speed analysis. The experimental results illustrate that performance of this is highly secured and fast.

  3. Application of a concept development process to evaluate process layout designs using value stream mapping and simulation

    Directory of Open Access Journals (Sweden)

    Ki-Young Jeong

    2011-07-01

    Full Text Available Purpose: We propose and demonstrate a concept development process (CDP as a framework to solve a value stream mapping (VSM related process layout design optimization problem.Design/methodology/approach: A case study approach was used to demonstrate the effectiveness of CDP framework in a portable fire extinguisher manufacturing company. To facilitate the CDP application, we proposed the system coupling level index (SCLI and simulation to evaluate the process layout design concepts.Findings: As part of the CDP framework application, three process layout design concepts - current layout (CL, express lane layout (ELL and independent zone layout (IZL - were generated. Then, the SCLI excluded CL and simulation selected IZL as the best concept. The simulation was also applied to optimize the performance of IZL in terms of the number of pallets. Based on this case study, we concluded that CDP framework worked well.Research limitations/implications: The process layout design optimization issue has not been well addressed in the VSM literature. We believe that this paper initiated the relevant discussion by showing the feasibility of CDP as a framework in this issue.Practical implications: The CDP and SCLI are very practice-oriented approaches in the sense that they do not require any complex analytical knowledge.Originality/value: We discussed a not well-addressed issue with a systematic framework. In addition, the SCLI presented was also unique.

  4. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  5. WorkStream-- A Design Pattern for Multicore-Enabled Finite Element Computations

    KAUST Repository

    Turcksin, Bruno; Kronbichler, Martin; Bangerth, Wolfgang

    2016-01-01

    , matrix assembly, estimating discretization errors, or converting nodal values into data structures that can be output in visualization file formats all fall into this class of operations. Using this realization, we identify a software design pattern

  6. A preliminary assessment of the assignment of Intermediate Level Waste streams to designs of transport containers

    International Nuclear Information System (INIS)

    Mairs, J.H.

    1984-08-01

    This paper considers the assignment of ILW to designs of transport container. Estimates are made of the radiation levels penetrating the transport containers and assesses the duration of any storage required prior to transportation. (author)

  7. Streams with Strahler Stream Order

    Data.gov (United States)

    Minnesota Department of Natural Resources — Stream segments with Strahler stream order values assigned. As of 01/08/08 the linework is from the DNR24K stream coverages and will not match the updated...

  8. Advancing stream restoration design: a science-based approach using data and methodologies from the agencies

    Science.gov (United States)

    Jessica Palazzolo; Joshua Robinson; Phillip Ellis

    2016-01-01

    Ecosystem restoration design is a relatively new field of work that requires multi-disciplinary expertise in the natural sciences. Although the field is new, federal agencies and public institutions have spent several decades and millions of dollars researching the sciences and methods that underly restoration activities. However, many restoration practitioners are...

  9. Streaming Pool: reuse, combine and create reactive streams with pleasure

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    When connecting together heterogeneous and complex systems, it is not easy to exchange data between components. Streams of data are successfully used in industry in order to overcome this problem, especially in the case of "live" data. Streams are a specialization of the Observer design pattern and they provide asynchronous and non-blocking data flow. The ongoing effort of the ReactiveX initiative is one example that demonstrates how demanding this technology is even for big companies. Bridging the discrepancies of different technologies with common interfaces is already done by the Reactive Streams initiative and, in the JVM world, via reactive-streams-jvm interfaces. Streaming Pool is a framework for providing and discovering reactive streams. Through the mechanism of dependency injection provided by the Spring Framework, Streaming Pool provides a so called Discovery Service. This object can discover and chain streams of data that are technologically agnostic, through the use of Stream IDs. The stream to ...

  10. Design of Experiments Relevant to Accreting Stream-Disk Impact in Interacting Binaries

    Science.gov (United States)

    Krauland, Christine; Drake, R. P.; Kuranz, C. C.; Grosskopf, M. J.; Young, R.; Plewa, T.

    2010-05-01

    In many Cataclysmic Binary systems, mass transfer via Roche lobe overflow onto an accretion disk occurs. This produces a hot spot from the heating created by the supersonic impact of the infalling flow with the rotating accretion disk, which can produce a radiative reverse shock in the infalling flow. This collision region has many ambiguities as a radiation hydrodynamic system. Depending upon conditions, it has been argued (Armitgae & Livio, ApJ 493, 898) that the shocked region may be optically thin, thick, or intermediate, which has the potential to significantly alter its structure and emissions. Laboratory experiments have yet to produce colliding flows that create a radiative reverse shock or to produce obliquely incident colliding flows, both of which are aspects of these Binary systems. We have undertaken the design of such an experiment, aimed at the Omega-60 laser facility. The design elements include the production of postshock flows within a dense material layer or ejecta flows by release of material from a shocked layer. Obtaining a radiative reverse shock in the laboratory requires producing a sufficiently fast flow (> 100 km/s) within a material whose opacity is large enough to produce energetically significant emission from experimentally achievable layers. In this poster we will discuss the astrophysical context, the experimental design work we have done, and the challenges of implementing and diagnosing an actual experiment. This work is funded by the NNSA-DS and SC-OFES Joint Program in High-Energy-Density Laboratory Plasmas, by the National Laser User Facility Program in NNSA-DS and by the Predictive Sciences Academic Alliances Program in NNSA-ASC. The corresponding grant numbers are DE-FG52-09NA29548, DE-FG52-09NA29034, and DE-FC52-08NA28616.

  11. The MainSTREAM Component Platform: A Holistic Approach to Microfluidic System Design

    DEFF Research Database (Denmark)

    Sabourin, David; Skafte-Pedersen, Peder; Søe, Martin Jensen

    2013-01-01

    A microfluidic component library for building systems driving parallel or serial microfluidic-based assays is presented. The components are a miniaturized eight-channel peristaltic pump, an eight-channel valve, sample-to-waste liquid management, and interconnections. The library of components...... of reaction chips; (2) highly parallel pumping and routing/valving capability; (3) methods to interface pumps and chip-to-liquid management systems; (4) means to construct a portable system; (5) reconfigurability/flexibility in system design; (6) means to interface to microscopes; and (7) compatibility...

  12. Robust Transceivers Design for Multi-stream Multi-user MIMO Visible Light Communication

    KAUST Repository

    Sifaou, Houssem

    2017-11-27

    Visible light communication (VLC) is an emerging technique that uses light-emitting diodes to combine communication and illumination. It is considered as a promising scheme for indoor wireless communication that can be deployed at reduced costs, while offering high data rate performance. This paper focuses on the design of precoding and receiving schemes for downlink multi-user multiple-input multiple-output VLC systems using angle diversity receivers. Two major concerns need to be considered while solving such a problem. The first one is related to the inter-user interference, basically inherent to our consideration of a multi-user system, while the second results from the users’ mobility, causing imperfect channel estimates. To address both concerns, we propose robust precoding and receiver that solve the max-min SINR problem. The performance of the proposed VLC design is studied under different working conditions, where a significant gain of the proposed robust transceivers over their non-robust counterparts has been observed.

  13. Stochastic production phase design for an open pit mining complex with multiple processing streams

    Science.gov (United States)

    Asad, Mohammad Waqar Ali; Dimitrakopoulos, Roussos; van Eldert, Jeroen

    2014-08-01

    In a mining complex, the mine is a source of supply of valuable material (ore) to a number of processes that convert the raw ore to a saleable product or a metal concentrate for production of the refined metal. In this context, expected variation in metal content throughout the extent of the orebody defines the inherent uncertainty in the supply of ore, which impacts the subsequent ore and metal production targets. Traditional optimization methods for designing production phases and ultimate pit limit of an open pit mine not only ignore the uncertainty in metal content, but, in addition, commonly assume that the mine delivers ore to a single processing facility. A stochastic network flow approach is proposed that jointly integrates uncertainty in supply of ore and multiple ore destinations into the development of production phase design and ultimate pit limit. An application at a copper mine demonstrates the intricacies of the new approach. The case study shows a 14% higher discounted cash flow when compared to the traditional approach.

  14. Robust Transceivers Design for Multi-stream Multi-user MIMO Visible Light Communication

    KAUST Repository

    Sifaou, Houssem; Kammoun, Abla; Park, Kihong; Alouini, Mohamed-Slim

    2017-01-01

    Visible light communication (VLC) is an emerging technique that uses light-emitting diodes to combine communication and illumination. It is considered as a promising scheme for indoor wireless communication that can be deployed at reduced costs, while offering high data rate performance. This paper focuses on the design of precoding and receiving schemes for downlink multi-user multiple-input multiple-output VLC systems using angle diversity receivers. Two major concerns need to be considered while solving such a problem. The first one is related to the inter-user interference, basically inherent to our consideration of a multi-user system, while the second results from the users’ mobility, causing imperfect channel estimates. To address both concerns, we propose robust precoding and receiver that solve the max-min SINR problem. The performance of the proposed VLC design is studied under different working conditions, where a significant gain of the proposed robust transceivers over their non-robust counterparts has been observed.

  15. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  16. Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2017-01-01

    Full Text Available The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF is presented. Proposed modification avoids discrete logarithm attack (DLA which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ system of equations, which is a system representing a subclass of multivariate quadratic (MQ systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA and chosen ciphertext attack (CCA is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.

  17. Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

    International Nuclear Information System (INIS)

    Khalaf, Rifaat Zaidan; Abdullah, Alharith Abdulkareem

    2014-01-01

    Based on a quantum shift register, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. The message is encoded and decoded by using a code generated by the quantum shift register. The security of this algorithm is analysed in detail. It is shown that, in the quantum block cryptographic algorithm, two keys can be used. One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept of digital signature for the authentication of the two communicating parties and so eliminate the man-in-the-middle attack. The other key is generated by the quantum shift register and used for the coding of the encryption message, where Alice and Bob share the key by using the BB84 protocol. The novel algorithm can prevent a quantum attack strategy as well as a classical attack strategy. The problem of key management is discussed and circuits for the encryption and the decryption are suggested

  18. Image Encryption Using a Lightweight Stream Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Saeed Bahrami

    2012-01-01

    Full Text Available Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.

  19. Toward 3D-IPTV: design and implementation of a stereoscopic and multiple-perspective video streaming system

    Science.gov (United States)

    Petrovic, Goran; Farin, Dirk; de With, Peter H. N.

    2008-02-01

    3D-Video systems allow a user to perceive depth in the viewed scene and to display the scene from arbitrary viewpoints interactively and on-demand. This paper presents a prototype implementation of a 3D-video streaming system using an IP network. The architecture of our streaming system is layered, where each information layer conveys a single coded video signal or coded scene-description data. We demonstrate the benefits of a layered architecture with two examples: (a) stereoscopic video streaming, (b) monoscopic video streaming with remote multiple-perspective rendering. Our implementation experiments confirm that prototyping 3D-video streaming systems is possible with today's software and hardware. Furthermore, our current operational prototype demonstrates that highly heterogeneous clients can coexist in the system, ranging from auto-stereoscopic 3D displays to resource-constrained mobile devices.

  20. Stream Crossings

    Data.gov (United States)

    Vermont Center for Geographic Information — Physical measurements and attributes of stream crossing structures and adjacent stream reaches which are used to provide a relative rating of aquatic organism...

  1. Akamai Streaming

    OpenAIRE

    ECT Team, Purdue

    2007-01-01

    Akamai offers world-class streaming media services that enable Internet content providers and enterprises to succeed in today's Web-centric marketplace. They deliver live event Webcasts (complete with video production, encoding, and signal acquisition services), streaming media on demand, 24/7 Webcasts and a variety of streaming application services based upon their EdgeAdvantage.

  2. Propylene/Nitrogen Separation in a By-Stream of the Polypropylene Production: From Pilot Test and Model Validation to Industrial Scale Process Design and Optimization

    OpenAIRE

    Guler Narin; Ana Ribeiro; Alexandre Ferreira; Young Hwang; U-Hwang Lee; José Loureiro; Jong-San Chang; Alírio Rodrigues

    2014-01-01

    Two industrial-scale pressure swing adsorption (PSA) processes were designed and optimized by simulations: recovery of only nitrogen and recovery of both nitrogen and propylene from a polypropylene manufacture purge gas stream. MIL-100(Fe) granulates were used as adsorbent. The mathematical model employed in the simulations was verified by a PSA experiment. The effect of several operating parameters on the performance of the proposed PSA processes was investigated. For the nitrogen recovery, ...

  3. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  4. PDF file encryption on mobile phone using super-encryption of Variably Modified Permutation Composition (VMPC) and two square cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Atika, F.

    2018-03-01

    Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.

  5. Design considerations for large woody debris placement in stream enhancement projects. North American Journal of Fisheries Management

    Science.gov (United States)

    Robert H. Hilderbrand; A. Dennis Lemly; C. Andrew Dolloff; Kelly L. Harpster

    1998-01-01

    Log length exerted a critical influence in stabilizing large woody debris (LWD) pieces added as an experimental stream restoration technique. Logs longer than the average bank-full channel width (5.5 m) were significantly less likely to be displaced than logs shorter than this width. The longest log in stable log groups was significantly longer than the longest log in...

  6. Stream systems.

    Science.gov (United States)

    Jack E. Williams; Gordon H. Reeves

    2006-01-01

    Restored, high-quality streams provide innumerable benefits to society. In the Pacific Northwest, high-quality stream habitat often is associated with an abundance of salmonid fishes such as chinook salmon (Oncorhynchus tshawytscha), coho salmon (O. kisutch), and steelhead (O. mykiss). Many other native...

  7. A secure transmission scheme of streaming media based on the encrypted control message

    Science.gov (United States)

    Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li

    2007-09-01

    As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.

  8. Stream Evaluation

    Data.gov (United States)

    Kansas Data Access and Support Center — Digital representation of the map accompanying the "Kansas stream and river fishery resource evaluation" (R.E. Moss and K. Brunson, 1981.U.S. Fish and Wildlife...

  9. Study on shielding design method of radiation streaming in a tokamak-type DT fusion reactor based on Monte Carlo calculation

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2003-09-01

    In tokamak-type DT nuclear fusion reactor, there are various type slits and ducts in the blanket and the vacuum vessel. The helium production in the rewelding location of the blanket and the vacuum vessel, the nuclear properties in the super-conductive TF coil, e.g. the nuclear heating rate in the coil winding pack, are enhanced by the radiation streaming through the slits and ducts, and they are critical concern in the shielding design. The decay gamma ray dose rate around the duct penetrating the blanket and the vacuum vessel is also enhanced by the radiation streaming through the duct, and they are also critical concern from the view point of the human access to the cryostat during maintenance. In order to evaluate these nuclear properties with good accuracy, three dimensional Monte Carlo calculation is required but requires long calculation time. Therefore, the development of the effective simple design evaluation method for radiation streaming is substantially important. This study aims to establish the systematic evaluation method for the nuclear properties of the blanket, the vacuum vessel and the Toroidal Field (TF) coil taking into account the radiation streaming through various types of slits and ducts, based on three dimensional Monte Carlo calculation using the MNCP code, and for the decay gamma ray dose rates penetrated around the ducts. The present thesis describes three topics in five chapters as follows; 1) In Chapter 2, the results calculated by the Monte Carlo code, MCNP, are compared with those by the Sn code, DOT3.5, for the radiation streaming in the tokamak-type nuclear fusion reactor, for validating the results of the Sn calculation. From this comparison, the uncertainties of the Sn calculation results coming from the ray-effect and the effect due to approximation of the geometry are investigated whether the two dimensional Sn calculation can be applied instead of the Monte Carlo calculation. Through the study, it can be concluded that the

  10. Investigation on prediction capability of nuclear design parameters for gap configuration in ITER through analysis of the FNS gap streaming experiment

    International Nuclear Information System (INIS)

    Maekawa, Fujio; Konno, Chikara; Kasugai, Yoshimi; Oyama, Yukio; Uno, Yoshitomo; Maekawa, Hiroshi; Ikeda, Yujiro

    2000-01-01

    As an R and D Task of shielding neutronics experiment under the Engineering Design Activities of the International Thermonuclear Experimental Reactor (ITER), streaming experiments with simulating a gap configuration formed by two neighboring blanket modules of ITER were carried out at the FNS (Fusion Neutron Source) facility. In this work, prediction capability of various nuclear design parameters was investigated through analysis of the experiments. The Monte Carlo transport calculation code MCNP-4A and the FENDL/E-1.0 and JENDL Fusion File cross section data libraries were used for the analysis with detailed modeling of the experimental conditions. As a result, all the measured quantities were reproduced within about ±30% by the calculations. It was concluded that these calculation tools were capable of predicting nuclear design parameters, such as helium production rates at connection legs of blanket modules to the back plate and nuclear responses in toroidal field coils, with uncertainty of ±30% for the geometry where gap-streaming effect was significant. (author)

  11. Design and development of a highly sensitive, field portable plasma source instrument for on-line liquid stream monitoring and real-time sample analysis

    International Nuclear Information System (INIS)

    Duan, Yixiang; Su, Yongxuan; Jin, Zhe; Abeln, Stephen P.

    2000-01-01

    The development of a highly sensitive, field portable, low-powered instrument for on-site, real-time liquid waste stream monitoring is described in this article. A series of factors such as system sensitivity and portability, plasma source, sample introduction, desolvation system, power supply, and the instrument configuration, were carefully considered in the design of the portable instrument. A newly designed, miniature, modified microwave plasma source was selected as the emission source for spectroscopy measurement, and an integrated small spectrometer with a charge-coupled device detector was installed for signal processing and detection. An innovative beam collection system with optical fibers was designed and used for emission signal collection. Microwave plasma can be sustained with various gases at relatively low power, and it possesses high detection capabilities for both metal and nonmetal pollutants, making it desirable to use for on-site, real-time, liquid waste stream monitoring. An effective in situ sampling system was coupled with a high efficiency desolvation device for direct-sampling liquid samples into the plasma. A portable computer control system is used for data processing. The new, integrated instrument can be easily used for on-site, real-time monitoring in the field. The system possesses a series of advantages, including high sensitivity for metal and nonmetal elements; in situ sampling; compact structure; low cost; and ease of operation and handling. These advantages will significantly overcome the limitations of previous monitoring techniques and make great contributions to environmental restoration and monitoring. (c)

  12. Determination of arsenic in petroleum refinery streams by electrothermal atomic absorption spectrometry after multivariate optimization based on Doehlert design

    Science.gov (United States)

    Cassella, Ricardo J.; de Sant'Ana, Otoniel D.; Santelli, Ricardo E.

    2002-12-01

    This paper reports the development of a methodology for the determination of arsenic in petroleum refinery aqueous streams containing large amounts of unknown volatile organic compounds, employing electrothermal atomic absorption spectrometry with polarized Zeeman-effect background correction. In order to make the procedure applicable, the influence of chemical modification and the drying step was examined. Also, pyrolysis and atomization temperatures and the amount of nitric acid added to the sample were optimized using a multivariate approach based on Doehlert matrix. Obtained results indicate that, in this kind of sample, arsenic must be determined by standard addition procedure with a careful control of the drying step temperature and ramp pattern. In order to evaluate the accuracy of the procedure, a test was performed in six spiked samples of petroleum refinery aqueous streams and the relative errors verified in the analysis of such samples (added As between 12.5 and 190 μg l -1) ranged from -7.2 to +16.7%. The detection limit and the relative standard deviation were also calculated and the values are 68 pg and 7.5% (at 12.5 μg l -1 level), respectively.

  13. Determination of arsenic in petroleum refinery streams by electrothermal atomic absorption spectrometry after multivariate optimization based on Doehlert design

    International Nuclear Information System (INIS)

    Cassella, Ricardo J.; Sant'Ana, Otoniel D. de; Santelli, Ricardo E.

    2002-01-01

    This paper reports the development of a methodology for the determination of arsenic in petroleum refinery aqueous streams containing large amounts of unknown volatile organic compounds, employing electrothermal atomic absorption spectrometry with polarized Zeeman-effect background correction. In order to make the procedure applicable, the influence of chemical modification and the drying step was examined. Also, pyrolysis and atomization temperatures and the amount of nitric acid added to the sample were optimized using a multivariate approach based on Doehlert matrix. Obtained results indicate that, in this kind of sample, arsenic must be determined by standard addition procedure with a careful control of the drying step temperature and ramp pattern. In order to evaluate the accuracy of the procedure, a test was performed in six spiked samples of petroleum refinery aqueous streams and the relative errors verified in the analysis of such samples (added As between 12.5 and 190 μg l -1 ) ranged from -7.2 to +16.7%. The detection limit and the relative standard deviation were also calculated and the values are 68 pg and 7.5% (at 12.5 μg l -1 level), respectively

  14. A survey on Big Data Stream Mining

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... huge amount of stream like telecommunication systems. So, there ... streams have many challenges for data mining algorithm design like using of ..... A. Bifet and R. Gavalda, "Learning from Time-Changing Data with. Adaptive ...

  15. Morphology of a Wetland Stream

    Science.gov (United States)

    Jurmu; Andrle

    1997-11-01

    / Little attention has been paid to wetland stream morphology in the geomorphological and environmental literature, and in the recently expanding wetland reconstruction field, stream design has been based primarily on stream morphologies typical of nonwetland alluvial environments. Field investigation of a wetland reach of Roaring Brook, Stafford, Connecticut, USA, revealed several significant differences between the morphology of this stream and the typical morphology of nonwetland alluvial streams. Six morphological features of the study reach were examined: bankfull flow, meanders, pools and riffles, thalweg location, straight reaches, and cross-sectional shape. It was found that bankfull flow definitions originating from streams in nonwetland environments did not apply. Unusual features observed in the wetland reach include tight bends and a large axial wavelength to width ratio. A lengthy straight reach exists that exceeds what is typically found in nonwetland alluvial streams. The lack of convex bank point bars in the bends, a greater channel width at riffle locations, an unusual thalweg location, and small form ratios (a deep and narrow channel) were also differences identified. Further study is needed on wetland streams of various regions to determine if differences in morphology between alluvial and wetland environments can be applied in order to improve future designs of wetland channels.KEY WORDS: Stream morphology; Wetland restoration; Wetland creation; Bankfull; Pools and riffles; Meanders; Thalweg

  16. Lean production design using value stream mapping and ergonomics approach for waste elimination on buffing panel upright process

    Science.gov (United States)

    Suryoputro, M. R.; Sari, A. D.; Burhanudin, R.; Sugarindra, M.

    2017-12-01

    This study discussed the implementation of ergonomics and value stream mapping issues to reduce the existing waste in the process of buffing upright panel in the XYZ music manufacturing company. Aimed to identify the 9 waste based on the identification in terms of production processes and ergonomic factors, namely environmental health and safety, defects, overproduction, waiting, not utilizing employee knowledge skill and ability, transportation, inventory, motion, and excess process. In addition, ergonomics factors were identified, for example posture using REBA, job safety analysis, and physical workload. This study results indicated that the process is having 21.4% of the potential dangers that could not be accepted and thus potentially lead to lost time. Continued with the physical workload, the score of % cardiovascular load value is still below 30%, which means that the physical workload is normal and allows the addition of work. Meanwhile, in the calculation of posture investigation, the REBA resulted that there was a motion waste identified on the edge buff machine and ryoto with the score of 10 and 8. In conclusion, the results shown that there were 20 overall waste produced, then thus waste were reduced based on the identification and discussion of proposed improvements.

  17. Monitoring of Plutonium Contaminated Solid Waste Streams. A technical guide to design and analysis of monitoring systems

    International Nuclear Information System (INIS)

    Birkhoff, G.

    1985-06-01

    The basic information on the Pu content in Pu Contaminated Materials (PCM) is the measurement of radiation emitted by Pu isotopes either spontaneously or due to irradiation by external neutron or gamma-sources. Requirements on measurement accuracy and detection limits should be defined by the operator of a Pu-handling facility in accordance with monitoring objectives in the very beginning of the planning of a monitoring system. Monitoring objectives reflect nuclear safety and radiological protection regulations and the needs for Pu-accountancy of nuclear materials management and safeguards. On considering the possibilities and limitations of radiometric techniques a solution of the monitoring problem is based on appropriate segregation and packaging procedures and records upon matrix and isotopic composition of PCM-items to be measured. The general interrelations between waste item characteristics and measurement uncertainty and detection limit are outlined in the first chapter which is addressed to the system planner. Chapter 2 is devoted to the attention of instrument developers and analysts. It presents in a general approach the correlations between the observed radiation leakage rate, respectively detection signal, and the generating source, e.g. Pu-isotopic content of the examined PCM item. Some practical measurement methods are reviewed and their limitations are indicated. The possible radiometric techniques based on detection of gamma rays from alpha decay (and 241 Am), neutrons from spontaneous fission and (α,n)-reaction and from induced fission reactions by neutron irradiation of Pu isotopes are presented. The measurement uncertainty of a single PCM item measurement is estimated on the basis of the uncertainty of the spatial distributions of source (Pu) and matrix materials. For the estimation of the cumulative error over a large collection of PCM items from a defined PCM-stream a probabilistic approach is suggested

  18. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  19. An algorithm for the construction of substitution box for block ciphers based on projective general linear group

    Directory of Open Access Journals (Sweden)

    Anas Altaleb

    2017-03-01

    Full Text Available The aim of this work is to synthesize 8*8 substitution boxes (S-boxes for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28 on Galois field GF(28. In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The strength of the extended S-box is computed, and an insight is given to calculate the confusion-creating potency. To analyze the security of the S-box some popular algebraic and statistical attacks are performed as well. The proposed S-box has been analyzed by bit independent criterion, linear approximation probability test, non-linearity test, strict avalanche criterion, differential approximation probability test, and majority logic criterion. A comparison of the proposed S-box with existing S-boxes shows that the analyses of the extended S-box are comparatively better.

  20. A Preliminary Study for Safety Shutter design to Protect Streaming of Residual Radiation Passing through Beamline in Pre-Separator Room of ISOL

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Woo; Kim, Do Hyun; Kim, Song Hyun; Shin, Chang Ho; Nam, Shin Woo [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    RAON is a heavy ion accelerator under construction by the Institute for Basic Science (IBS) in Korea. As one part of the RAON accelerator, ISOL is a facility to generate and separate rare isotopes for various experiments. In ISOL facility, isotopes generated from the reaction between 70 MeV proton beam and UC{sub 2} target are transferred to pre-separator room. Almost all isotopes accumulated in slit of pre-separator except specific isobars, which are set for experiments. Residual radiations are generated from accumulated isotopes because these isotopes are unstable. Streaming of residual radiation by the beamline is weak point for radiation shielding design. In this study, safety shutter was designed. Residual radiation generated from accumulated isotopes at slit of pre-separator was estimated using following conditions: (1) the isotopes generated by proton-target reactions are accumulated at slit with 10 % accumulation rate; (2) it was assumed that the radioactive isotopes are uniformly distributed in the cylindrical slit which have 1 cm height and 15 diameter. To design optimized safety shutter, following steps were performed: (1) thickness and diameter of the bulk shield material were evaluated to optimize safety shutter material; (2) additional shielding structure was proposed using dose contribution of each additional shielding wall.

  1. Design of preventive maintenance system using the reliability engineering and maintenance value stream mapping methods in PT. XYZ

    Science.gov (United States)

    Sembiring, N.; Panjaitan, N.; Angelita, S.

    2018-02-01

    PT. XYZ is a company owned by non-governmental organizations engaged in the field of production of rubber processing becoming crumb rubber. Part of the production is supported by some of machines and interacting equipment to achieve optimal productivity. Types of the machine that are used in the production process are Conveyor Breaker, Breaker, Rolling Pin, Hammer Mill, Mill Roll, Conveyor, Shredder Crumb, and Dryer. Maintenance system in PT. XYZ is corrective maintenance i.e. repairing or replacing the engine components after the crash on the machine. Replacement of engine components on corrective maintenance causes the machine to stop operating during the production process is in progress. The result is in the loss of production time due to the operator must replace the damaged engine components. The loss of production time can impact on the production targets which were not reached and lead to high loss costs. The cost for all components is Rp. 4.088.514.505. This cost is really high just for maintaining a Mill Roll Machine. Therefore PT. XYZ is needed to do preventive maintenance i.e. scheduling engine components and improving maintenance efficiency. The used methods are Reliability Engineering and Maintenance Value Stream Mapping (MVSM). The needed data in this research are the interval of time damage to engine components, opportunity cost, labor cost, component cost, corrective repair time, preventive repair time, Mean Time To Opportunity (MTTO), Mean Time To Repair (MTTR), and Mean Time To Yield (MTTY). In this research, the critical components of Mill Roll machine are Spier, Bushing, Bearing, Coupling and Roll. Determination of damage distribution, reliability, MTTF, cost of failure, cost of preventive, current state map, and future state map are done so that the replacement time for each critical component with the lowest maintenance cost and preparation of Standard Operation Procedure (SOP) are developed. For the critical component that has been

  2. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

    DEFF Research Database (Denmark)

    Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.

    2012-01-01

    to be iterative with very similar round functions disappears, an observation that increases the design space for the algorithm. An important further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE is designed in such a way that the overhead for decryption on top...

  3. Knowledge discovery from data streams

    CERN Document Server

    Gama, Joao

    2010-01-01

    Since the beginning of the Internet age and the increased use of ubiquitous computing devices, the large volume and continuous flow of distributed data have imposed new constraints on the design of learning algorithms. Exploring how to extract knowledge structures from evolving and time-changing data, Knowledge Discovery from Data Streams presents a coherent overview of state-of-the-art research in learning from data streams.The book covers the fundamentals that are imperative to understanding data streams and describes important applications, such as TCP/IP traffic, GPS data, sensor networks,

  4. Global Positioning System (GPS) and Geographic Information System (GIS) analysis of mobile harvesting equipment and sediment delivery to streams during forest harvest operations on steep terrain: Experimental design

    Science.gov (United States)

    Daniel Bowker; Jeff Stringer; Chris Barton; Songlin Fei

    2011-01-01

    Sediment mobilized by forest harvest machine traffic contributes substantially to the degradation of headwater stream systems. This study monitored forest harvest machine traffic to analyze how it affects sediment delivery to stream channels. Harvest machines were outfitted with global positioning system (GPS) dataloggers, recording machine movements and working status...

  5. The development of a system to assess the ecological quality of streams based on macroinvertebrates - design of the sampling programme within the AQEM project

    NARCIS (Netherlands)

    Hering, D.; Buffagni, A.; Moog, O.; Sandin, L.; Sommerhäuser, M.; Strubauer, I.; Feld, C.; Johnson, R.; Pinto, P.; Skoulikidis, N.; Verdonschot, P.F.M.; Zahrádková, S.

    2003-01-01

    The EU Water Framework Directive (WFD) requires river assessment systems based on benthic invertebrates. The AQEM project is developing, at a European scale, such a methodology, based on a comparison of communities of reference streams and degraded streams. The project is focussing on three main

  6. InSTREAM: the individual-based stream trout research and environmental assessment model

    Science.gov (United States)

    Steven F. Railsback; Bret C. Harvey; Stephen K. Jackson; Roland H. Lamberson

    2009-01-01

    This report documents Version 4.2 of InSTREAM, including its formulation, software, and application to research and management problems. InSTREAM is a simulation model designed to understand how stream and river salmonid populations respond to habitat alteration, including altered flow, temperature, and turbidity regimes and changes in channel morphology. The model...

  7. The Northeast Stream Quality Assessment

    Science.gov (United States)

    Van Metre, Peter C.; Riva-Murray, Karen; Coles, James F.

    2016-04-22

    In 2016, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) is assessing stream quality in the northeastern United States. The goal of the Northeast Stream Quality Assessment (NESQA) is to assess the quality of streams in the region by characterizing multiple water-quality factors that are stressors to aquatic life and evaluating the relation between these stressors and biological communities. The focus of NESQA in 2016 will be on the effects of urbanization and agriculture on stream quality in all or parts of eight states: Connecticut, Massachusetts, New Hampshire, New Jersey, New York, Pennsylvania, Rhode Island, and Vermont.Findings will provide the public and policymakers with information about the most critical factors affecting stream quality, thus providing insights about possible approaches to protect the health of streams in the region. The NESQA study will be the fourth regional study conducted as part of NAWQA and will be of similar design and scope to the first three, in the Midwest in 2013, the Southeast in 2014, and the Pacific Northwest in 2015 (http://txpub.usgs.gov/RSQA/).

  8. About the theory of congested transport streams

    OpenAIRE

    Valeriy GUK

    2009-01-01

    Talked about a theory, based on integrity of continuous motion of a transport stream. Placing of car and its speed is in a stream - second. Principle of application of the generalized methods of design and new descriptions of the states of transport streams opens up. Travelling and transport potentials are set, and also external capacity of the system a «transport stream» is an exergy, that allows to make differential equation and decide the applied tasks of organization of travelling motion....

  9. Ciphering the self?

    DEFF Research Database (Denmark)

    Jensen, Lasse Meinert

    When a person tracks her mood with a smartphone app, is s/he then gathering data about a mental process, engaging in self-cultivation, or managing her conduct with technologies of self-government? This presentation will discuss how self-monitoring afford persons different ways of relating to and ...... of variability, identity, and continuity that haunts both psychology, and discourses about subjectivity in the social and human sciences....

  10. Conceptual process design and economic analysis of a process based on liquid-liquid extraction for the recovery of glycols from aqueous streams

    NARCIS (Netherlands)

    Garcia Chavez, L.Y.; Schuur, Boelo; de Haan, A.B.

    2013-01-01

    The recovery of monoethylene glycol (MEG) and 1,2-propylene glycol (PG) from aqueous streams via liquid–liquid extraction (LLE) using a tailor-made ionic liquid [TOA MNaph] is evaluated as an alternative technology to conventional triple effect evaporation of water. In this paper, the conceptual

  11. ALIENS IN WESTERN STREAM ECOSYSTEMS

    Science.gov (United States)

    The USEPA's Environmental Monitoring and Assessment Program conducted a five year probability sample of permanent mapped streams in 12 western US states. The study design enables us to determine the extent of selected riparian invasive plants, alien aquatic vertebrates, and some ...

  12. StreamCat

    Data.gov (United States)

    U.S. Environmental Protection Agency — The StreamCat Dataset provides summaries of natural and anthropogenic landscape features for ~2.65 million streams, and their associated catchments, within the...

  13. Prioritized Contact Transport Stream

    Science.gov (United States)

    Hunt, Walter Lee, Jr. (Inventor)

    2015-01-01

    A detection process, contact recognition process, classification process, and identification process are applied to raw sensor data to produce an identified contact record set containing one or more identified contact records. A prioritization process is applied to the identified contact record set to assign a contact priority to each contact record in the identified contact record set. Data are removed from the contact records in the identified contact record set based on the contact priorities assigned to those contact records. A first contact stream is produced from the resulting contact records. The first contact stream is streamed in a contact transport stream. The contact transport stream may include and stream additional contact streams. The contact transport stream may be varied dynamically over time based on parameters such as available bandwidth, contact priority, presence/absence of contacts, system state, and configuration parameters.

  14. Productivity of Stream Definitions

    NARCIS (Netherlands)

    Endrullis, Jörg; Grabmayer, Clemens; Hendriks, Dimitri; Isihara, Ariya; Klop, Jan

    2007-01-01

    We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called ‘productive’ if it can be evaluated continuously in such a way that a uniquely determined stream is obtained as the limit. Whereas productivity is undecidable

  15. Productivity of stream definitions

    NARCIS (Netherlands)

    Endrullis, J.; Grabmayer, C.A.; Hendriks, D.; Isihara, A.; Klop, J.W.

    2008-01-01

    We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called ‘productive’ if it can be evaluated continually in such a way that a uniquely determined stream in constructor normal form is obtained as the limit. Whereas

  16. StreamMap: Smooth Dynamic Visualization of High-Density Streaming Points.

    Science.gov (United States)

    Li, Chenhui; Baciu, George; Han, Yu

    2018-03-01

    Interactive visualization of streaming points for real-time scatterplots and linear blending of correlation patterns is increasingly becoming the dominant mode of visual analytics for both big data and streaming data from active sensors and broadcasting media. To better visualize and interact with inter-stream patterns, it is generally necessary to smooth out gaps or distortions in the streaming data. Previous approaches either animate the points directly or present a sampled static heat-map. We propose a new approach, called StreamMap, to smoothly blend high-density streaming points and create a visual flow that emphasizes the density pattern distributions. In essence, we present three new contributions for the visualization of high-density streaming points. The first contribution is a density-based method called super kernel density estimation that aggregates streaming points using an adaptive kernel to solve the overlapping problem. The second contribution is a robust density morphing algorithm that generates several smooth intermediate frames for a given pair of frames. The third contribution is a trend representation design that can help convey the flow directions of the streaming points. The experimental results on three datasets demonstrate the effectiveness of StreamMap when dynamic visualization and visual analysis of trend patterns on streaming points are required.

  17. A morphological comparison of narrow, low-gradient streams traversing wetland environments to alluvial streams.

    Science.gov (United States)

    Jurmu, Michael C

    2002-12-01

    Twelve morphological features from research on alluvial streams are compared in four narrow, low-gradient wetland streams located in different geographic regions (Connecticut, Indiana, and Wisconsin, USA). All four reaches differed in morphological characteristics in five of the features compared (consistent bend width, bend cross-sectional shape, riffle width compared to pool width, greatest width directly downstream of riffles, and thalweg location), while three reaches differed in two comparisons (mean radius of curvature to width ratio and axial wavelength to width ratio). The remaining five features compared had at least one reach where different characteristics existed. This indicates the possibility of varying morphology for streams traversing wetland areas further supporting the concept that the unique qualities of wetland environments might also influence the controls on fluvial dynamics and the development of streams. If certain morphological features found in streams traversing wetland areas differ from current fluvial principles, then these varying features should be incorporated into future wetland stream design and creation projects. The results warrant further research on other streams traversing wetlands to determine if streams in these environments contain unique morphology and further investigation of the impact of low-energy fluvial processes on morphological development. Possible explanations for the morphology deviations in the study streams and some suggestions for stream design in wetland areas based upon the results and field observations are also presented.

  18. Exploiting the Power of Relational Databases for Efficient Stream Processing

    NARCIS (Netherlands)

    E. Liarou (Erietta); R.A. Goncalves (Romulo); S. Idreos (Stratos)

    2009-01-01

    textabstractStream applications gained significant popularity over the last years that lead to the development of specialized stream engines. These systems are designed from scratch with a different philosophy than nowadays database engines in order to cope with the stream applications

  19. Benthic invertebrate fauna, small streams

    Science.gov (United States)

    J. Bruce Wallace; S.L. Eggert

    2009-01-01

    Small streams (first- through third-order streams) make up >98% of the total number of stream segments and >86% of stream length in many drainage networks. Small streams occur over a wide array of climates, geology, and biomes, which influence temperature, hydrologic regimes, water chemistry, light, substrate, stream permanence, a basin's terrestrial plant...

  20. Checking for Circular Dependencies in Distributed Stream Programs

    Science.gov (United States)

    2011-08-29

    extensions to express new complexities more conve- nient. Teleport messaging ( TMG ) in the StreamIt language [30] is an example. 1.1 StreamIt Language...dynamicities to an FIR computation Thies et al. in [30] give a TMG model for distributed stream pro- grams. TMG is a mechanism that implements control...messages for stream graphs. The TMG mechanism is designed not to interfere with original dataflow graphs’ structures and scheduling, therefore a key

  1. Effect of thiram and of a hydrocarbon mixture on freshwater macroinvertebrate communities in outdoor stream and pond mesocosms: I. Study design, chemicals fate and structural responses.

    Science.gov (United States)

    Bayona, Yannick; Roucaute, Marc; Cailleaud, Kevin; Lagadic, Laurent; Bassères, Anne; Caquet, Thierry

    2015-11-01

    Higher-tier ecological risk assessment (ERA) in mesocosms is commonly performed in lotic or lentic experimental systems. These systems differ in their physico-chemical and hydrological properties, leading to differences in chemical fate, community characteristics and potential recovery. This raises the issue of the relevance and sensitivity of community-level endpoints in different types of mesocosms. In this study, macroinvertebrate abundance and biomass estimates were used to assess the effects of a dithiocarbamate fungicide, thiram (35 and 170 µg l(-1)), and a petroleum middle distillate (PMD; 0.01, 0.4, 2 and 20 mg l(-1)) in outdoor stream and pond mesocosms. Streams were continuously treated during 3 weeks followed by a 2-month long post-treatment period. Ponds were treated weekly for 4 weeks, followed by a 10-month long post-treatment period. Taxonomic structure of macroinvertebrate communities was characterized using the α, β and γ components of taxa richness, Shannon and Gini-Simpson indices. Computations were based either on abundance or biomass data. Results clearly highlighted that the effects of chemicals depended on the exposure regime (for thiram) and type of system (for the PMD). Causes of the differences between streams and ponds in the magnitude and nature of effects include differential sensitivity of taxa dwelling in lentic and lotic systems and the influence of hydrology (e.g., drift from upstream) and mesocosm connectivity on recovery dynamics. This study also showed complementarities in the use of both types of mesocosms to improve the characterization of chemical effects on communities in ERA.

  2. ThermoData Engine (TDE): Software Implementation of the Dynamic Data Evaluation Concept. 8. Properties of Material Streams and Solvent Design

    DEFF Research Database (Denmark)

    Diky, Vladimir; Chirico, Robert D.; Muzny, Chris D.

    2013-01-01

    ThermoData Engine (TDE) is the first full-scale software implementation of the dynamic data evaluation concept, as reported in this journal. The present paper describes the first application of this concept to the evaluation of thermophysical properties for material streams involving any number...... of chemical components with assessment of uncertainties. The method involves construction of Redlich-Kister type equations for individual properties (excess volume, thermal conductivity, viscosity, surface tension, and excess enthalpy) and activity-coefficient models for phase equilibrium properties (vapor...

  3. Solar wind stream interfaces

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1978-01-01

    Measurements aboard Imp 6, 7, and 8 reveal that approximately one third of all high-speed solar wind streams observed at 1 AU contain a sharp boundary (of thickness less than approx.4 x 10 4 km) near their leading edge, called a stream interface, which separates plasma of distinctly different properties and origins. Identified as discontinuities across which the density drops abruptly, the proton temperature increases abruptly, and the speed rises, stream interfaces are remarkably similar in character from one stream to the next. A superposed epoch analysis of plasma data has been performed for 23 discontinuous stream interfaces observed during the interval March 1971 through August 1974. Among the results of this analysis are the following: (1) a stream interface separates what was originally thick (i.e., dense) slow gas from what was originally thin (i.e., rare) fast gas; (2) the interface is the site of a discontinuous shear in the solar wind flow in a frame of reference corotating with the sun; (3) stream interfaces occur at speeds less than 450 km s - 1 and close to or at the maximum of the pressure ridge at the leading edges of high-speed streams; (4) a discontinuous rise by approx.40% in electron temperature occurs at the interface; and (5) discontinuous changes (usually rises) in alpha particle abundance and flow speed relative to the protons occur at the interface. Stream interfaces do not generally recur on successive solar rotations, even though the streams in which they are embedded often do. At distances beyond several astronomical units, stream interfaces should be bounded by forward-reverse shock pairs; three of four reverse shocks observed at 1 AU during 1971--1974 were preceded within approx.1 day by stream interfaces. Our observations suggest that many streams close to the sun are bounded on all sides by large radial velocity shears separating rapidly expanding plasma from more slowly expanding plasma

  4. A New Application of Stochastic Transformation

    OpenAIRE

    Nilar Win Kyaw

    2009-01-01

    In cryptography, confusion and diffusion are very important to get confidentiality and privacy of message in block ciphers and stream ciphers. There are two types of network to provide confusion and diffusion properties of message in block ciphers. They are Substitution- Permutation network (S-P network), and Feistel network. NLFS (Non-Linear feedback stream cipher) is a fast and secure stream cipher for software application. NLFS have two modes basic mode that is synchro...

  5. Inventory of miscellaneous streams

    International Nuclear Information System (INIS)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column

  6. Hydrography - Streams and Shorelines

    Data.gov (United States)

    California Natural Resource Agency — The hydrography layer consists of flowing waters (rivers and streams), standing waters (lakes and ponds), and wetlands -- both natural and manmade. Two separate...

  7. Factoring stream turbulence into global assessments of nitrogen pollution.

    Science.gov (United States)

    Grant, Stanley B; Azizian, Morvarid; Cook, Perran; Boano, Fulvio; Rippy, Megan A

    2018-03-16

    The discharge of excess nitrogen to streams and rivers poses an existential threat to both humans and ecosystems. A seminal study of headwater streams across the United States concluded that in-stream removal of nitrate is controlled primarily by stream chemistry and biology. Reanalysis of these data reveals that stream turbulence (in particular, turbulent mass transfer across the concentration boundary layer) imposes a previously unrecognized upper limit on the rate at which nitrate is removed from streams. The upper limit closely approximates measured nitrate removal rates in streams with low concentrations of this pollutant, a discovery that should inform stream restoration designs and efforts to assess the effects of nitrogen pollution on receiving water quality and the global nitrogen cycle. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  8. Endocrine active chemicals, pharmaceuticals, and other chemicals of concern in surface water, wastewater-treatment plant effluent, and bed sediment, and biological characteristics in selected streams, Minnesota-design, methods, and data, 2009

    Science.gov (United States)

    Lee, Kathy E.; Langer, Susan K.; Barber, Larry B.; Writer, Jeff H.; Ferrey, Mark L.; Schoenfuss, Heiko L.; Furlong, Edward T.; Foreman, William T.; Gray, James L.; ReVello, Rhiannon C.; Martinovic, Dalma; Woodruff, Olivia R.; Keefe, Steffanie H.; Brown, Greg K.; Taylor, Howard E.; Ferrer, Imma; Thurman, E. Michael

    2011-01-01

    This report presents the study design, environmental data, and quality-assurance data for an integrated chemical and biological study of selected streams or lakes that receive wastewater-treatment plant effluent in Minnesota. This study was a cooperative effort of the U.S. Geological Survey, the Minnesota Pollution Control Agency, St. Cloud State University, the University of St. Thomas, and the University of Colorado. The objective of the study was to identify distribution patterns of endocrine active chemicals, pharmaceuticals, and other organic and inorganic chemicals of concern indicative of wastewater effluent, and to identify biological characteristics of estrogenicity and fish responses in the same streams. The U.S. Geological Survey collected and analyzed water, bed-sediment, and quality-assurance samples, and measured or recorded streamflow once at each sampling location from September through November 2009. Sampling locations included surface water and wastewater-treatment plant effluent. Twenty-five wastewater-treatment plants were selected to include continuous flow and periodic release facilities with differing processing steps (activated sludge or trickling filters) and plant design flows ranging from 0.002 to 10.9 cubic meters per second (0.04 to 251 million gallons per day) throughout Minnesota in varying land-use settings. Water samples were collected from the treated effluent of the 25 wastewater-treatment plants and at one point upstream from and one point downstream from wastewater-treatment plant effluent discharges. Bed-sediment samples also were collected at each of the stream or lake locations. Water samples were analyzed for major ions, nutrients, trace elements, pharmaceuticals, phytoestrogens and pharmaceuticals, alkylphenols and other neutral organic chemicals, carboxylic acids, and steroidal hormones. A subset (25 samples) of the bed-sediment samples were analyzed for carbon, wastewater-indicator chemicals, and steroidal hormones; the

  9. Web Audio/Video Streaming Tool

    Science.gov (United States)

    Guruvadoo, Eranna K.

    2003-01-01

    In order to promote NASA-wide educational outreach program to educate and inform the public of space exploration, NASA, at Kennedy Space Center, is seeking efficient ways to add more contents to the web by streaming audio/video files. This project proposes a high level overview of a framework for the creation, management, and scheduling of audio/video assets over the web. To support short-term goals, the prototype of a web-based tool is designed and demonstrated to automate the process of streaming audio/video files. The tool provides web-enabled users interfaces to manage video assets, create publishable schedules of video assets for streaming, and schedule the streaming events. These operations are performed on user-defined and system-derived metadata of audio/video assets stored in a relational database while the assets reside on separate repository. The prototype tool is designed using ColdFusion 5.0.

  10. Hydraulic Properties related to Stream Reaeration

    Energy Technology Data Exchange (ETDEWEB)

    Tsivoglou, E. C.; Wallace, J. R. [School of Civil Engineering, Georgia Institute of Technology, Atlanta, GA (United States)

    1970-09-15

    The paper reports the results of recent and current field tracer experiments designed to investigate the relationships between the reaeration capacity of a flowing stream and the stream's hydraulic properties. The purpose of the studies is to develop models for the accurate prediction of stream reaeration capacity on the basis of observation of the associated hydraulic properties. The ability of a flowing stream to absorb oxygen from the overlying atmosphere is the principal process by which the stream is able to recover its dissolved oxygen resources once they have been depleted by bacterial degradation of organic wastes. Accurate knowledge of stream reaeration capacity is therefore a necessity in determining the required degree of waste treatment, and the associated costs, in any specific case. Oxygen absorption can only occur at the air-water interface, hence reaeration is a direct function of the rate of surface water replacement due to turbulent mixing. The latter is not directly observable, and so reaeration capacity has not been observable before the quite recent development of a gaseous radiotracer technique for field measurement of reaeration. This procedure involves the simultaneous use of three tracers, namely a fluorescent dye for time of flow, tritiated water for accurate dispersion measurement, and dissolved krypton-85 for measurement of gas transfer. Field results obtained by this technique are highly reproducible. Field tracer studies of the reaeration capacities of three medium-sized streams have been conducted over a total of about fifty river miles. Associated hydraulic properties such as stream flow, cross-sectional area, depth, velocity, hydraulic gradient and dispersion have also been measured. Features such as waterfalls, rapids and pools are included, and more than eighty observations of the reaeration capacities of individual stream reaches have been made. The paper reports the observed relationships between stream reaeration capacity and

  11. Hydraulic properties related to stream reaeration

    Energy Technology Data Exchange (ETDEWEB)

    Tsivoglou, E C; Wallace, J R [School of Civil Engineering, Georgia Institute of Technology, Atlanta, GA (United States)

    1970-09-15

    The paper reports the results of recent and current field tracer experiments designed to investigate the relationships between the reaeration capacity of a flowing stream and the stream's hydraulic properties. The purpose of the studies is to develop models for the accurate prediction of stream reaeration capacity on the basis of observation of the associated hydraulic properties. The ability of a flowing stream to absorb oxygen from the overlying atmosphere is the principal process by which the stream is able to recover its dissolved oxygen resources once they have been depleted by bacterial degradation of organic wastes. Accurate knowledge of stream reaeration capacity is therefore a necessity in determining the required degree of waste treatment, and the associated costs, in any specific case. Oxygen absorption can only occur at the air-water interface, hence reaeration is a direct function of the rate of surface water replacement due to turbulent mixing. The latter is not directly observable, and so reaeration capacity has not been observable before the quite recent development of a gaseous radiotracer technique for field measurement of reaeration. This procedure involves the simultaneous use of three tracers, namely a fluorescent dye for time of flow, tritiated water for accurate dispersion measurement, and dissolved krypton-85 for measurement of gas transfer. Field results obtained by this technique are highly reproducible. Field tracer studies of the reaeration capacities of three medium-sized streams have been conducted over a total of about fifty river miles. Associated hydraulic properties such as stream flow, cross-sectional area, depth, velocity, hydraulic gradient and dispersion have also been measured. Features such as waterfalls, rapids and pools are included, and more than eighty observations of the reaeration capacities of individual stream reaches have been made. The paper reports the observed relationships between stream reaeration capacity and

  12. Ecoregions and stream morphology in eastern Oklahoma

    Science.gov (United States)

    Splinter, D.K.; Dauwalter, D.C.; Marston, R.A.; Fisher, W.L.

    2010-01-01

    Broad-scale variables (i.e., geology, topography, climate, land use, vegetation, and soils) influence channel morphology. How and to what extent the longitudinal pattern of channel morphology is influenced by broad-scale variables is important to fluvial geomorphologists and stream ecologists. In the last couple of decades, there has been an increase in the amount of interdisciplinary research between fluvial geomorphologists and stream ecologists. In a historical context, fluvial geomorphologists are more apt to use physiographic regions to distinguish broad-scale variables, while stream ecologists are more apt to use the concept of an ecosystem to address the broad-scale variables that influence stream habitat. For this reason, we designed a study using ecoregions, which uses physical and biological variables to understand how landscapes influence channel processes. Ecoregions are delineated by similarities in geology, climate, soils, land use, and potential natural vegetation. In the fluvial system, stream form and function are dictated by processes observed throughout the fluvial hierarchy. Recognizing that stream form and function should differ by ecoregion, a study was designed to evaluate how the characteristics of stream channels differed longitudinally among three ecoregions in eastern Oklahoma, USA: Boston Mountains, Ozark Highlands, and Ouachita Mountains. Channel morphology of 149 stream reaches was surveyed in 1st- through 4th-order streams, and effects of drainage area and ecoregion on channel morphology was evaluated using multiple regressions. Differences existed (?????0.05) among ecoregions for particle size, bankfull width, and width/depth ratio. No differences existed among ecoregions for gradient or sinuosity. Particle size was smallest in the Ozark Highlands and largest in the Ouachita Mountains. Bankfull width was larger in the Ozark Highlands than in the Boston Mountains and Ouachita Mountains in larger streams. Width/depth ratios of the

  13. LHCb trigger streams optimization

    Science.gov (United States)

    Derkach, D.; Kazeev, N.; Neychev, R.; Panin, A.; Trofimov, I.; Ustyuzhanin, A.; Vesterinen, M.

    2017-10-01

    The LHCb experiment stores around 1011 collision events per year. A typical physics analysis deals with a final sample of up to 107 events. Event preselection algorithms (lines) are used for data reduction. Since the data are stored in a format that requires sequential access, the lines are grouped into several output file streams, in order to increase the efficiency of user analysis jobs that read these data. The scheme efficiency heavily depends on the stream composition. By putting similar lines together and balancing the stream sizes it is possible to reduce the overhead. We present a method for finding an optimal stream composition. The method is applied to a part of the LHCb data (Turbo stream) on the stage where it is prepared for user physics analysis. This results in an expected improvement of 15% in the speed of user analysis jobs, and will be applied on data to be recorded in 2017.

  14. CovertCast: Using Live Streaming to Evade Internet Censorship

    Directory of Open Access Journals (Sweden)

    McPherson Richard

    2016-07-01

    Full Text Available We design, implement, and evaluate CovertCast, a censorship circumvention system that broadcasts the content of popular websites in real-time, encrypted video streams on common live-streaming services such as YouTube. CovertCast does not require any modifications to the streaming service and employs the same protocols, servers, and streaming software as any other user of the service. Therefore, CovertCast cannot be distinguished from other live streams by IP address filtering or protocol fingerprinting, raising the bar for censors.

  15. Asteroid/meteorite streams

    Science.gov (United States)

    Drummond, J.

    The independent discovery of the same three streams (named alpha, beta, and gamma) among 139 Earth approaching asteroids and among 89 meteorite producing fireballs presents the possibility of matching specific meteorites to specific asteroids, or at least to asteroids in the same stream and, therefore, presumably of the same composition. Although perhaps of limited practical value, the three meteorites with known orbits are all ordinary chondrites. To identify, in general, the taxonomic type of the parent asteroid, however, would be of great scientific interest since these most abundant meteorite types cannot be unambiguously spectrally matched to an asteroid type. The H5 Pribram meteorite and asteroid 4486 (unclassified) are not part of a stream, but travel in fairly similar orbits. The LL5 Innisfree meteorite is orbitally similar to asteroid 1989DA (unclassified), and both are members of a fourth stream (delta) defined by five meteorite-dropping fireballs and this one asteroid. The H5 Lost City meteorite is orbitally similar to 1980AA (S type), which is a member of stream gamma defined by four asteroids and four fireballs. Another asteroid in this stream is classified as an S type, another is QU, and the fourth is unclassified. This stream suggests that ordinary chondrites should be associated with S (and/or Q) asteroids. Two of the known four V type asteroids belong to another stream, beta, defined by five asteroids and four meteorite-dropping (but unrecovered) fireballs, making it the most probable source of the eucrites. The final stream, alpha, defined by five asteroids and three fireballs is of unknown composition since no meteorites have been recovered and only one asteroid has an ambiguous classification of QRS. If this stream, or any other as yet undiscovered ones, were found to be composed of a more practical material (e.g., water or metalrich), then recovery of the associated meteorites would provide an opportunity for in-hand analysis of a potential

  16. Impact of stream restoration on flood waves

    Science.gov (United States)

    Sholtes, J.; Doyle, M.

    2008-12-01

    Restoration of channelized or incised streams has the potential to reduce downstream flooding via storing and dissipating the energy of flood waves. Restoration design elements such as restoring meanders, reducing slope, restoring floodplain connectivity, re-introducing in-channel woody debris, and re-vegetating banks and the floodplain have the capacity to attenuate flood waves via energy dissipation and channel and floodplain storage. Flood discharge hydrographs measured up and downstream of several restored reaches of varying stream order and located in both urban and rural catchments are coupled with direct measurements of stream roughness at various stages to directly measure changes to peak discharge, flood wave celerity, and dispersion. A one-dimensional unsteady flow routing model, HEC-RAS, is calibrated and used to compare attenuation characteristics between pre and post restoration conditions. Modeled sensitivity results indicate that a restoration project placed on a smaller order stream demonstrates the highest relative reduction in peak discharge of routed flood waves compared to one of equal length on a higher order stream. Reductions in bed slope, extensions in channel length, and increases in channel and floodplain roughness follow restoration placement with the watershed in relative importance. By better understanding how design, scale, and location of restored reaches within a catchment hydraulically impact flood flows, this study contributes both to restoration design and site decision making. It also quantifies the effect of reach scale stream restoration on flood wave attenuation.

  17. StreamStats, version 4

    Science.gov (United States)

    Ries, Kernell G.; Newson, Jeremy K.; Smith, Martyn J.; Guthrie, John D.; Steeves, Peter A.; Haluska, Tana L.; Kolb, Katharine R.; Thompson, Ryan F.; Santoro, Richard D.; Vraga, Hans W.

    2017-10-30

    IntroductionStreamStats version 4, available at https://streamstats.usgs.gov, is a map-based web application that provides an assortment of analytical tools that are useful for water-resources planning and management, and engineering purposes. Developed by the U.S. Geological Survey (USGS), the primary purpose of StreamStats is to provide estimates of streamflow statistics for user-selected ungaged sites on streams and for USGS streamgages, which are locations where streamflow data are collected.Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (which is exceeded, on average, once in 100 years and has a 1-percent chance of exceedance in any year) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; permitting of water withdrawals and wastewater and industrial discharges; hydropower facility design and regulation; and setting of minimum allowed streamflows to protect freshwater ecosystems. Streamflow statistics can be computed from available data at USGS streamgages depending on the type of data collected at the stations. Most often, however, streamflow statistics are needed at ungaged sites, where no streamflow data are available to determine the statistics.

  18. STREAM: A First Programming Process

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard; Kölling, Michael

    2009-01-01

    to derive a programming process, STREAM, designed specifically for novices. STREAM is a carefully down-scaled version of a full and rich agile software engineering process particularly suited for novices learning object-oriented programming. In using it we hope to achieve two things: to help novice......Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based—they may know what the individual programming language constructs are, but they do not know how to put them together....... Despite this fact, textbooks, educational practice, and programming education research hardly address the issue of teaching the skills needed for systematic development of programs. We provide a conceptual framework for incremental program development, called Stepwise Improvement, which unifies best...

  19. Percent Forest Adjacent to Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  20. Percent Agriculture Adjacent to Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  1. Wadeable Streams Assessment Data

    Science.gov (United States)

    The Wadeable Streams Assessment (WSA) is a first-ever statistically-valid survey of the biological condition of small streams throughout the U.S. The U.S. Environmental Protection Agency (EPA) worked with the states to conduct the assessment in 2004-2005. Data for each parameter sampled in the Wadeable Streams Assessment (WSA) are available for downloading in a series of files as comma separated values (*.csv). Each *.csv data file has a companion text file (*.txt) that lists a dataset label and individual descriptions for each variable. Users should view the *.txt files first to help guide their understanding and use of the data.

  2. Noise Prediction Module for Offset Stream Nozzles

    Science.gov (United States)

    Henderson, Brenda S.

    2011-01-01

    A Modern Design of Experiments (MDOE) analysis of data acquired for an offset stream technology was presented. The data acquisition and concept development were funded under a Supersonics NRA NNX07AC62A awarded to Dimitri Papamoschou at University of California, Irvine. The technology involved the introduction of airfoils in the fan stream of a bypass ratio (BPR) two nozzle system operated at transonic exhaust speeds. The vanes deflected the fan stream relative to the core stream and resulted in reduced sideline noise for polar angles in the peak jet noise direction. Noise prediction models were developed for a range of vane configurations. The models interface with an existing ANOPP module and can be used or future system level studies.

  3. Future Roads Near Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — Roads are a source of auto related pollutants (e.g. gasoline, oil and other engine fluids). When roads are near streams, rain can wash these pollutants directly into...

  4. Channelized Streams in Iowa

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — This draft dataset consists of all ditches or channelized pieces of stream that could be identified using three input datasets; namely the1:24,000 National...

  5. Stochastic ice stream dynamics.

    Science.gov (United States)

    Mantelli, Elisa; Bertagni, Matteo Bernard; Ridolfi, Luca

    2016-08-09

    Ice streams are narrow corridors of fast-flowing ice that constitute the arterial drainage network of ice sheets. Therefore, changes in ice stream flow are key to understanding paleoclimate, sea level changes, and rapid disintegration of ice sheets during deglaciation. The dynamics of ice flow are tightly coupled to the climate system through atmospheric temperature and snow recharge, which are known exhibit stochastic variability. Here we focus on the interplay between stochastic climate forcing and ice stream temporal dynamics. Our work demonstrates that realistic climate fluctuations are able to (i) induce the coexistence of dynamic behaviors that would be incompatible in a purely deterministic system and (ii) drive ice stream flow away from the regime expected in a steady climate. We conclude that environmental noise appears to be crucial to interpreting the past behavior of ice sheets, as well as to predicting their future evolution.

  6. Roads Near Streams

    Data.gov (United States)

    U.S. Environmental Protection Agency — Roads are a source of auto related pollutants (e.g. gasoline, oil and other engine fluids). When roads are near streams, rain can wash these pollutants directly into...

  7. Streaming tearing mode

    Science.gov (United States)

    Shigeta, M.; Sato, T.; Dasgupta, B.

    1985-01-01

    The magnetohydrodynamic stability of streaming tearing mode is investigated numerically. A bulk plasma flow parallel to the antiparallel magnetic field lines and localized in the neutral sheet excites a streaming tearing mode more strongly than the usual tearing mode, particularly for the wavelength of the order of the neutral sheet width (or smaller), which is stable for the usual tearing mode. Interestingly, examination of the eigenfunctions of the velocity perturbation and the magnetic field perturbation indicates that the streaming tearing mode carries more energy in terms of the kinetic energy rather than the magnetic energy. This suggests that the streaming tearing mode instability can be a more feasible mechanism of plasma acceleration than the usual tearing mode instability.

  8. DNR 24K Streams

    Data.gov (United States)

    Minnesota Department of Natural Resources — 1:24,000 scale streams captured from USGS seven and one-half minute quadrangle maps, with perennial vs. intermittent classification, and connectivity through lakes,...

  9. Trout Stream Special Regulations

    Data.gov (United States)

    Minnesota Department of Natural Resources — This layer shows Minnesota trout streams that have a special regulation as described in the 2006 Minnesota Fishing Regulations. Road crossings were determined using...

  10. Scientific stream pollution analysis

    National Research Council Canada - National Science Library

    Nemerow, Nelson Leonard

    1974-01-01

    A comprehensive description of the analysis of water pollution that presents a careful balance of the biological,hydrological, chemical and mathematical concepts involved in the evaluation of stream...

  11. Collaborative Media Streaming

    OpenAIRE

    Kahmann, Verena

    2008-01-01

    Mit Hilfe der IP-Technologie erbrachte Multimedia-Dienste wie IPTV oder Video-on-Demand sind zur Zeit ein gefragtes Thema. Technisch werden solche Dienste unter dem Begriff "Streaming" eingeordnet. Ein Server sendet Mediendaten kontinuierlich an Empfänger, welche die Daten sofort weiterverarbeiten und anzeigen. Über einen Rückkanal hat der Kunde die Möglichkeit der Einflussnahme auf die Wiedergabe. Eine Weiterentwicklung dieser Streaming-Dienste ist die Möglichkeit, gemeinsam mit anderen dens...

  12. The role of remediation, natural alkalinity sources and physical stream parameters in stream recovery.

    Science.gov (United States)

    Kruse, Natalie A; DeRose, Lisa; Korenowsky, Rebekah; Bowman, Jennifer R; Lopez, Dina; Johnson, Kelly; Rankin, Edward

    2013-10-15

    Acid mine drainage (AMD) negatively impacts not only stream chemistry, but also aquatic biology. The ultimate goal of AMD treatment is restoration of the biological community, but that goal is rarely explicit in treatment system design. Hewett Fork in Raccoon Creek Watershed, Ohio, has been impacted by historic coal mining and has been treated with a calcium oxide doser in the headwaters of the watershed since 2004. All of the acidic inputs are isolated to a 1.5 km stretch of stream in the headwaters of the Hewett Fork watershed. The macroinvertebrate and fish communities have begun to recover and it is possible to distinguish three zones downstream of the doser: an impaired zone, a transition zone and a recovered zone. Alkalinity from both the doser and natural sources and physical stream parameters play a role in stream restoration. In Hewett Fork, natural alkaline additions downstream are higher than those from the doser. Both, alkaline additions and stream velocity drive sediment and metal deposition. Metal deposition occurs in several patterns; aluminum tends to deposit in regions of low stream velocity, while iron tends to deposit once sufficient alkalinity is added to the system downstream of mining inputs. The majority of metal deposition occurs upstream of the recovered zone. Both the physical stream parameters and natural alkalinity sources influence biological recovery in treated AMD streams and should be considered in remediation plans. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Application of the Hydroecological Integrity Assessment Process for Missouri Streams

    Science.gov (United States)

    Kennen, Jonathan G.; Henriksen, James A.; Heasley, John; Cade, Brian S.; Terrell, James W.

    2009-01-01

    proposed hydrologic alterations; and (2) a Missouri Stream Classification Tool (MOSCT) designed for placing previously unclassified streams into one of the five pre-defined stream types.

  14. Streams and their future inhabitants

    DEFF Research Database (Denmark)

    Sand-Jensen, K.; Friberg, Nikolai

    2006-01-01

    In this fi nal chapter we look ahead and address four questions: How do we improve stream management? What are the likely developments in the biological quality of streams? In which areas is knowledge on stream ecology insuffi cient? What can streams offer children of today and adults of tomorrow?...

  15. Secure remote service execution for web media streaming

    OpenAIRE

    Mikityuk, Alexandra

    2017-01-01

    Through continuous advancements in streaming and Web technologies over the past decade, the Web has become a platform for media delivery. Web standards like HTML5 have been designed accordingly, allowing for the delivery of applications, high-quality streaming video, and hooks for interoperable content protection. Efficient video encoding algorithms such as AVC/HEVC and streaming protocols such as MPEG-DASH have served as additional triggers for this evolution. Users now employ...

  16. STREAMS - Supporting Underrepresented Groups in Earth Sciences

    Science.gov (United States)

    Carvalho-Knighton, K.; Johnson, A.

    2009-12-01

    In Fall 2008, STREAMS (Supporting Talented and Remarkable Environmental And Marine Science students) Scholarship initiative began at the University of South Florida St. Petersburg, the only public university in Pinellas County. STREAMS is a partnership between the University of South Florida St. Petersburg’s (USFSP) Environmental Science and Policy Program and University of South Florida’s (USF) College of Marine Science. The STREAMS Student Scholarship Program has facilitated increased recruitment, retention, and graduation of USFSP environmental science and USF marine science majors. The STREAMS program has increased opportunities for minorities and women to obtain undergraduate and graduate degrees, gain valuable research experience and engage in professional development activities. STREAMS scholars have benefited from being mentored by USFSP and USF faculty and as well as MSPhDs students and NSF Florida-Georgia LSAMP Bridge to Doctorate graduate fellows. In addition, STREAMS has facilitated activities designed to prepare student participants for successful Earth system science-related careers. We will elucidate the need for this initiative and vision for the collaboration.

  17. Asynchronous stream processing with S-Net

    NARCIS (Netherlands)

    Grelck, C.; Scholz, S.-B.; Shafarenko, A.

    2010-01-01

    We present the rationale and design of S-Net, a coordination language for asynchronous stream processing. The language achieves a near-complete separation between the application code, written in any conventional programming language, and the coordination/communication code written in S-Net. Our

  18. Applications of on-stream analysis systems

    International Nuclear Information System (INIS)

    Howarth, W.J.

    1982-01-01

    Benefits of on-stream analysis include increased metal recovery, reduced consumption of reagents, increases in concentrate grade and savings in labour. A poorly designed analysis zone can give rise to incorrect assays as a result of segregation or excessive or variable aeration

  19. Application of the Lean Office philosophy and mapping of the value stream in the process of designing the banking units of a financial company

    Directory of Open Access Journals (Sweden)

    Nelson Antônio Calsavara

    2016-09-01

    Full Text Available The purpose of this study is to conduct a critical analysis of the effects of Lean Office on the design process of the banking units of a financial company and how the implementation of this philosophy may contribute to productivity, thus reducing implementation time. A literature review of the Toyota Production System was conducted, as well as studies on its methods, with advancement to lean thinking and consistent application of Lean philosophies in services and Office. A bibliographic and documentary survey of the Lean processes and procedures for opening bank branches was taken. A Current State Map was developed, modeling the current operating procedures. Soon after the identification and analysis of waste, proposals were presented for reducing deadlines and eliminating and grouping stages, with consequent development of the Future State Map, implementation and monitoring of stages, and the measurement of estimated time gains in operation, demonstrating an estimated 45% reduction, in days, from start to end of the process, concluding that the implementation of the Lean Office philosophy contributed to the process.

  20. Beam-induced back-streaming electron suppression analysis for an accelerator type neutron generator designed for 40Ar/39Ar geochronology.

    Science.gov (United States)

    Waltz, Cory; Ayllon, Mauricio; Becker, Tim; Bernstein, Lee; Leung, Ka-Ngo; Kirsch, Leo; Renne, Paul; Bibber, Karl Van

    2017-07-01

    A facility based on a next-generation, high-flux D-D neutron generator has been commissioned and it is now operational at the University of California, Berkeley. The current generator designed for 40 Ar/ 39 Ar dating of geological materials produces nearly monoenergetic 2.45MeV neutrons at outputs of 10 8 n/s. The narrow energy range is advantageous relative to the 235 U fission spectrum neutrons due to (i) reduced 39 Ar recoil energy, (ii) minimized production of interfering argon isotopes from K, Ca, and Cl, and (iii) reduced total activity for radiological safety and waste generation. Calculations provided show that future conditioning at higher currents and voltages will allow for a neutron output of over 10 10 n/s, which is a necessary requirement for production of measurable quantities of 39 Ar through the reaction 39 K(n,p) 39 Ar. A significant problem encountered with increasing deuteron current was beam-induced electron backstreaming. Two methods of suppressing secondary electrons resulting from the deuterium beam striking the target were tested: the application of static electric and magnetic fields. Computational simulations of both techniques were done using a finite element analysis in COMSOL Multiphysics ® . Experimental tests verified these simulations. The most reliable suppression was achieved via the implementation of an electrostatic shroud with a voltage offset of -800V relative to the target. Copyright © 2017. Published by Elsevier Ltd.

  1. Music Streaming in Denmark

    DEFF Research Database (Denmark)

    Pedersen, Rasmus Rex

    This report analyses how a ’per user’ settlement model differs from the ‘pro rata’ model currently used. The analysis is based on data for all streams by WiMP users in Denmark during August 2013. The analysis has been conducted in collaboration with Christian Schlelein from Koda on the basis of d...

  2. Academic streaming in Europe

    DEFF Research Database (Denmark)

    Falaschi, Alessandro; Mønster, Dan; Doležal, Ivan

    2004-01-01

    The TF-NETCAST task force was active from March 2003 to March 2004, and during this time the mem- bers worked on various aspects of streaming media related to the ultimate goal of setting up common services and infrastructures to enable netcasting of high quality content to the academic community...

  3. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Energy Technology Data Exchange (ETDEWEB)

    Zaher, Ashraf A. [Physics Department, Science College, Kuwait University, P.O. Box 5969, Safat 13060 (Kuwait)], E-mail: ashraf.zaher@ku.edu.kw

    2009-12-15

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  4. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    International Nuclear Information System (INIS)

    Zaher, Ashraf A.

    2009-01-01

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  5. Jet Noise Scaling in Dual Stream Nozzles

    Science.gov (United States)

    Khavaran, Abbas; Bridges, James

    2010-01-01

    Power spectral laws in dual stream jets are studied by considering such flows a superposition of appropriate single-stream coaxial jets. Noise generation in each mixing region is modeled using spectral power laws developed earlier for single stream jets as a function of jet temperature and observer angle. Similarity arguments indicate that jet noise in dual stream nozzles may be considered as a composite of four single stream jets representing primary/secondary, secondary/ambient, transition, and fully mixed zones. Frequency filter are designed to highlight spectral contribution from each jet. Predictions are provided at an area ratio of 2.0--bypass ratio from 0.80 to 3.40, and are compared with measurements within a wide range of velocity and temperature ratios. These models suggest that the low frequency noise in unheated jets is dominated by the fully mixed region at all velocity ratios, while the high frequency noise is dominated by the secondary when the velocity ratio is larger than 0.80. Transition and fully mixed jets equally dominate the low frequency noise in heated jets. At velocity ratios less than 0.50, the high frequency noise from primary/bypass becomes a significant contributing factor similar to that in the secondary/ambient jet.

  6. Analysis of hydraulic characteristics for stream diversion in small stream

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Sang-Jin; Jun, Kye-Won [Chungbuk National University, Cheongju(Korea)

    2001-10-31

    This study is the analysis of hydraulic characteristics for stream diversion reach by numerical model test. Through it we can provide the basis data in flood, and in grasping stream flow characteristics. Analysis of hydraulic characteristics in Seoknam stream were implemented by using computer model HEC-RAS(one-dimensional model) and RMA2(two-dimensional finite element model). As a result we became to know that RMA2 to simulate left, main channel, right in stream is more effective method in analysing flow in channel bends, steep slope, complex bed form effect stream flow characteristics, than HEC-RAS. (author). 13 refs., 3 tabs., 5 figs.

  7. Streaming gravity mode instability

    International Nuclear Information System (INIS)

    Wang Shui.

    1989-05-01

    In this paper, we study the stability of a current sheet with a sheared flow in a gravitational field which is perpendicular to the magnetic field and plasma flow. This mixing mode caused by a combined role of the sheared flow and gravity is named the streaming gravity mode instability. The conditions of this mode instability are discussed for an ideal four-layer model in the incompressible limit. (author). 5 refs

  8. Autonomous Byte Stream Randomizer

    Science.gov (United States)

    Paloulian, George K.; Woo, Simon S.; Chow, Edward T.

    2013-01-01

    Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.

  9. The LHCb Turbo stream

    Energy Technology Data Exchange (ETDEWEB)

    Puig, A., E-mail: albert.puig@cern.ch

    2016-07-11

    The LHCb experiment will record an unprecedented dataset of beauty and charm hadron decays during Run II of the LHC, set to take place between 2015 and 2018. A key computing challenge is to store and process this data, which limits the maximum output rate of the LHCb trigger. So far, LHCb has written out a few kHz of events containing the full raw sub-detector data, which are passed through a full offline event reconstruction before being considered for physics analysis. Charm physics in particular is limited by trigger output rate constraints. A new streaming strategy includes the possibility to perform the physics analysis with candidates reconstructed in the trigger, thus bypassing the offline reconstruction. In the Turbo stream the trigger will write out a compact summary of physics objects containing all information necessary for analyses. This will allow an increased output rate and thus higher average efficiencies and smaller selection biases. This idea will be commissioned and developed during 2015 with a selection of physics analyses. It is anticipated that the turbo stream will be adopted by an increasing number of analyses during the remainder of LHC Run II (2015–2018) and ultimately in Run III (starting in 2020) with the upgraded LHCb detector.

  10. Re-Meandering of Lowland Streams

    DEFF Research Database (Denmark)

    Pedersen, Morten Lauge; Kristensen, Klaus Kevin; Friberg, Nikolai

    2014-01-01

    We evaluated the restoration of physical habitats and its influence on macroinvertebrate community structure in 18 Danish lowland streams comprising six restored streams, six streams with little physical alteration and six channelized streams. We hypothesized that physical habitats and macroinver...

  11. Stream processing health card application.

    Science.gov (United States)

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  12. Inequality in outcomes for adolescents living with perinatally acquired HIV in sub-Saharan Africa: a Collaborative Initiative for Paediatric HIV Education and Research (CIPHER) Cohort Collaboration analysis.

    Science.gov (United States)

    2018-02-01

    Eighty percent of adolescents living with perinatally and behaviourally acquired HIV live in sub-Saharan Africa (SSA), a continent with marked economic inequality. As part of our global project describing adolescents living with perinatally acquired HIV (APH), we aimed to assess whether inequality in outcomes exists by country income group (CIG) for APH within SSA. Through the CIPHER cohort collaboration, individual retrospective data from 7 networks and 25 countries in SSA were included. APH were included if they entered care at age 10 years. World Bank CIG classification for median year of first visit was used. Cumulative incidence of mortality, transfer-out and loss-to-follow-up was calculated by competing risks analysis. Mortality was compared across CIG by Cox proportional hazards models. A total of 30,296 APH were included; 50.9% were female and 75.7% were resident in low-income countries (LIC). Median [interquartile range (IQR)] age at antiretroviral therapy (ART) start was 8.1 [6.3; 9.5], 7.8 [6.2; 9.3] and 7.3 [5.2; 8.9] years in LIC, lower-middle income countries (LMIC) and upper-middle income countries (UMIC) respectively. Median age at last follow-up was 12.1 [10.9; 13.8] years, with no difference between CIG. Cumulative incidence (95% CI) for mortality between age 10 and 15 years was lowest in UMIC (1.1% (0.8; 1.4)) compared to LIC (3.5% (3.1; 3.8)) and LMIC (3.9% (2.7; 5.4)). Loss-to-follow-up was highest in UMIC (14.0% (12.9; 15.3)) compared to LIC (13.1% (12.4; 13.8)) and LMIC (8.3% (6.3; 10.6)). Adjusted mortality hazard ratios (95% CI) for APH in LIC and LMIC in reference to UMIC were 2.50 (1.85; 3.37) and 2.96 (1.90; 4.61) respectively, with little difference when restricted only to APH who ever received ART. In adjusted analyses mortality was similar for male and female APH. Results highlight probable inequality in mortality according to CIG in SSA even when ART was received. These findings highlight that without attention towards SDG 10 (to

  13. Cows, clicks, ciphers, and satire

    Directory of Open Access Journals (Sweden)

    Tom Tyler

    2015-04-01

    Full Text Available The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users. However, the game has been criticised for its mindless mechanics, which require little more than repeated clicking on its colourful icons. By way of parody, Ian Bogost’s Cow Clicker permits its players to simply click on a picture of a cow once every six hours. In this essay I extend Bogost’s critique and suggest that Cow Clicker highlights not just the soulless inanity of Farmville gameplay but also the paucity of that game’s portrayal of the painful reality of a dairy cow’s punishing daily existence and untimely end.

  14. Nitrogen saturation in stream ecosystems.

    Science.gov (United States)

    Earl, Stevan R; Valett, H Maurice; Webster, Jackson R

    2006-12-01

    The concept of nitrogen (N) saturation has organized the assessment of N loading in terrestrial ecosystems. Here we extend the concept to lotic ecosystems by coupling Michaelis-Menten kinetics and nutrient spiraling. We propose a series of saturation response types, which may be used to characterize the proximity of streams to N saturation. We conducted a series of short-term N releases using a tracer (15NO3-N) to measure uptake. Experiments were conducted in streams spanning a gradient of background N concentration. Uptake increased in four of six streams as NO3-N was incrementally elevated, indicating that these streams were not saturated. Uptake generally corresponded to Michaelis-Menten kinetics but deviated from the model in two streams where some other growth-critical factor may have been limiting. Proximity to saturation was correlated to background N concentration but was better predicted by the ratio of dissolved inorganic N (DIN) to soluble reactive phosphorus (SRP), suggesting phosphorus limitation in several high-N streams. Uptake velocity, a reflection of uptake efficiency, declined nonlinearly with increasing N amendment in all streams. At the same time, uptake velocity was highest in the low-N streams. Our conceptual model of N transport, uptake, and uptake efficiency suggests that, while streams may be active sites of N uptake on the landscape, N saturation contributes to nonlinear changes in stream N dynamics that correspond to decreased uptake efficiency.

  15. STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Fox, Geoffrey [Indiana Univ., Bloomington, IN (United States); Jha, Shantenu [Rutgers Univ., New Brunswick, NJ (United States); Ramakrishnan, Lavanya [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-10-01

    The Department of Energy (DOE) Office of Science (SC) facilities including accelerators, light sources and neutron sources and sensors that study, the environment, and the atmosphere, are producing streaming data that needs to be analyzed for next-generation scientific discoveries. There has been an explosion of new research and technologies for stream analytics arising from the academic and private sectors. However, there has been no corresponding effort in either documenting the critical research opportunities or building a community that can create and foster productive collaborations. The two-part workshop series, STREAM: Streaming Requirements, Experience, Applications and Middleware Workshop (STREAM2015 and STREAM2016), were conducted to bring the community together and identify gaps and future efforts needed by both NSF and DOE. This report describes the discussions, outcomes and conclusions from STREAM2016: Streaming Requirements, Experience, Applications and Middleware Workshop, the second of these workshops held on March 22-23, 2016 in Tysons, VA. STREAM2016 focused on the Department of Energy (DOE) applications, computational and experimental facilities, as well software systems. Thus, the role of “streaming and steering” as a critical mode of connecting the experimental and computing facilities was pervasive through the workshop. Given the overlap in interests and challenges with industry, the workshop had significant presence from several innovative companies and major contributors. The requirements that drive the proposed research directions, identified in this report, show an important opportunity for building competitive research and development program around streaming data. These findings and recommendations are consistent with vision outlined in NRC Frontiers of Data and National Strategic Computing Initiative (NCSI) [1, 2]. The discussions from the workshop are captured as topic areas covered in this report's sections. The report

  16. Galaxies with jet streams

    International Nuclear Information System (INIS)

    Breuer, R.

    1981-01-01

    Describes recent research work on supersonic gas flow. Notable examples have been observed in cosmic radio sources, where jet streams of galactic dimensions sometimes occur, apparently as the result of interaction between neighbouring galaxies. The current theory of jet behaviour has been convincingly demonstrated using computer simulation. The surprisingly long-term stability is related to the supersonic velocity, and is analagous to the way in which an Appollo spacecraft re-entering the atmosphere supersonically is protected by the gas from the burning shield. (G.F.F.)

  17. Oscillating acoustic streaming jet

    International Nuclear Information System (INIS)

    Moudjed, Brahim; Botton, Valery; Henry, Daniel; Millet, Severine; Ben Hadid, Hamda; Garandet, Jean-Paul

    2014-01-01

    The present paper provides the first experimental investigation of an oscillating acoustic streaming jet. The observations are performed in the far field of a 2 MHz circular plane ultrasound transducer introduced in a rectangular cavity filled with water. Measurements are made by Particle Image Velocimetry (PIV) in horizontal and vertical planes near the end of the cavity. Oscillations of the jet appear in this zone, for a sufficiently high Reynolds number, as an intermittent phenomenon on an otherwise straight jet fluctuating in intensity. The observed perturbation pattern is similar to that of former theoretical studies. This intermittently oscillatory behavior is the first step to the transition to turbulence. (authors)

  18. The role of temporal coherence in auditory stream segregation

    DEFF Research Database (Denmark)

    Christiansen, Simon Krogholt

    The ability to perceptually segregate concurrent sound sources and focus one’s attention on a single source at a time is essential for the ability to use acoustic information. While perceptual experiments have determined a range of acoustic cues that help facilitate auditory stream segregation......, it is not clear how the auditory system realizes the task. This thesis presents a study of the mechanisms involved in auditory stream segregation. Through a combination of psychoacoustic experiments, designed to characterize the influence of acoustic cues on auditory stream formation, and computational models...... of auditory processing, the role of auditory preprocessing and temporal coherence in auditory stream formation was evaluated. The computational model presented in this study assumes that auditory stream segregation occurs when sounds stimulate non-overlapping neural populations in a temporally incoherent...

  19. The metaphors we stream by: Making sense of music streaming

    OpenAIRE

    Hagen, Anja Nylund

    2016-01-01

    In Norway music-streaming services have become mainstream in everyday music listening. This paper examines how 12 heavy streaming users make sense of their experiences with Spotify and WiMP Music (now Tidal). The analysis relies on a mixed-method qualitative study, combining music-diary self-reports, online observation of streaming accounts, Facebook and last.fm scrobble-logs, and in-depth interviews. By drawing on existing metaphors of Internet experiences we demonstrate that music-streaming...

  20. Tracking Gendered Streams

    Directory of Open Access Journals (Sweden)

    Maria Eriksson

    2017-10-01

    Full Text Available One of the most prominent features of digital music services is the provision of personalized music recommendations that come about through the profiling of users and audiences. Based on a range of "bot experiments," this article investigates if, and how, gendered patterns in music recommendations are provided by the streaming service Spotify. While our experiments did not give any strong indications that Spotify assigns different taste profiles to male and female users, the study showed that male artists were highly overrepresented in Spotify's music recommendations; an issue which we argue prompts users to cite hegemonic masculine norms within the music industries. Although the results should be approached as historically and contextually contingent, we argue that they point to how gender and gendered tastes may be constituted through the interplay between users and algorithmic knowledge-making processes, and how digital content delivery may maintain and challenge gender relations and gendered power differentials within the music industries. Seen through the lens of critical research on software, music and gender performativity, the experiments thus provide insights into how gender is shaped and attributed meaning as it materializes in contemporary music streams.

  1. The LHCb Turbo stream

    CERN Document Server

    AUTHOR|(CDS)2070171

    2016-01-01

    The LHCb experiment will record an unprecedented dataset of beauty and charm hadron decays during Run II of the LHC, set to take place between 2015 and 2018. A key computing challenge is to store and process this data, which limits the maximum output rate of the LHCb trigger. So far, LHCb has written out a few kHz of events containing the full raw sub-detector data, which are passed through a full offline event reconstruction before being considered for physics analysis. Charm physics in particular is limited by trigger output rate constraints. A new streaming strategy includes the possibility to perform the physics analysis with candidates reconstructed in the trigger, thus bypassing the offline reconstruction. In the Turbo stream the trigger will write out a compact summary of physics objects containing all information necessary for analyses. This will allow an increased output rate and thus higher average efficiencies and smaller selection biases. This idea will be commissioned and developed during 2015 wi...

  2. Urbanization and stream ecology: Diverse mechanisms of change

    Science.gov (United States)

    Roy, Allison; Capps, Krista A.; El-Sabaawi, Rana W.; Jones, Krista L.; Parr, Thomas B.; Ramirez, Alonso; Smith, Robert F.; Walsh, Christopher J.; Wenger, Seth J.

    2016-01-01

    The field of urban stream ecology has evolved rapidly in the last 3 decades, and it now includes natural scientists from numerous disciplines working with social scientists, landscape planners and designers, and land and water managers to address complex, socioecological problems that have manifested in urban landscapes. Over the last decade, stream ecologists have met 3 times at the Symposium on Urbanization and Stream Ecology (SUSE) to discuss current research, identify knowledge gaps, and promote future research collaborations. The papers in this special series on urbanization and stream ecology include both primary research studies and conceptual synthesis papers spurred from discussions at SUSE in May 2014. The themes of the meeting are reflected in the papers in this series emphasizing global differences in mechanisms and responses of stream ecosystems to urbanization and management solutions in diverse urban streams. Our hope is that this series will encourage continued interdisciplinary and collaborative research to increase the global understanding of urban stream ecology toward stream protection and restoration in urban landscapes.

  3. Principles of selection ofdrilling mud stream volume when drilling with a stream pump

    Directory of Open Access Journals (Sweden)

    Jan Macuda

    2006-10-01

    Full Text Available The reverse mud circulation induced by a stream pump is most frequently applied for large diameter drilling. This system is treated as auxiliary in all design solutions. It is implemented to drilling wells from the surface to the depth of deposition of the preliminary column. It enables performing wells in loose sands, gravel, clays clayey shales, marls, limestones, sandstones and other sedimentary rocks.A principle of selecting a drilling mud stream volume for various bit diameters and drilling rates in loose rocks are presented in the paper. A special attention has been paid to the drop of efficiency of cuttings removal with an increasing depth of the borehole.

  4. Stream Lifetimes Against Planetary Encounters

    Science.gov (United States)

    Valsecchi, G. B.; Lega, E.; Froeschle, Cl.

    2011-01-01

    We study, both analytically and numerically, the perturbation induced by an encounter with a planet on a meteoroid stream. Our analytical tool is the extension of pik s theory of close encounters, that we apply to streams described by geocentric variables. The resulting formulae are used to compute the rate at which a stream is dispersed by planetary encounters into the sporadic background. We have verified the accuracy of the analytical model using a numerical test.

  5. Stream pH as an abiotic gradient influencing distributions of trout in Pennsylvania streams

    Science.gov (United States)

    Kocovsky, P.M.; Carline, R.F.

    2005-01-01

    Elevation and stream slope are abiotic gradients that limit upstream distributions of brook trout Salvelinus fontinalis and brown trout Salmo trutta in streams. We sought to determine whether another abiotic gradient, base-flow pH, may also affect distributions of these two species in eastern North America streams. We used historical data from the Pennsylvania Fish and Boat Commission's fisheries management database to explore the effects of reach elevation, slope, and base-flow pH on distributional limits to brook trout and brown trout in Pennsylvania streams in the Appalachian Plateaus and Ridge and Valley physiographic provinces. Discriminant function analysis (DFA) was used to calculate a canonical axis that separated allopatric brook trout populations from allopatric brown trout populations and allowed us to assess which of the three independent variables were important gradients along which communities graded from allopatric brook trout to allopatric brown trout. Canonical structure coefficients from DFA indicated that in both physiographic provinces, stream base-flow pH and slope were important factors in distributional limits; elevation was also an important factor in the Ridge and Valley Province but not the Appalachian Plateaus Province. Graphs of each variable against the proportion of brook trout in a community also identified apparent zones of allopatry for both species on the basis of pH and stream slope. We hypothesize that pH-mediated interspecific competition that favors brook trout in competition with brown trout at lower pH is the most plausible mechanism for segregation of these two species along pH gradients. Our discovery that trout distributions in Pennsylvania are related to stream base-flow pH has important implications for brook trout conservation in acidified regions. Carefully designed laboratory and field studies will be required to test our hypothesis and elucidate the mechanisms responsible for the partitioning of brook trout and

  6. Analyzing indicators of stream health for Minnesota streams

    Science.gov (United States)

    Singh, U.; Kocian, M.; Wilson, B.; Bolton, A.; Nieber, J.; Vondracek, B.; Perry, J.; Magner, J.

    2005-01-01

    Recent research has emphasized the importance of using physical, chemical, and biological indicators of stream health for diagnosing impaired watersheds and their receiving water bodies. A multidisciplinary team at the University of Minnesota is carrying out research to develop a stream classification system for Total Maximum Daily Load (TMDL) assessment. Funding for this research is provided by the United States Environmental Protection Agency and the Minnesota Pollution Control Agency. One objective of the research study involves investigating the relationships between indicators of stream health and localized stream characteristics. Measured data from Minnesota streams collected by various government and non-government agencies and research institutions have been obtained for the research study. Innovative Geographic Information Systems tools developed by the Environmental Science Research Institute and the University of Texas are being utilized to combine and organize the data. Simple linear relationships between index of biological integrity (IBI) and channel slope, two-year stream flow, and drainage area are presented for the Redwood River and the Snake River Basins. Results suggest that more rigorous techniques are needed to successfully capture trends in IBI scores. Additional analyses will be done using multiple regression, principal component analysis, and clustering techniques. Uncovering key independent variables and understanding how they fit together to influence stream health are critical in the development of a stream classification for TMDL assessment.

  7. ADAPTIVE STREAMING OVER HTTP (DASH UNTUK APLIKASI VIDEO STREAMING

    Directory of Open Access Journals (Sweden)

    I Made Oka Widyantara

    2015-12-01

    Full Text Available This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP. DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These packages are assembled into packets in a streaming media format Presentation Description (MPD or known as MPEG-DASH. Streaming video format MPEG-DASH run on a platform with the player bitdash teritegrasi bitcoin. With this scheme, the video will have several variants of the bit rates that gave rise to the concept of scalability of streaming video services on the client side. The main target of the mechanism is smooth the MPEG-DASH streaming video display on the client. The simulation results show that the scheme based scalable video streaming MPEG-DASH able to improve the quality of image display on the client side, where the procedure bufering videos can be made constant and fine for the duration of video views

  8. Design Characteristics as Basis for Design Languages

    DEFF Research Database (Denmark)

    Mortensen, Niels Henrik

    1997-01-01

    The application of modern feature based CAD systems has in many companies lead to significant rationalisation of design, particulary the "down stream" acticities such as NC code generation, FEM analysis, mould flow simulation and documentation. The subject of this paper is the "up stream" activit......The application of modern feature based CAD systems has in many companies lead to significant rationalisation of design, particulary the "down stream" acticities such as NC code generation, FEM analysis, mould flow simulation and documentation. The subject of this paper is the "up stream...

  9. Design, Assembly, and Characterization of TALE-Based Transcriptional Activators and Repressors.

    Science.gov (United States)

    Thakore, Pratiksha I; Gersbach, Charles A

    2016-01-01

    Transcription activator-like effectors (TALEs) are modular DNA-binding proteins that can be fused to a variety of effector domains to regulate the epigenome. Nucleotide recognition by TALE monomers follows a simple cipher, making this a powerful and versatile method to activate or repress gene expression. Described here are methods to design, assemble, and test TALE transcription factors (TALE-TFs) for control of endogenous gene expression. In this protocol, TALE arrays are constructed by Golden Gate cloning and tested for activity by transfection and quantitative RT-PCR. These methods for engineering TALE-TFs are useful for studies in reverse genetics and genomics, synthetic biology, and gene therapy.

  10. Relation between Streaming Potential and Streaming Electrification Generated by Streaming of Water through a Sandwich-type Cell

    OpenAIRE

    Maruyama, Kazunori; Nikaido, Mitsuru; Hara, Yoshinori; Tanizaki, Yoshie

    2012-01-01

    Both streaming potential and accumulated charge of water flowed out were measured simultaneously using a sandwich-type cell. The voltages generated in divided sections along flow direction satisfied additivity. The sign of streaming potential agreed with that of streaming electrification. The relation between streaming potential and streaming electrification was explained from a viewpoint of electrical double layer in glass-water interface.

  11. Design

    DEFF Research Database (Denmark)

    Volf, Mette

    This publication is unique in its demystification and operationalization of the complex and elusive nature of the design process. The publication portrays the designer’s daily work and the creative process, which the designer is a part of. Apart from displaying the designer’s work methods...... and design parameters, the publication shows examples from renowned Danish design firms. Through these examples the reader gets an insight into the designer’s reality....

  12. Human impacts to mountain streams

    Science.gov (United States)

    Wohl, Ellen

    2006-09-01

    Mountain streams are here defined as channel networks within mountainous regions of the world. This definition encompasses tremendous diversity of physical and biological conditions, as well as history of land use. Human effects on mountain streams may result from activities undertaken within the stream channel that directly alter channel geometry, the dynamics of water and sediment movement, contaminants in the stream, or aquatic and riparian communities. Examples include channelization, construction of grade-control structures or check dams, removal of beavers, and placer mining. Human effects can also result from activities within the watershed that indirectly affect streams by altering the movement of water, sediment, and contaminants into the channel. Deforestation, cropping, grazing, land drainage, and urbanization are among the land uses that indirectly alter stream processes. An overview of the relative intensity of human impacts to mountain streams is provided by a table summarizing human effects on each of the major mountainous regions with respect to five categories: flow regulation, biotic integrity, water pollution, channel alteration, and land use. This table indicates that very few mountains have streams not at least moderately affected by land use. The least affected mountainous regions are those at very high or very low latitudes, although our scientific ignorance of conditions in low-latitude mountains in particular means that streams in these mountains might be more altered than is widely recognized. Four case studies from northern Sweden (arctic region), Colorado Front Range (semiarid temperate region), Swiss Alps (humid temperate region), and Papua New Guinea (humid tropics) are also used to explore in detail the history and effects on rivers of human activities in mountainous regions. The overview and case studies indicate that mountain streams must be managed with particular attention to upstream/downstream connections, hillslope

  13. A Streaming Language Implementation of the Discontinuous Galerkin Method

    Science.gov (United States)

    Barth, Timothy; Knight, Timothy

    2005-01-01

    We present a Brook streaming language implementation of the 3-D discontinuous Galerkin method for compressible fluid flow on tetrahedral meshes. Efficient implementation of the discontinuous Galerkin method using the streaming model of computation introduces several algorithmic design challenges. Using a cycle-accurate simulator, performance characteristics have been obtained for the Stanford Merrimac stream processor. The current Merrimac design achieves 128 Gflops per chip and the desktop board is populated with 16 chips yielding a peak performance of 2 Teraflops. Total parts cost for the desktop board is less than $20K. Current cycle-accurate simulations for discretizations of the 3-D compressible flow equations yield approximately 40-50% of the peak performance of the Merrimac streaming processor chip. Ongoing work includes the assessment of the performance of the same algorithm on the 2 Teraflop desktop board with a target goal of achieving 1 Teraflop performance.

  14. Study on Transitions in Employment, Ability and Motivation (STREAM): The Design of a Four-year Longitudinal Cohort Study among 15,118 Persons Aged 45 to 64 Years

    NARCIS (Netherlands)

    Ybema, Jan F.; Geuskens, Goedele A.; van den Heuvel, Swenne G.; de Wind, Astrid; Leijten, Fenna R M; Joling, Catelijne I.; Blatter, Birgitte M.; Burdorf, Alex; van der Beek, Allard J.; Bongers, Paulien M.

    2014-01-01

    Aims: The objective of the Study on Transitions in Employment, Ability and Motivation (STREAM) is to acquire knowledge on determinants of transitions in employment and work productivity among persons aged 45-64 years. Research Framework: A research framework was developed, in which transitions in

  15. Study on transitions in employment, ability and motivation (STREAM): the design of a four-year longitudinal cohort study among 15,118 persons aged 45 to 64 years

    NARCIS (Netherlands)

    Ybema, J.F.; Geuskens, G.A.; Heuvel, S.G. van den; Wind, A. de; Leijten, F.R.M.; Jolings, C.; Blatter, B.M.; Burdorf, A.; Beek, A.J. van der; Bongers, P.M.

    2014-01-01

    The objective of the Study on Transitions in Employment, Ability and Motivation (STREAM) is to acquire knowledge on determinants of transitions in employment and work productivity among persons aged 45-64 years. Research Framework: A research framework was developed, in which transitions in

  16. Industrial-Strength Streaming Video.

    Science.gov (United States)

    Avgerakis, George; Waring, Becky

    1997-01-01

    Corporate training, financial services, entertainment, and education are among the top applications for streaming video servers, which send video to the desktop without downloading the whole file to the hard disk, saving time and eliminating copyrights questions. Examines streaming video technology, lists ten tips for better net video, and ranks…

  17. Data streams: algorithms and applications

    National Research Council Canada - National Science Library

    Muthukrishnan, S

    2005-01-01

    ... massive data sets in general. Researchers in Theoretical Computer Science, Databases, IP Networking and Computer Systems are working on the data stream challenges. This article is an overview and survey of data stream algorithmics and is an updated version of [175]. S. Muthukrishnan Rutgers University, New Brunswick, NJ, USA, muthu@cs...

  18. What Can Hierarchies Do for Data Streams?

    DEFF Research Database (Denmark)

    Yin, Xuepeng; Pedersen, Torben Bach

    Much effort has been put into building data streams management systems for querying data streams. Here, data streams have been viewed as a flow of low-level data items, e.g., sensor readings or IP packet data. Stream query languages have mostly been SQL-based, with the STREAM and TelegraphCQ lang...

  19. Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming

    OpenAIRE

    Tang, Ming; Pang, Haitian; Wang, Shou; Gao, Lin; Huang, Jianwei; Sun, Lifeng

    2017-01-01

    Crowdsourced mobile video streaming enables nearby mobile video users to aggregate network resources to improve their video streaming performances. However, users are often selfish and may not be willing to cooperate without proper incentives. Designing an incentive mechanism for such a scenario is challenging due to the users' asynchronous downloading behaviors and their private valuations for multi-bitrate coded videos. In this work, we propose both single-object and multi-object multi-dime...

  20. Human Factors in Streaming Data Analysis: Challenges and Opportunities for Information Visualization: Human Factors in Streaming Data Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Dasgupta, Aritra [Pacific Northwest National Laboratory, Richland Washington USA; Arendt, Dustin L. [Pacific Northwest National Laboratory, Richland Washington USA; Franklin, Lyndsey R. [Pacific Northwest National Laboratory, Richland Washington USA; Wong, Pak Chung [Pacific Northwest National Laboratory, Richland Washington USA; Cook, Kristin A. [Pacific Northwest National Laboratory, Richland Washington USA

    2017-09-01

    Real-world systems change continuously and across domains like traffic monitoring, cyber security, etc., such changes occur within short time scales. This leads to a streaming data problem and produces unique challenges for the human in the loop, as analysts have to ingest and make sense of dynamic patterns in real time. In this paper, our goal is to study how the state-of-the-art in streaming data visualization handles these challenges and reflect on the gaps and opportunities. To this end, we have three contributions: i) problem characterization for identifying domain-specific goals and challenges for handling streaming data, ii) a survey and analysis of the state-of-the-art in streaming data visualization research with a focus on the visualization design space, and iii) reflections on the perceptually motivated design challenges and potential research directions for addressing them.

  1. Stream Clustering of Growing Objects

    Science.gov (United States)

    Siddiqui, Zaigham Faraz; Spiliopoulou, Myra

    We study incremental clustering of objects that grow and accumulate over time. The objects come from a multi-table stream e.g. streams of Customer and Transaction. As the Transactions stream accumulates, the Customers’ profiles grow. First, we use an incremental propositionalisation to convert the multi-table stream into a single-table stream upon which we apply clustering. For this purpose, we develop an online version of K-Means algorithm that can handle these swelling objects and any new objects that arrive. The algorithm also monitors the quality of the model and performs re-clustering when it deteriorates. We evaluate our method on the PKDD Challenge 1999 dataset.

  2. Dynamical modeling of tidal streams

    International Nuclear Information System (INIS)

    Bovy, Jo

    2014-01-01

    I present a new framework for modeling the dynamics of tidal streams. The framework consists of simple models for the initial action-angle distribution of tidal debris, which can be straightforwardly evolved forward in time. Taking advantage of the essentially one-dimensional nature of tidal streams, the transformation to position-velocity coordinates can be linearized and interpolated near a small number of points along the stream, thus allowing for efficient computations of a stream's properties in observable quantities. I illustrate how to calculate the stream's average location (its 'track') in different coordinate systems, how to quickly estimate the dispersion around its track, and how to draw mock stream data. As a generative model, this framework allows one to compute the full probability distribution function and marginalize over or condition it on certain phase-space dimensions as well as convolve it with observational uncertainties. This will be instrumental in proper data analysis of stream data. In addition to providing a computationally efficient practical tool for modeling the dynamics of tidal streams, the action-angle nature of the framework helps elucidate how the observed width of the stream relates to the velocity dispersion or mass of the progenitor, and how the progenitors of 'orphan' streams could be located. The practical usefulness of the proposed framework crucially depends on the ability to calculate action-angle variables for any orbit in any gravitational potential. A novel method for calculating actions, frequencies, and angles in any static potential using a single orbit integration is described in the Appendix.

  3. Comparison of animated jet stream visualizations

    Science.gov (United States)

    Nocke, Thomas; Hoffmann, Peter

    2016-04-01

    The visualization of 3D atmospheric phenomena in space and time is still a challenging problem. In particular, multiple solutions of animated jet stream visualizations have been produced in recent years, which were designed to visually analyze and communicate the jet and related impacts on weather circulation patterns and extreme weather events. This PICO integrates popular and new jet animation solutions and inter-compares them. The applied techniques (e.g. stream lines or line integral convolution) and parametrizations (color mapping, line lengths) are discussed with respect to visualization quality criteria and their suitability for certain visualization tasks (e.g. jet patterns and jet anomaly analysis, communicating its relevance for climate change).

  4. Percent Forest Adjacent to Streams (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  5. Stream Habitat Reach Summary - NCWAP [ds158

    Data.gov (United States)

    California Natural Resource Agency — The Stream Habitat - NCWAP - Reach Summary [ds158] shapefile contains in-stream habitat survey data summarized to the stream reach level. It is a derivative of the...

  6. Percent Agriculture Adjacent to Streams (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The type of vegetation along a stream influences the water quality in the stream. Intact buffer strips of natural vegetation along streams tend to intercept...

  7. Stream Phosphorus Dynamics Along a Suburbanizing Gradient in Southern Ontario, Canada

    Science.gov (United States)

    Duval, T. P.

    2017-12-01

    While it is well known that urban streams are subject to impaired water quality relative to natural analogues, far less research has been directed at stream water quality during the process of (sub-) urbanization. This study determines the role of housing construction activities in Brampton, Canada on the concentration and flux of phosphorus (P) of a headwater stream. Prior to development the stream was engineered with a riffle-pool sequence, riparian plantings, and a floodplain corridor that was lined with sediment fencing. Stream sites were sampled daily over a period of six months at locations representing varying stages of subdivision completion (upper site -active construction; middle site -finished construction and natural vegetation; lower site -finished construction and active construction). A nearby urban stream site developed ten years prior to this study was selected as a reference site. There were no differences in total phosphorus (TP) levels or flux between the suburbanizing and urban streams; however, the forms of P differed between sites. The urban stream TP load was dominated by particulate phosphorus (PP) while suburbanizing stream P was mainly in the dissolved organic phosphorus (DOP) form. The importance of DOP to TP flux increased with the onset of the growing season. TP levels in all stream segments frequently exceeded provincial water quality guidelines during storm events but were generally low during baseflow conditions. During storm events PP and total suspended solid levels in the suburbanizing stream reached levels of the urban stream due to sediment fence failure at several locations along the construction-hillslope interface. Along the suburbanizing gradient, the hydrological connection to a mid-reach zone of no-construction activity / fallow field and native forest resulted in significantly lower P levels than the upper suburbanizing stream site. This suggests that stream channel design features as well as timing of construction

  8. Spring 5 & reactive streams

    CERN Multimedia

    CERN. Geneva; Clozel, Brian

    2017-01-01

    Spring is a framework widely used by the world-wide Java community, and it is also extensively used at CERN. The accelerator control system is constituted of 10 million lines of Java code, spread across more than 1000 projects (jars) developed by 160 software engineers. Around half of this (all server-side Java code) is based on the Spring framework. Warning: the speakers will assume that people attending the seminar are familiar with Java and Spring’s basic concepts. Spring 5.0 and Spring Boot 2.0 updates (45 min) This talk will cover the big ticket items in the 5.0 release of Spring (including Kotlin support, @Nullable and JDK9) and provide an update on Spring Boot 2.0, which is scheduled for the end of the year. Reactive Spring (1h) Spring Framework 5.0 has been released - and it now supports reactive applications in the Spring ecosystem. During this presentation, we'll talk about the reactive foundations of Spring Framework with the Reactor project and the reactive streams specification. We'll al...

  9. Waste streams from reprocessing operations

    International Nuclear Information System (INIS)

    Andersson, B.; Ericsson, A.-M.

    1978-03-01

    The three main products from reprocessing operations are uranium, plutonium and vitrified high-level-waste. The purpose of this report is to identify and quantify additional waste streams containing radioactive isotops. Special emphasis is laid on Sr, Cs and the actinides. The main part, more than 99 % of both the fission-products and the transuranic elements are contained in the HLW-stream. Small quantities sometimes contaminate the U- and Pu-streams and the rest is found in the medium-level-waste

  10. Flow Field and Acoustic Predictions for Three-Stream Jets

    Science.gov (United States)

    Simmons, Shaun Patrick; Henderson, Brenda S.; Khavaran, Abbas

    2014-01-01

    Computational fluid dynamics was used to analyze a three-stream nozzle parametric design space. The study varied bypass-to-core area ratio, tertiary-to-core area ratio and jet operating conditions. The flowfield solutions from the Reynolds-Averaged Navier-Stokes (RANS) code Overflow 2.2e were used to pre-screen experimental models for a future test in the Aero-Acoustic Propulsion Laboratory (AAPL) at the NASA Glenn Research Center (GRC). Flowfield solutions were considered in conjunction with the jet-noise-prediction code JeNo to screen the design concepts. A two-stream versus three-stream computation based on equal mass flow rates showed a reduction in peak turbulent kinetic energy (TKE) for the three-stream jet relative to that for the two-stream jet which resulted in reduced acoustic emission. Additional three-stream solutions were analyzed for salient flowfield features expected to impact farfield noise. As tertiary power settings were increased there was a corresponding near nozzle increase in shear rate that resulted in an increase in high frequency noise and a reduction in peak TKE. As tertiary-to-core area ratio was increased the tertiary potential core elongated and the peak TKE was reduced. The most noticeable change occurred as secondary-to-core area ratio was increased thickening the secondary potential core, elongating the primary potential core and reducing peak TKE. As forward flight Mach number was increased the jet plume region decreased and reduced peak TKE.

  11. Evaluation of stream crossing methods prior to gas pipeline construction

    International Nuclear Information System (INIS)

    Murphy, M.H.; Rogers, J.S.; Ricca, A.

    1995-01-01

    Stream surveys are conducted along proposed gas pipeline routes prior to construction to assess potential impacts to stream ecosystems and to recommend preferred crossing methods. Recently, there has been a high level of scrutiny from the Public Service Commission (PSC) to conduct these stream crossings with minimal effects to the aquatic community. PSC's main concern is the effect of sediment on aquatic biota. Smaller, low flowing or intermittent streams are generally crossed using a wet crossing technique. This technique involves digging a trench for the pipeline while the stream is flowing. Sediment control measures are used to reduce sediment loads downstream. Wider, faster flowing, or protected streams are typically crossed with a dry crossing technique. A dry crossing involves placing a barrier upstream of the crossing and diverting the water around the crossing location. The pipeline trench is then dug in the dry area. O'Brien and Gere and NYSEG have jointly designed a modified wet crossing for crossing streams that exceed maximum flows for a dry crossing, and are too wide for a typical wet crossing. This method diverts water around the crossing using a pumping system, instead of constructing a dam. The trench is similar to a wet crossing, with sediment control devices in place upstream and downstream. If streams are crossed during low flow periods, the pumping system will be able to reduce the majority of water flow and volume form the crossing area, thereby reducing ecological impacts. Evaluation of effects of this crossing type on the stream biota are currently proposed and may proceed when construction begins

  12. Frequency effects on the scale and behavior of acoustic streaming.

    Science.gov (United States)

    Dentry, Michael B; Yeo, Leslie Y; Friend, James R

    2014-01-01

    Acoustic streaming underpins an exciting range of fluid manipulation phenomena of rapidly growing significance in microfluidics, where the streaming often assumes the form of a steady, laminar jet emanating from the device surface, driven by the attenuation of acoustic energy within the beam of sound propagating through the liquid. The frequencies used to drive such phenomena are often chosen ad hoc to accommodate fabrication and material issues. In this work, we seek a better understanding of the effects of sound frequency and power on acoustic streaming. We present and, using surface acoustic waves, experimentally verify a laminar jet model that is based on the turbulent jet model of Lighthill, which is appropriate for acoustic streaming seen at micro- to nanoscales, between 20 and 936 MHz and over a broad range of input power. Our model eliminates the critically problematic acoustic source singularity present in Lighthill's model, replacing it with a finite emission area and enabling determination of the streaming velocity close to the source. At high acoustic power P (and hence high jet Reynolds numbers ReJ associated with fast streaming), the laminar jet model predicts a one-half power dependence (U∼P1/2∼ ReJ) similar to the turbulent jet model. However, the laminar model may also be applied to jets produced at low powers-and hence low jet Reynolds numbers ReJ-where a linear relationship between the beam power and streaming velocity exists: U∼P∼ReJ2. The ability of the laminar jet model to predict the acoustic streaming behavior across a broad range of frequencies and power provides a useful tool in the analysis of microfluidics devices, explaining peculiar observations made by several researchers in the literature. In particular, by elucidating the effects of frequency on the scale of acoustically driven flows, we show that the choice of frequency is a vitally important consideration in the design of small-scale devices employing acoustic streaming

  13. Stream channel responses and soil loss at off-highway vehicle stream crossings in the Ouachita National Forest

    Science.gov (United States)

    Daniel A. Marion; Jonathan D. Phillips; Chad Yocum; Stephanie H. Mehlhope

    2014-01-01

    This study investigates the geomorphic effects of ford-type stream crossings in an off-highway vehicle (OHV) trail complex in the Ouachita National Forest, Arkansas. At a total of 15 crossing sites, we used a disturbed vs. undisturbed study design to assess soil truncation and an upstream vs. downstream design to assess in-channel effects. The 15 sites ranged from OHV...

  14. Re-Meandering of Lowland Streams

    DEFF Research Database (Denmark)

    Pedersen, Morten Lauge; Kristensen, Klaus Kevin; Friberg, Nikolai

    2014-01-01

    We evaluated the restoration of physical habitats and its influence on macroinvertebrate community structure in 18 Danish lowland streams comprising six restored streams, six streams with little physical alteration and six channelized streams. We hypothesized that physical habitats...... and macroinvertebrate communities of restored streams would resemble those of natural streams, while those of the channelized streams would differ from both restored and near-natural streams. Physical habitats were surveyed for substrate composition, depth, width and current velocity. Macroinvertebrates were sampled...... along 100 m reaches in each stream, in edge habitats and in riffle/run habitats located in the center of the stream. Restoration significantly altered the physical conditions and affected the interactions between stream habitat heterogeneity and macroinvertebrate diversity. The substrate in the restored...

  15. ATLAS Live: Collaborative Information Streams

    Energy Technology Data Exchange (ETDEWEB)

    Goldfarb, Steven [Department of Physics, University of Michigan, Ann Arbor, MI 48109 (United States); Collaboration: ATLAS Collaboration

    2011-12-23

    I report on a pilot project launched in 2010 focusing on facilitating communication and information exchange within the ATLAS Collaboration, through the combination of digital signage software and webcasting. The project, called ATLAS Live, implements video streams of information, ranging from detailed detector and data status to educational and outreach material. The content, including text, images, video and audio, is collected, visualised and scheduled using digital signage software. The system is robust and flexible, utilizing scripts to input data from remote sources, such as the CERN Document Server, Indico, or any available URL, and to integrate these sources into professional-quality streams, including text scrolling, transition effects, inter and intra-screen divisibility. Information is published via the encoding and webcasting of standard video streams, viewable on all common platforms, using a web browser or other common video tool. Authorisation is enforced at the level of the streaming and at the web portals, using the CERN SSO system.

  16. ATLAS Live: Collaborative Information Streams

    International Nuclear Information System (INIS)

    Goldfarb, Steven

    2011-01-01

    I report on a pilot project launched in 2010 focusing on facilitating communication and information exchange within the ATLAS Collaboration, through the combination of digital signage software and webcasting. The project, called ATLAS Live, implements video streams of information, ranging from detailed detector and data status to educational and outreach material. The content, including text, images, video and audio, is collected, visualised and scheduled using digital signage software. The system is robust and flexible, utilizing scripts to input data from remote sources, such as the CERN Document Server, Indico, or any available URL, and to integrate these sources into professional-quality streams, including text scrolling, transition effects, inter and intra-screen divisibility. Information is published via the encoding and webcasting of standard video streams, viewable on all common platforms, using a web browser or other common video tool. Authorisation is enforced at the level of the streaming and at the web portals, using the CERN SSO system.

  17. ATLAS Live: Collaborative Information Streams

    CERN Document Server

    Goldfarb, S; The ATLAS collaboration

    2011-01-01

    I report on a pilot project launched in 2010 focusing on facilitating communication and information exchange within the ATLAS Collaboration, through the combination of digital signage software and webcasting. The project, called ATLAS Live, implements video streams of information, ranging from detailed detector and data status to educational and outreach material. The content, including text, images, video and audio, is collected, visualised and scheduled using digital signage software. The system is robust and flexible, utilizing scripts to input data from remote sources, such as the CERN Document Server, Indico, or any available URL, and to integrate these sources into professional-quality streams, including text scrolling, transition effects, inter and intra-screen divisibility. Information is published via the encoding and webcasting of standard video streams, viewable on all common platforms, using a web browser or other common video tool. Authorisation is enforced at the level of the streaming and at th...

  18. STREAMS - Technology Programme. Yearbook 2003

    International Nuclear Information System (INIS)

    2003-01-01

    The STREAMS Technology Programme addresses municipal waste. Municipal waste is composed of waste from households and small businesses. The programme focuses on five areas Waste prevention, Collection, transportation, and management of waste streams, Waste treatment technologies, Waste recycling into raw materials and new products, Landfill technologies. The development projects of the STREAMS Programme utilize a number of different technologies, such as biotechnology, information technology, materials technology, measurement and analysis, and automation technology. Finnish expertise in materials recycling technologies and related electronics and information technology is extremely high on a worldwide scale even though the companies represent SMEs. Started in 2001, the STREAMS programme has a total volume of 27 million euros, half of which is funded by Tekes. The programme runs through the end of 2004. (author)

  19. Cellular Subcompartments through Cytoplasmic Streaming.

    Science.gov (United States)

    Pieuchot, Laurent; Lai, Julian; Loh, Rachel Ann; Leong, Fong Yew; Chiam, Keng-Hwee; Stajich, Jason; Jedd, Gregory

    2015-08-24

    Cytoplasmic streaming occurs in diverse cell types, where it generally serves a transport function. Here, we examine streaming in multicellular fungal hyphae and identify an additional function wherein regimented streaming forms distinct cytoplasmic subcompartments. In the hypha, cytoplasm flows directionally from cell to cell through septal pores. Using live-cell imaging and computer simulations, we identify a flow pattern that produces vortices (eddies) on the upstream side of the septum. Nuclei can be immobilized in these microfluidic eddies, where they form multinucleate aggregates and accumulate foci of the HDA-2 histone deacetylase-associated factor, SPA-19. Pores experiencing flow degenerate in the absence of SPA-19, suggesting that eddy-trapped nuclei function to reinforce the septum. Together, our data show that eddies comprise a subcellular niche favoring nuclear differentiation and that subcompartments can be self-organized as a consequence of regimented cytoplasmic streaming. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. On-stream analysis systems

    International Nuclear Information System (INIS)

    Howarth, W.J.; Watt, J.S.

    1982-01-01

    An outline of some commercially available on-stream analysis systems in given. Systems based on x-ray tube/crystal spectrometers, scintillation detectors, proportional detectors and solid-state detectors are discussed

  1. Stream periphyton responses to mesocosm treatments of ...

    Science.gov (United States)

    A stream mesocosm experiment was designed to compare biotic responses among streams exposed to an equal excess specific conductivity target of 850 µS/cm relative to a control that was set for 200 µS/cm and three treatments comprised of different major ion contents. Each treatment and the control was replicated 4 times at the mesocosm scale (16 mesocosms total). The treatments were based on dosing the background mesocosm water, a continuous flow-through mixture of natural river water and reverse osmosis treated water, with stock salt solutions prepared from 1) a mixture of sodium chloride and calcium chloride (Na/Cl chloride), 2) sodium bicarbonate, and 3) magnesium sulfate. The realized average specific conductance over the first 28d of continuous dosing was 827, 829, and 847 µS/cm, for the chloride, bicarbonate, and sulfate based treatments, respectively, and did not differ significantly. The controls averaged 183 µS/cm. Here we focus on comparing stream periphyton communities across treatments based on measurements obtained from a Pulse-Amplitude Modulated (PAM) fluorometer. The fluorometer is used in situ and with built in algorithms distributes the total aerial algal biomass (µg/cm2) of the periphyton among cyanobacteria, diatoms, and green algae. A measurement is recorded in a matter of seconds and, therefore, many different locations can be measured with in each mesocosm at a high return frequency. Eight locations within each of the 1 m2 (0.3 m W x 3

  2. Alteration of stream temperature by natural and artificial beaver dams.

    Science.gov (United States)

    Weber, Nicholas; Bouwes, Nicolaas; Pollock, Michael M; Volk, Carol; Wheaton, Joseph M; Wathen, Gus; Wirtz, Jacob; Jordan, Chris E

    2017-01-01

    Beaver are an integral component of hydrologic, geomorphic, and biotic processes within North American stream systems, and their propensity to build dams alters stream and riparian structure and function to the benefit of many aquatic and terrestrial species. Recognizing this, beaver relocation efforts and/or application of structures designed to mimic the function of beaver dams are increasingly being utilized as effective and cost-efficient stream and riparian restoration approaches. Despite these verities, the notion that beaver dams negatively impact stream habitat remains common, specifically the assumption that beaver dams increase stream temperatures during summer to the detriment of sensitive biota such as salmonids. In this study, we tracked beaver dam distributions and monitored water temperature throughout 34 km of stream for an eight-year period between 2007 and 2014. During this time the number of natural beaver dams within the study area increased by an order of magnitude, and an additional 4 km of stream were subject to a restoration manipulation that included installing a high-density of Beaver Dam Analog (BDA) structures designed to mimic the function of natural beaver dams. Our observations reveal several mechanisms by which beaver dam development may influence stream temperature regimes; including longitudinal buffering of diel summer temperature extrema at the reach scale due to increased surface water storage, and creation of cool-water channel scale temperature refugia through enhanced groundwater-surface water connectivity. Our results suggest that creation of natural and/or artificial beaver dams could be used to mitigate the impact of human induced thermal degradation that may threaten sensitive species.

  3. nitrogen saturation in stream ecosystems

    OpenAIRE

    Earl, S. R.; Valett, H. M.; Webster, J. R.

    2006-01-01

    The concept of nitrogen (N) saturation has organized the assessment of N loading in terrestrial ecosystems. Here we extend the concept to lotic ecosystems by coupling Michaelis-Menten kinetics and nutrient spiraling. We propose a series of saturation response types, which may be used to characterize the proximity of streams to N saturation. We conducted a series of short-term N releases using a tracer ((NO3)-N-15-N) to measure uptake. Experiments were conducted in streams spanning a gradient ...

  4. Design

    DEFF Research Database (Denmark)

    Volf, Mette

    Design - proces & metode iBog®  er enestående i sit fokus på afmystificering og operationalisering af designprocessens flygtige og komplekse karakter. Udgivelsen går bag om designerens daglige arbejde og giver et indblik i den kreative skabelsesproces, som designeren er en del af. Udover et bredt...... indblik i designerens arbejdsmetoder og designparametre giver Design - proces & metode en række eksempler fra anerkendte designvirksomheder, der gør det muligt at komme helt tæt på designerens virkelighed....

  5. The Morphology of Streams Restored for Market and Nonmarket Purposes: Insights From a Mixed Natural-Social Science Approach

    Science.gov (United States)

    Singh, J.; Doyle, M.; Lave, R.; Robertson, M.

    2015-12-01

    Stream restoration is increasingly driven by compensatory mitigation; impacts to streams associated with typical land development activities must be offset via restoration of streams elsewhere. This policy creates an environment where restored stream 'credits' are traded under market-like conditions, comparable to wetland mitigation, carbon offsets, or endangered species habitat banking. The effect of mitigation on restoration design and construction is unknown. We use geomorphic surveys to quantify the differences between restored and nonrestored streams, and the difference between streams restored for market purposes (compensatory mitigation) from those restored for nonmarket programs. Physical study sites are located in the state of North Carolina, USA. We also analyze the social and political-economic drivers of the stream restoration and mitigation industry using analysis of policy documents and interviews with key personnel including regulators, mitigation bankers, stream designers, and scientists. Restored streams are typically wider, shallower and geomorphically more homogeneous than nonrestored streams. For example, nonrestored streams are typically characterized by more than an order of magnitude variability in radius of curvature and meander wavelength within a single study reach. By contrast, the radius of curvature in many restored streams does not vary for nearly the entire project reach. Streams restored for the mitigation market are typically headwater streams and part of a large, complex of long restored main channels, and many restored tributaries; streams restored for nonmarket purposes are typically shorter and consist of the main channel only. Interviews reveal that social forces shape the morphology of restored streams. Designers integrate many influences including economic and regulatory constraints, but traditions of practice have a large influence as well. Home to a fairly mature stream mitigation banking market, North Carolina can provide

  6. Design

    Science.gov (United States)

    Buchanan, Richard; Cross, Nigel; Durling, David; Nelson, Harold; Owen, Charles; Valtonen, Anna; Boling, Elizabeth; Gibbons, Andrew; Visscher-Voerman, Irene

    2013-01-01

    Scholars representing the field of design were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Richard Buchanan, Nigel Cross, David Durling, Harold Nelson, Charles Owen, and Anna Valtonen. Scholars…

  7. Particulate hot gas stream cleanup technical issues

    Energy Technology Data Exchange (ETDEWEB)

    Pontius, D.H.; Snyder, T.R.

    1999-09-30

    The analyses of hot gas stream cleanup particulate samples and descriptions of filter performance studied under this contract were designed to address problems with filter operation that have been linked to characteristics of the collected particulate matter. One objective of this work was to generate an interactive, computerized data bank of the key physical and chemical characteristics of ash and char collected from operating advanced particle filters and to relate these characteristics to the operation and performance of these filters. The interactive data bank summarizes analyses of over 160 ash and char samples from fifteen pressurized fluidized-bed combustion and gasification facilities utilizing high-temperature, high pressure barrier filters.

  8. Process for humidifying a gaseous fuel stream

    International Nuclear Information System (INIS)

    Sederquist, R. A.

    1985-01-01

    A fuel gas stream for a fuel cell is humidified by a recirculating hot liquid water stream using the heat of condensation from the humidified stream as the heat to vaporize the liquid water. Humidification is accomplished by directly contacting the liquid water with the dry gas stream in a saturator to evaporate a small portion of water. The recirculating liquid water is reheated by direct contact with the humidified gas stream in a condenser, wherein water is condensed into the liquid stream. Between the steps of humidifying and condensing water from the gas stream it passes through the fuel cell and additional water, in the form of steam, is added thereto

  9. An Association-Oriented Partitioning Approach for Streaming Graph Query

    Directory of Open Access Journals (Sweden)

    Yun Hao

    2017-01-01

    Full Text Available The volumes of real-world graphs like knowledge graph are increasing rapidly, which makes streaming graph processing a hot research area. Processing graphs in streaming setting poses significant challenges from different perspectives, among which graph partitioning method plays a key role. Regarding graph query, a well-designed partitioning method is essential for achieving better performance. Existing offline graph partitioning methods often require full knowledge of the graph, which is not possible during streaming graph processing. In order to handle this problem, we propose an association-oriented streaming graph partitioning method named Assc. This approach first computes the rank values of vertices with a hybrid approximate PageRank algorithm. After splitting these vertices with an adapted variant affinity propagation algorithm, the process order on vertices in the sliding window can be determined. Finally, according to the level of these vertices and their association, the partition where the vertices should be distributed is decided. We compare its performance with a set of streaming graph partition methods and METIS, a widely adopted offline approach. The results show that our solution can partition graphs with hundreds of millions of vertices in streaming setting on a large collection of graph datasets and our approach outperforms other graph partitioning methods.

  10. Fish populations in Plynlimon streams

    Directory of Open Access Journals (Sweden)

    D. T. Crisp

    1997-01-01

    Full Text Available In Plynlimon streams, brown trout (Salmo trutta L. are widespread in the upper Wye at population densities of 0.03 to 0.32 fish m-2 and show evidence of successful recruitment in most years. In the upper Severn, brown trout are found only in an area of c. 1670 -2 downstream of Blaenhafren Falls at densities of 0.03 to 0.24 fish -2 and the evidence suggests very variable year to year success in recruitment (Crisp & Beaumont, 1996. Analyses of the data show that temperature differences between afforested and unafforested streams may affect the rates of trout incubation and growth but are not likely to influence species survival. Simple analyses of stream discharge data suggest, but do not prove, that good years for recruitment in the Hafren population were years of low stream discharge. This may be linked to groundwater inputs detected in other studies in this stream. More research is needed to explain the survival of the apparently isolated trout population in the Hafren.

  11. Streaming Compression of Hexahedral Meshes

    Energy Technology Data Exchange (ETDEWEB)

    Isenburg, M; Courbet, C

    2010-02-03

    We describe a method for streaming compression of hexahedral meshes. Given an interleaved stream of vertices and hexahedral our coder incrementally compresses the mesh in the presented order. Our coder is extremely memory efficient when the input stream documents when vertices are referenced for the last time (i.e. when it contains topological finalization tags). Our coder then continuously releases and reuses data structures that no longer contribute to compressing the remainder of the stream. This means in practice that our coder has only a small fraction of the whole mesh in memory at any time. We can therefore compress very large meshes - even meshes that do not file in memory. Compared to traditional, non-streaming approaches that load the entire mesh and globally reorder it during compression, our algorithm trades a less compact compressed representation for significant gains in speed, memory, and I/O efficiency. For example, on the 456k hexahedra 'blade' mesh, our coder is twice as fast and uses 88 times less memory (only 3.1 MB) with the compressed file increasing about 3% in size. We also present the first scheme for predictive compression of properties associated with hexahedral cells.

  12. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  13. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  14. Evidence for fish dispersal from spatial analysis of stream network topology

    Science.gov (United States)

    Hitt, N.P.; Angermeier, P.L.

    2008-01-01

    Developing spatially explicit conservation strategies for stream fishes requires an understanding of the spatial structure of dispersal within stream networks. We explored spatial patterns of stream fish dispersal by evaluating how the size and proximity of connected streams (i.e., stream network topology) explained variation in fish assemblage structure and how this relationship varied with local stream size. We used data from the US Environmental Protection Agency's Environmental Monitoring and Assessment Program in wadeable streams of the Mid-Atlantic Highlands region (n = 308 sites). We quantified stream network topology with a continuous analysis based on the rate of downstream flow accumulation from sites and with a discrete analysis based on the presence of mainstem river confluences (i.e., basin area >250 km2) within 20 fluvial km (fkm) from sites. Continuous variation in stream network topology was related to local species richness within a distance of ???10 fkm, suggesting an influence of fish dispersal within this spatial grain. This effect was explained largely by catostomid species, cyprinid species, and riverine species, but was not explained by zoogeographic regions, ecoregions, sampling period, or spatial autocorrelation. Sites near mainstem river confluences supported greater species richness and abundance of catostomid, cyprinid, and ictalurid fishes than did sites >20 fkm from such confluences. Assemblages at sites on the smallest streams were not related to stream network topology, consistent with the hypothesis that local stream size regulates the influence of regional dispersal. These results demonstrate that the size and proximity of connected streams influence the spatial distribution of fish and suggest that these influences can be incorporated into the designs of stream bioassessments and reserves to enhance management efficacy. ?? 2008 by The North American Benthological Society.

  15. Effects of Concrete Channels on Stream Biogeochemistry, Maryland Coastal Plain

    Science.gov (United States)

    Prestegaard, K. L.; Gilbert, L.; Phemister, K.

    2005-05-01

    In the 1950's and 60's, extensive networks of cement-lined channels were built in suburban watersheds near Washington, D.C. to convey storm water to downstream locations. These cement-lined stream channels limit interactions between surface and groundwater and they provide sources of alkalinity in Maryland Coastal Plain watersheds that normally have low alkalinity. This project was designed to 1) compare base flow water chemistry in headwater reaches of urban and non-urban streams, and 2) to evaluate downstream changes in water chemistry in channelized urban streams in comparison with non-urban reference streams. During a drought year, headwater streams in both urban and non-urban sites had significant concentrations of Fe(II) that were discharged from groundwater sources and rapidly oxidized by iron-oxidizing bacteria. During a wet year, the concentrations of Fe(II) were higher in headwater urban streams than in the non-urban streams. This suggests that impervious surfaces in headwater urban watersheds prevent the recharge of oxygen-rich waters during storm events, which maintains iron-rich groundwater discharge to the stream. Downstream changes in water chemistry are prominent in cement-lined urban channels because they are associated with distinctive microbial communities. The headwater zones of channelized streams are dominated by iron-ozidizing bacteria, that are replaced downstream by manganese-oxidizing zones, and replaced further downstream by biofilms dominated by photosynthesizing cyanobacteria. The reaches dominated by cyanobacteria exhibit diurnal changes in pH due to uptake of CO2 for photosynthesis. Diurnal changes range from 7.5 to 8.8 in the summer months to 7.0 to 7.5 in the cooler months, indicating both the impact of photosynthesis and the additional source of alkalinity provided by concrete. The dissolved oxygen, pH, and other characteristics of tributaries dominated by cyanobacteria are similar to the water chemistry characteristics observed in

  16. Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Pettiway, Keon

    2017-01-01

    In this chapter, Ole B. Jensen takes a situational approach to mobilities to examine how ordinary life activities are structured by technology and design. Using “staging mobilities” as a theoretical approach, Jensen considers mobilities as overlapping, actions, interactions and decisions by desig...... by providing ideas about future research for investigating mobilities in situ as a kind of “staging,” which he notes is influenced by the “material turn” in social sciences....... with a brief description of how movement is studied within social sciences after the “mobilities turn” versus the idea of physical movement in transport geography and engineering. He then explains how “mobilities design” was derived from connections between traffic and architecture. Jensen concludes...

  17. ATLAS Live: Collaborative Information Streams

    CERN Document Server

    Goldfarb, S; The ATLAS collaboration

    2010-01-01

    I report on a pilot project launched in 2010 focusing on facilitating communication and information exchange within the ATLAS Collaboration, through the combination of digital signage software and webcasting. The project, called ATLAS Live, implements video streams of information, ranging from detailed detector and data status to educational and outreach material. The content, including text, images, video and audio, is collected, visualised and scheduled using the SCALA digital signage software system. The system is robust and flexible, allowing for the usage of scripts to input data from remote sources, such as the CERN Document Server, Indico, or any available URL, and to integrate these sources into professional-quality streams, including text scrolling, transition effects, inter and intrascreen divisibility. The video is made available to the collaboration or public through the encoding and webcasting of standard video streams, viewable on all common platforms, using a web browser or other common video t...

  18. Streaming simplification of tetrahedral meshes.

    Science.gov (United States)

    Vo, Huy T; Callahan, Steven P; Lindstrom, Peter; Pascucci, Valerio; Silva, Cláudio T

    2007-01-01

    Unstructured tetrahedral meshes are commonly used in scientific computing to represent scalar, vector, and tensor fields in three dimensions. Visualization of these meshes can be difficult to perform interactively due to their size and complexity. By reducing the size of the data, we can accomplish real-time visualization necessary for scientific analysis. We propose a two-step approach for streaming simplification of large tetrahedral meshes. Our algorithm arranges the data on disk in a streaming, I/O-efficient format that allows coherent access to the tetrahedral cells. A quadric-based simplification is sequentially performed on small portions of the mesh in-core. Our output is a coherent streaming mesh which facilitates future processing. Our technique is fast, produces high quality approximations, and operates out-of-core to process meshes too large for main memory.

  19. Interactive real-time media streaming with reliable communication

    Science.gov (United States)

    Pan, Xunyu; Free, Kevin M.

    2014-02-01

    Streaming media is a recent technique for delivering multimedia information from a source provider to an end- user over the Internet. The major advantage of this technique is that the media player can start playing a multimedia file even before the entire file is transmitted. Most streaming media applications are currently implemented based on the client-server architecture, where a server system hosts the media file and a client system connects to this server system to download the file. Although the client-server architecture is successful in many situations, it may not be ideal to rely on such a system to provide the streaming service as users may be required to register an account using personal information in order to use the service. This is troublesome if a user wishes to watch a movie simultaneously while interacting with a friend in another part of the world over the Internet. In this paper, we describe a new real-time media streaming application implemented on a peer-to-peer (P2P) architecture in order to overcome these challenges within a mobile environment. When using the peer-to-peer architecture, streaming media is shared directly between end-users, called peers, with minimal or no reliance on a dedicated server. Based on the proposed software pɛvμa (pronounced [revma]), named for the Greek word meaning stream, we can host a media file on any computer and directly stream it to a connected partner. To accomplish this, pɛvμa utilizes the Microsoft .NET Framework and Windows Presentation Framework, which are widely available on various types of windows-compatible personal computers and mobile devices. With specially designed multi-threaded algorithms, the application can stream HD video at speeds upwards of 20 Mbps using the User Datagram Protocol (UDP). Streaming and playback are handled using synchronized threads that communicate with one another once a connection is established. Alteration of playback, such as pausing playback or tracking to a

  20. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  1. Estimated vapor pressure for WTP process streams

    Energy Technology Data Exchange (ETDEWEB)

    Pike, J. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Poirier, M. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-01-01

    Design assumptions during the vacuum refill phase of the Pulsed Jet Mixers (PJMs) in the Hanford Waste Treatment and Immobilization Plant (WTP) equate the vapor pressure of all process streams to that of water when calculating the temperature at which the vacuum refill is reduced or eliminated. WTP design authority asked the authors to assess this assumption by performing calculations on proposed feed slurries to calculate the vapor pressure as a function of temperature. The vapor pressure was estimated for each WTP waste group. The vapor pressure suppression caused by dissolved solids is much greater than the increase caused by organic components such that the vapor pressure for all of the waste group compositions is less than that of pure water. The vapor pressure for each group at 145°F ranges from 81% to 98% of the vapor pressure of water. If desired, the PJM could be operated at higher temperatures for waste groups with high dissolved solids that suppress vapor pressure. The SO4 group with the highest vapor pressure suppression could be operated up to 153°F before reaching the same vapor pressure of water at 145°F. However, most groups would reach equivalent vapor pressure at 147 to 148°F. If any of these waste streams are diluted, the vapor pressure can exceed the vapor pressure of water at mass dilution ratios greater than 10, but the overall effect is less than 0.5%.

  2. Pollutant transport in natural streams

    International Nuclear Information System (INIS)

    Buckner, M.R.; Hayes, D.W.

    1975-01-01

    A mathematical model has been developed to estimate the downstream effect of chemical and radioactive pollutant releases to tributary streams and rivers. The one-dimensional dispersion model was employed along with a dead zone model to describe stream transport behavior. Options are provided for sorption/desorption, ion exchange, and particle deposition in the river. The model equations are solved numerically by the LODIPS computer code. The solution method was verified by application to actual and simulated releases of radionuclides and other chemical pollutants. (U.S.)

  3. Temperature of the Gulf Stream

    Science.gov (United States)

    2002-01-01

    The Gulf Stream is one of the strong ocean currents that carries warm water from the sunny tropics to higher latitudes. The current stretches from the Gulf of Mexico up the East Coast of the United States, departs from North America south of the Chesapeake Bay, and heads across the Atlantic to the British Isles. The water within the Gulf Stream moves at the stately pace of 4 miles per hour. Even though the current cools as the water travels thousands of miles, it remains strong enough to moderate the Northern European climate. The image above was derived from the infrared measurements of the Moderate-resolution Imaging Spectroradiometer (MODIS) on a nearly cloud-free day over the east coast of the United States. The coldest waters are shown as purple, with blue, green, yellow, and red representing progressively warmer water. Temperatures range from about 7 to 22 degrees Celsius. The core of the Gulf Stream is very apparent as the warmest water, dark red. It departs from the coast at Cape Hatteras, North Carolina. The cool, shelf water from the north entrains the warmer outflows from the Chesapeake and Delaware Bays. The north wall of the Gulf Stream reveals very complex structure associated with frontal instabilities that lead to exchanges between the Gulf Stream and inshore waters. Several clockwise-rotating warm core eddies are evident north of the core of the Gulf Stream, which enhance the exchange of heat and water between the coastal and deep ocean. Cold core eddies, which rotate counter clockwise, are seen south of the Gulf Stream. The one closest to Cape Hatteras is entraining very warm Gulf Stream waters on its northwest circumference. Near the coast, shallower waters have warmed due to solar heating, while the deeper waters offshore are markedly cooler (dark blue). MODIS made this observation on May 8, 2000, at 11:45 a.m. EDT. For more information, see the MODIS-Ocean web page. The sea surface temperature image was created at the University of Miami using

  4. Measuring nutrient spiralling in streams

    Energy Technology Data Exchange (ETDEWEB)

    Newbold, J D; Elwood, J W; O' Neill, R V; Van Winkle, W

    1981-01-01

    Nutrient cycling in streams involves some downstream transport before the cycle is completed. Thus, the path traveled by a nutrient atom in passing through the cycle can be visualized as a spiral. As an index of the spiralling process, we introduce spiralling length, defined as the average distance associated with one complete cycle of a nutrient atom. This index provides a measure of the utilization of nutrients relative to the available supply from upstream. Using /sup 32/p as a tracer, we estimated a spiralling length of 193 m for phosphorus in a small woodland stream.

  5. Stream-processing pipelines: processing of streams on multiprocessor architecture

    NARCIS (Netherlands)

    Kavaldjiev, N.K.; Smit, Gerardus Johannes Maria; Jansen, P.G.

    In this paper we study the timing aspects of the operation of stream-processing applications that run on a multiprocessor architecture. Dependencies are derived for the processing and communication times of the processors in such a system. Three cases of real-time constrained operation and four

  6. CAMS: OLAPing Multidimensional Data Streams Efficiently

    Science.gov (United States)

    Cuzzocrea, Alfredo

    In the context of data stream research, taming the multidimensionality of real-life data streams in order to efficiently support OLAP analysis/mining tasks is a critical challenge. Inspired by this fundamental motivation, in this paper we introduce CAMS (C ube-based A cquisition model for M ultidimensional S treams), a model for efficiently OLAPing multidimensional data streams. CAMS combines a set of data stream processing methodologies, namely (i) the OLAP dimension flattening process, which allows us to obtain dimensionality reduction of multidimensional data streams, and (ii) the OLAP stream aggregation scheme, which aggregates data stream readings according to an OLAP-hierarchy-based membership approach. We complete our analytical contribution by means of experimental assessment and analysis of both the efficiency and the scalability of OLAPing capabilities of CAMS on synthetic multidimensional data streams. Both analytical and experimental results clearly connote CAMS as an enabling component for next-generation Data Stream Management Systems.

  7. Salamander occupancy in headwater stream networks

    Science.gov (United States)

    Grant, E.H.C.; Green, L.E.; Lowe, W.H.

    2009-01-01

    1. Stream ecosystems exhibit a highly consistent dendritic geometry in which linear habitat units intersect to create a hierarchical network of connected branches. 2. Ecological and life history traits of species living in streams, such as the potential for overland movement, may interact with this architecture to shape patterns of occupancy and response to disturbance. Specifically, large-scale habitat alteration that fragments stream networks and reduces connectivity may reduce the probability a stream is occupied by sensitive species, such as stream salamanders. 3. We collected habitat occupancy data on four species of stream salamanders in first-order (i.e. headwater) streams in undeveloped and urbanised regions of the eastern U.S.A. We then used an information-theoretic approach to test alternative models of salamander occupancy based on a priori predictions of the effects of network configuration, region and salamander life history. 4. Across all four species, we found that streams connected to other first-order streams had higher occupancy than those flowing directly into larger streams and rivers. For three of the four species, occupancy was lower in the urbanised region than in the undeveloped region. 5. These results demonstrate that the spatial configuration of stream networks within protected areas affects the occurrences of stream salamander species. We strongly encourage preservation of network connections between first-order streams in conservation planning and management decisions that may affect stream species.

  8. Environmental Characteristics and Geographic Information System Applications for the Development of Nutrient Thresholds in Oklahoma Streams

    Science.gov (United States)

    Masoner, Jason R.; Haggard, Brian E.; Rea, Alan

    2002-01-01

    The U.S.Environmental Protection Agency has developed nutrient criteria using ecoregions to manage and protect rivers and streams in the United States. Individual states and tribes are encouraged by the U.S. Environmental Protection Agency to modify or improve upon the ecoregion approach. The Oklahoma Water Resources Board uses a dichotomous process that stratifies streams using environmental characteristics such as stream order and stream slope. This process is called the Use Support Assessment Protocols, subchapter15. The Use Support Assessment Protocols can be used to identify streams threatened by excessive amounts of nutrients, dependant upon a beneficial use designation for each stream. The Use Support Assessment Protocols, subchapter 15 uses nutrient and environmental characteristic thresholds developed from a study conducted in the Netherlands, but the Oklahoma Water Resources Board wants to modify the thresholds to reflect hydrologic and ecological conditions relevant to Oklahoma streams and rivers. Environmental characteristics thought to affect impairment from nutrient concentrations in Oklahoma streams and rivers were determined for 798 water-quality sites in Oklahoma. Nutrient, chlorophyll, water-properties, and location data were retrieved from the U.S. Environmental Protection Agency STORET database including data from the U.S. Geological Survey, Oklahoma Conservation Commission, and Oklahoma Water Resources Board. Drainage-basin area, stream order, stream slope, and land-use proportions were determined for each site using a Geographic Information System. The methods, procedures, and data sets used to determine the environmental characteristics are described.

  9. DataCell: Exploiting the Power of Relational Databases for Efficient Stream Processing

    NARCIS (Netherlands)

    E. Liarou (Erietta); M.L. Kersten (Martin)

    2009-01-01

    htmlabstractDesigned for complex event processing, DataCell is a research prototype database system in the area of sensor stream systems. Under development at CWI, it belongs to the MonetDB database system family. CWI researchers innovatively built a stream engine directly on top of a database

  10. Headwater stream temperature: interpreting response after logging, with and without riparian buffers, Washington, USA

    Science.gov (United States)

    Jack E. Janisch; Steven M. Wondzell; William J. Ehinger

    2012-01-01

    We examined stream temperature response to forest harvest in small forested headwater catchments in western Washington, USA over a seven year period (2002-2008). These streams have very low discharge in late summer and many become spatially intermittent. We used a before-after, control-impact (BACl) study design to contrast the effect of clearcut logging with two...

  11. SP@CE - An SP-based programming model for consumer electronics streaming applications

    NARCIS (Netherlands)

    Varbanescu, Ana Lucia; Nijhuis, Maik; Escribano, Arturo González; Sips, Henk; Bos, Herbert; Bal, Henri

    2007-01-01

    Efficient programming of multimedia streaming applications for Consumer Electronics (CE) devices is not trivial. As a solution for this problem, we present SP@CE, a novel programming model designed to balance the specific requirements of CE streaming applications with the simplicity and efficiency

  12. Morphodynamic effects of riparian vegetation growth after stream restoration

    NARCIS (Netherlands)

    Vargas-Luna, Andrés; Crosato, Alessandra; Anders, Niels; Hoitink, Antonius J.F.; Keesstra, Saskia D.; Uijttewaal, Wim S.J.

    2018-01-01

    The prediction of the morphological evolution of renaturalized streams is important for the success of restoration projects. Riparian vegetation is a key component of the riverine landscape and is therefore essential for the natural rehabilitation of rivers. This complicates the design of

  13. Streaming of Continuous Media for Distance Education Systems

    Science.gov (United States)

    Dashti, Ali; Safar, Maytham

    2007-01-01

    Distance education created new challenges regarding the delivery of large size isochronous continuous streaming media (SM) objects. In this paper, we consider the design of a framework for customized SM presentations, where each presentation consists of a number of SM objects that should be retrieved and displayed to the user in a coherent…

  14. 244-AR vault cooling water stream-specific report

    International Nuclear Information System (INIS)

    1990-08-01

    The proposed wastestream designation for the 244-AR Vault cooling water wastestream is that this stream is not a dangerous waste, pursuant to the Washington (State) Administration Code (WAC) 173-303, Dangerous Waste Regulations. A combination of process knowledge and sampling data was used to make this determination. 21 refs., 6 figs., 7 tabs

  15. Design of an image encryption scheme based on a multiple chaotic map

    Science.gov (United States)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  16. Analysis of streaming media systems

    NARCIS (Netherlands)

    Lu, Y.

    2010-01-01

    Multimedia services have been popping up at tremendous speed in recent years. A large number of these multimedia streaming systems are introduced to the consumer market. Internet Service Providers, Telecommunications Operators, Service/Content Providers, and end users are interested in the

  17. Stretch-minimising stream surfaces

    KAUST Repository

    Barton, Michael; Kosinka, Jin; Calo, Victor M.

    2015-01-01

    We study the problem of finding stretch-minimising stream surfaces in a divergence-free vector field. These surfaces are generated by motions of seed curves that propagate through the field in a stretch minimising manner, i.e., they move without stretching or shrinking, preserving the length of their arbitrary arc. In general fields, such curves may not exist. How-ever, the divergence-free constraint gives rise to these 'stretch-free' curves that are locally arc-length preserving when infinitesimally propagated. Several families of stretch-free curves are identified and used as initial guesses for stream surface generation. These surfaces are subsequently globally optimised to obtain the best stretch-minimising stream surfaces in a given divergence-free vector field. Our algorithm was tested on benchmark datasets, proving its applicability to incompressible fluid flow simulations, where our stretch-minimising stream surfaces realistically reflect the flow of a flexible univariate object. © 2015 Elsevier Inc. All rights reserved.

  18. Stretch-minimising stream surfaces

    KAUST Repository

    Barton, Michael

    2015-05-01

    We study the problem of finding stretch-minimising stream surfaces in a divergence-free vector field. These surfaces are generated by motions of seed curves that propagate through the field in a stretch minimising manner, i.e., they move without stretching or shrinking, preserving the length of their arbitrary arc. In general fields, such curves may not exist. How-ever, the divergence-free constraint gives rise to these \\'stretch-free\\' curves that are locally arc-length preserving when infinitesimally propagated. Several families of stretch-free curves are identified and used as initial guesses for stream surface generation. These surfaces are subsequently globally optimised to obtain the best stretch-minimising stream surfaces in a given divergence-free vector field. Our algorithm was tested on benchmark datasets, proving its applicability to incompressible fluid flow simulations, where our stretch-minimising stream surfaces realistically reflect the flow of a flexible univariate object. © 2015 Elsevier Inc. All rights reserved.

  19. Nuclear reactor cavity streaming shield

    International Nuclear Information System (INIS)

    Klotz, R.J.; Stephen, D.W.

    1978-01-01

    The upper portion of a nuclear reactor vessel supported in a concrete reactor cavity has a structure mounted below the top of the vessel between the outer vessel wall and the reactor cavity wall which contains hydrogenous material which will attenuate radiation streaming upward between vessel and the reactor cavity wall while preventing pressure buildup during a loss of coolant accident

  20. Video Streaming in Online Learning

    Science.gov (United States)

    Hartsell, Taralynn; Yuen, Steve Chi-Yin

    2006-01-01

    The use of video in teaching and learning is a common practice in education today. As learning online becomes more of a common practice in education, streaming video and audio will play a bigger role in delivering course materials to online learners. This form of technology brings courses alive by allowing online learners to use their visual and…

  1. Continuous sampling from distributed streams

    DEFF Research Database (Denmark)

    Graham, Cormode; Muthukrishnan, S.; Yi, Ke

    2012-01-01

    A fundamental problem in data management is to draw and maintain a sample of a large data set, for approximate query answering, selectivity estimation, and query planning. With large, streaming data sets, this problem becomes particularly difficult when the data is shared across multiple distribu......A fundamental problem in data management is to draw and maintain a sample of a large data set, for approximate query answering, selectivity estimation, and query planning. With large, streaming data sets, this problem becomes particularly difficult when the data is shared across multiple...... distributed sites. The main challenge is to ensure that a sample is drawn uniformly across the union of the data while minimizing the communication needed to run the protocol on the evolving data. At the same time, it is also necessary to make the protocol lightweight, by keeping the space and time costs low...... for each participant. In this article, we present communication-efficient protocols for continuously maintaining a sample (both with and without replacement) from k distributed streams. These apply to the case when we want a sample from the full streams, and to the sliding window cases of only the W most...

  2. Aeroacoustics of Three-Stream Jets

    Science.gov (United States)

    Henderson, Brenda S.

    2012-01-01

    Results from acoustic measurements of noise radiated from a heated, three-stream, co-annular exhaust system operated at subsonic conditions are presented. The experiments were conducted for a range of core, bypass, and tertiary stream temperatures and pressures. The nozzle system had a fan-to-core area ratio of 2.92 and a tertiary-to-core area ratio of 0.96. The impact of introducing a third stream on the radiated noise for third-stream velocities below that of the bypass stream was to reduce high frequency noise levels at broadside and peak jet-noise angles. Mid-frequency noise radiation at aft observation angles was impacted by the conditions of the third stream. The core velocity had the greatest impact on peak noise levels and the bypass-to-core mass flow ratio had a slight impact on levels in the peak jet-noise direction. The third-stream jet conditions had no impact on peak noise levels. Introduction of a third jet stream in the presence of a simulated forward-flight stream limits the impact of the third stream on radiated noise. For equivalent ideal thrust conditions, two-stream and three-stream jets can produce similar acoustic spectra although high-frequency noise levels tend to be lower for the three-stream jet.

  3. Using Video to Communicate Scientific Findings -- Habitat Connections in Urban Streams

    Science.gov (United States)

    Harned, D. A.; Moorman, M.; Fitzpatrick, F. A.; McMahon, G.

    2011-12-01

    The U.S Geological Survey (USGS) National Water-Quality Assessment Program (NAWQA) provides information about (1) water-quality conditions and how those conditions vary locally, regionally, and nationally, (2) water-quality trends, and (3) factors that affect those conditions. As part of the NAWQA Program, the Effects of Urbanization on Stream Ecosystems (EUSE) study examined the vulnerability and resilience of streams to urbanization. Completion of the EUSE study has resulted in over 20 scientific publications. Video podcasts are being used in addition to these publications to communicate the relevance of these scientific findings to more general audiences such as resource managers, educational groups, public officials, and the general public. An example of one of the podcasts is a film examining effects of urbanization on stream habitat. "Habitat Connections in Urban Streams" explores how urbanization changes some of the physical features that provide in-stream habitat and examines examples of stream restoration projects designed to improve stream form and function. The "connections" theme is emphasized, including the connection of in-stream habitats from the headwaters to the stream mouth; connections between stream habitat and the surrounding floodplains, wetlands and basin; and connections between streams and people-- resource managers, public officials, scientists, and the general public. Examples of innovative stream restoration projects in Baltimore Maryland; Milwaukee, Wisconsin; and Portland Oregon are shown with interviews of managers, engineers, scientists, and others describing the projects. The film is combined with a website with links to extended film versions of the stream-restoration project interviews. The website and films are an example of USGS efforts aimed at improving science communication to a general audience. The film is available for access from the EUSE website: http://water.usgs.gov/nawqa/urban/html/podcasts.html. Additional films are

  4. Streaming Visual Analytics Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    Cook, Kristin A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burtner, Edwin R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kritzstein, Brian P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Brisbois, Brooke R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mitson, Anna E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-31

    How can we best enable users to understand complex emerging events and make appropriate assessments from streaming data? This was the central question addressed at a three-day workshop on streaming visual analytics. This workshop was organized by Pacific Northwest National Laboratory for a government sponsor. It brought together forty researchers and subject matter experts from government, industry, and academia. This report summarizes the outcomes from that workshop. It describes elements of the vision for a streaming visual analytic environment and set of important research directions needed to achieve this vision. Streaming data analysis is in many ways the analysis and understanding of change. However, current visual analytics systems usually focus on static data collections, meaning that dynamically changing conditions are not appropriately addressed. The envisioned mixed-initiative streaming visual analytics environment creates a collaboration between the analyst and the system to support the analysis process. It raises the level of discourse from low-level data records to higher-level concepts. The system supports the analyst’s rapid orientation and reorientation as situations change. It provides an environment to support the analyst’s critical thinking. It infers tasks and interests based on the analyst’s interactions. The system works as both an assistant and a devil’s advocate, finding relevant data and alerts as well as considering alternative hypotheses. Finally, the system supports sharing of findings with others. Making such an environment a reality requires research in several areas. The workshop discussions focused on four broad areas: support for critical thinking, visual representation of change, mixed-initiative analysis, and the use of narratives for analysis and communication.

  5. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  6. A recirculating stream aquarium for ecological studies.

    Science.gov (United States)

    Gordon H. Reeves; Fred H. Everest; Carl E. McLemore

    1983-01-01

    Investigations of the ecological behavior of fishes often require studies in both natural and artificial stream environments. We describe a large, recirculating stream aquarium and its controls, constructed for ecological studies at the Forestry Sciences Laboratory in Corvallis.

  7. Comparison of active and passive stream restoration

    DEFF Research Database (Denmark)

    Kristensen, Esben Astrup; Thodsen, Hans; Dehli, Bjarke

    2013-01-01

    Modification and channelization of streams and rivers have been conducted extensively throughout the world during the past century. Subsequently, much effort has been directed at re-creating the lost habitats and thereby improving living conditions for aquatic organisms. However, as restoration...... methods are plentiful, it is difficult to determine which one to use to get the anticipated result. The aim of this study was to compare two commonly used methods in small Danish streams to improve the physical condition: re-meandering and passive restoration through cease of maintenance. Our...... investigation included measurement of the physical conditions in 29 stream reaches covering four different groups: (1) re-meandered streams, (2) LDC streams (the least disturbed streams available), (3) passively restored streams (>10 years stop of aintenance) and (4) channelized and non-restored streams. The in...

  8. Cytoplasmic Streaming in the Drosophila Oocyte.

    Science.gov (United States)

    Quinlan, Margot E

    2016-10-06

    Objects are commonly moved within the cell by either passive diffusion or active directed transport. A third possibility is advection, in which objects within the cytoplasm are moved with the flow of the cytoplasm. Bulk movement of the cytoplasm, or streaming, as required for advection, is more common in large cells than in small cells. For example, streaming is observed in elongated plant cells and the oocytes of several species. In the Drosophila oocyte, two stages of streaming are observed: relatively slow streaming during mid-oogenesis and streaming that is approximately ten times faster during late oogenesis. These flows are implicated in two processes: polarity establishment and mixing. In this review, I discuss the underlying mechanism of streaming, how slow and fast streaming are differentiated, and what we know about the physiological roles of the two types of streaming.

  9. Stream Tables and Watershed Geomorphology Education.

    Science.gov (United States)

    Lillquist, Karl D.; Kinner, Patricia W.

    2002-01-01

    Reviews copious stream tables and provides a watershed approach to stream table exercises. Results suggest that this approach to learning the concepts of fluvial geomorphology is effective. (Contains 39 references.) (DDR)

  10. The effects of road crossings on prairie stream habitat and function

    Science.gov (United States)

    Bouska, Wesley W.; Keane, Timothy; Paukert, Craig P.

    2010-01-01

    Improperly designed stream crossing structures may alter the form and function of stream ecosystems and habitat and prohibit the movement of aquatic organisms. Stream sections adjoining five concrete box culverts, five low-water crossings (concrete slabs vented by one or multiple culverts), and two large, single corrugated culvert vehicle crossings in eastern Kansas streams were compared to reference reaches using a geomorphologic survey and stream classification. Stream reaches were also compared upstream and downstream of crossings, and crossing measurements were used to determine which crossing design best mimicked the natural dimensions of the adjoining stream. Four of five low-water crossings, three of five box culverts, and one of two large, single corrugated pipe culverts changed classification from upstream to downstream of the crossings. Mean riffle spacing upstream at low-water crossings (8.6 bankfull widths) was double that of downstream reaches (mean 4.4 bankfull widths) but was similar upstream and downstream of box and corrugated pipe culverts. There also appeared to be greater deposition of fine sediments directly upstream of these designs. Box and corrugated culverts were more similar to natural streams than low-water crossings at transporting water, sediments, and debris during bankfull flows.

  11. Optimized open-flow mixing: insights from microbubble streaming

    Science.gov (United States)

    Rallabandi, Bhargav; Wang, Cheng; Guo, Lin; Hilgenfeldt, Sascha

    2015-11-01

    Microbubble streaming has been developed into a robust and powerful flow actuation technique in microfluidics. Here, we study it as a paradigmatic system for microfluidic mixing under a continuous throughput of fluid (open-flow mixing), providing a systematic optimization of the device parameters in this practically important situation. Focusing on two-dimensional advective stirring (neglecting diffusion), we show through numerical simulation and analytical theory that mixing in steady streaming vortices becomes ineffective beyond a characteristic time scale, necessitating the introduction of unsteadiness. By duty cycling the streaming, such unsteadiness is introduced in a controlled fashion, leading to exponential refinement of the advection structures. The rate of refinement is then optimized for particular parameters of the time modulation, i.e. a particular combination of times for which the streaming is turned ``on'' and ``off''. The optimized protocol can be understood theoretically using the properties of the streaming vortices and the throughput Poiseuille flow. We can thus infer simple design principles for practical open flow micromixing applications, consistent with experiments. Current Address: Mechanical and Aerospace Engineering, Princeton University.

  12. New Splitting Criteria for Decision Trees in Stationary Data Streams.

    Science.gov (United States)

    Jaworski, Maciej; Duda, Piotr; Rutkowski, Leszek; Jaworski, Maciej; Duda, Piotr; Rutkowski, Leszek; Rutkowski, Leszek; Duda, Piotr; Jaworski, Maciej

    2018-06-01

    The most popular tools for stream data mining are based on decision trees. In previous 15 years, all designed methods, headed by the very fast decision tree algorithm, relayed on Hoeffding's inequality and hundreds of researchers followed this scheme. Recently, we have demonstrated that although the Hoeffding decision trees are an effective tool for dealing with stream data, they are a purely heuristic procedure; for example, classical decision trees such as ID3 or CART cannot be adopted to data stream mining using Hoeffding's inequality. Therefore, there is an urgent need to develop new algorithms, which are both mathematically justified and characterized by good performance. In this paper, we address this problem by developing a family of new splitting criteria for classification in stationary data streams and investigating their probabilistic properties. The new criteria, derived using appropriate statistical tools, are based on the misclassification error and the Gini index impurity measures. The general division of splitting criteria into two types is proposed. Attributes chosen based on type- splitting criteria guarantee, with high probability, the highest expected value of split measure. Type- criteria ensure that the chosen attribute is the same, with high probability, as it would be chosen based on the whole infinite data stream. Moreover, in this paper, two hybrid splitting criteria are proposed, which are the combinations of single criteria based on the misclassification error and Gini index.

  13. STREAMFINDER I: A New Algorithm for detecting Stellar Streams

    Science.gov (United States)

    Malhan, Khyati; Ibata, Rodrigo A.

    2018-04-01

    We have designed a powerful new algorithm to detect stellar streams in an automated and systematic way. The algorithm, which we call the STREAMFINDER, is well suited for finding dynamically cold and thin stream structures that may lie along any simple or complex orbits in Galactic stellar surveys containing any combination of positional and kinematic information. In the present contribution we introduce the algorithm, lay out the ideas behind it, explain the methodology adopted to detect streams and detail its workings by running it on a suite of simulations of mock Galactic survey data of similar quality to that expected from the ESA/Gaia mission. We show that our algorithm is able to detect even ultra-faint stream features lying well below previous detection limits. Tests show that our algorithm will be able to detect distant halo stream structures >10° long containing as few as ˜15 members (ΣG ˜ 33.6 mag arcsec-2) in the Gaia dataset.

  14. Cost-efficient enactment of stream processing topologies

    Directory of Open Access Journals (Sweden)

    Christoph Hochreiner

    2017-12-01

    Full Text Available The continuous increase of unbound streaming data poses several challenges to established data stream processing engines. One of the most important challenges is the cost-efficient enactment of stream processing topologies under changing data volume. These data volume pose different loads to stream processing systems whose resource provisioning needs to be continuously updated at runtime. First approaches already allow for resource provisioning on the level of virtual machines (VMs, but this only allows for coarse resource provisioning strategies. Based on current advances and benefits for containerized software systems, we have designed a cost-efficient resource provisioning approach and integrated it into the runtime of the Vienna ecosystem for elastic stream processing. Our resource provisioning approach aims to maximize the resource usage for VMs obtained from cloud providers. This strategy only releases processing capabilities at the end of the VMs minimal leasing duration instead of releasing them eagerly as soon as possible as it is the case for threshold-based approaches. This strategy allows us to improve the service level agreement compliance by up to 25% and a reduction for the operational cost of up to 36%.

  15. Reconfigurable Multicore Architectures for Streaming Applications

    NARCIS (Netherlands)

    Smit, Gerardus Johannes Maria; Kokkeler, Andre B.J.; Rauwerda, G.K.; Jacobs, J.W.M.; Nicolescu, G.; Mosterman, P.J.

    2009-01-01

    This chapter addresses reconfigurable heterogenous and homogeneous multicore system-on-chip (SoC) platforms for streaming digital signal processing applications, also called DSP applications. In streaming DSP applications, computations can be specified as a data flow graph with streams of data items

  16. Stream dynamics: An overview for land managers

    Science.gov (United States)

    Burchard H. Heede

    1980-01-01

    Concepts of stream dynamics are demonstrated through discussion of processes and process indicators; theory is included only where helpful to explain concepts. Present knowledge allows only qualitative prediction of stream behavior. However, such predictions show how management actions will affect the stream and its environment.

  17. Energy from streaming current and potential

    NARCIS (Netherlands)

    Olthuis, Wouter; Schippers, Bob; Eijkel, Jan C.T.; van den Berg, Albert

    2005-01-01

    It is investigated how much energy can be delivered by a streaming current source. A streaming current and subsequent streaming potential originate when double layer charge is transported by hydrodynamic flow. Theory and a network model of such a source is presented and initial experimental results

  18. Maximizing Resource Utilization in Video Streaming Systems

    Science.gov (United States)

    Alsmirat, Mohammad Abdullah

    2013-01-01

    Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…

  19. Olefin Recovery from Chemical Industry Waste Streams

    Energy Technology Data Exchange (ETDEWEB)

    A.R. Da Costa; R. Daniels; A. Jariwala; Z. He; A. Morisato; I. Pinnau; J.G. Wijmans

    2003-11-21

    The objective of this project was to develop a membrane process to separate olefins from paraffins in waste gas streams as an alternative to flaring or distillation. Flaring these streams wastes their chemical feedstock value; distillation is energy and capital cost intensive, particularly for small waste streams.

  20. Academic Self-Concepts in Ability Streams: Considering Domain Specificity and Same-Stream Peers

    Science.gov (United States)

    Liem, Gregory Arief D.; McInerney, Dennis M.; Yeung, Alexander S.

    2015-01-01

    The study examined the relations between academic achievement and self-concepts in a sample of 1,067 seventh-grade students from 3 core ability streams in Singapore secondary education. Although between-stream differences in achievement were large, between-stream differences in academic self-concepts were negligible. Within each stream, levels of…

  1. The long term response of stream flow to climatic warming in headwater streams of interior Alaska

    Science.gov (United States)

    Jeremy B. Jones; Amanda J. Rinehart

    2010-01-01

    Warming in the boreal forest of interior Alaska will have fundamental impacts on stream ecosystems through changes in stream hydrology resulting from upslope loss of permafrost, alteration of availability of soil moisture, and the distribution of vegetation. We examined stream flow in three headwater streams of the Caribou-Poker Creeks Research Watershed (CPCRW) in...

  2. The significance of small streams

    Science.gov (United States)

    Wohl, Ellen

    2017-09-01

    Headwaters, defined here as first- and secondorder streams, make up 70%‒80% of the total channel length of river networks. These small streams exert a critical influence on downstream portions of the river network by: retaining or transmitting sediment and nutrients; providing habitat and refuge for diverse aquatic and riparian organisms; creating migration corridors; and governing connectivity at the watershed-scale. The upstream-most extent of the channel network and the longitudinal continuity and lateral extent of headwaters can be difficult to delineate, however, and people are less likely to recognize the importance of headwaters relative to other portions of a river network. Consequently, headwaters commonly lack the legal protections accorded to other portions of a river network and are more likely to be significantly altered or completely obliterated by land use.

  3. ANOTHER LOOK AT THE EASTERN BANDED STRUCTURE: A STELLAR DEBRIS STREAM AND A POSSIBLE PROGENITOR

    International Nuclear Information System (INIS)

    Grillmair, C. J.

    2011-01-01

    Using the Sloan Digital Sky Survey Data Release 7, we re-examine the Eastern Banded Structure (EBS), a stellar debris stream first discovered in Data Release 5 and more recently detected in velocity space by Schlaufman et al. The visible portion of the stream is 18 0 long, lying roughly in the Galactic Anticenter direction and extending from Hydra to Cancer. At an estimated distance of 9.7 kpc, the stream is ∼170 pc across on the sky. The curvature of the stream implies a fairly eccentric box orbit that passes close to both the Galactic center and to the Sun, making it dynamically distinct from the nearby Monoceros, Anticenter, and GD-1 streams. Within the stream is a relatively strong, 2 0 -wide concentration of stars with a very similar color-magnitude distribution that we designate Hydra I. Given its prominence within the stream and its unusual morphology, we suggest that Hydra I is the last vestige of EBS's progenitor, possibly already unbound or in the final throes of tidal dissolution. Though both Hydra I and the EBS have a relatively high-velocity dispersion, given the comparatively narrow width of the stream and the high frequency of encounters with the bulge and massive constituents of the disk that such an eccentric orbit would entail, we suggest that the progenitor was likely a globular cluster and that both it and the stream have undergone significant heating over time.

  4. Efficient Estimation of Dynamic Density Functions with Applications in Streaming Data

    KAUST Repository

    Qahtan, Abdulhakim Ali Ali

    2016-01-01

    application is to detect outliers in data streams from sensor networks based on the estimated PDF. The method detects outliers accurately and outperforms baseline methods designed for detecting and cleaning outliers in sensor data. The third application

  5. Interplanetary stream magnetism: Kinematic effects

    International Nuclear Information System (INIS)

    Burlaga, L.F.; Barouch, E.

    1976-01-01

    The particle density, and the magnetic field intensity and direction, are calculated for volume elements of the solar wind as a function of the initial magnetic field direction, Phi 0 , and the initial speed gradient, (deltaV/deltaR) 0 . It is assumed that the velocity is constant and radial. These assumptions are approximately valid between approx.0.1 and 1.0 AU for many streams. Time profiles of n, B, and V are calculated for corotating streams, neglecting effects of pressure gradients. The compression and rarefaction of B depend sensitively on Phi 0 . By averaging over a typical stream, it is found that approx.r -2 , whereas does not vary in a simple way, consistent with deep space observations. Changes of field direction may be very large, depending on the initial angle; but when the initial angle at 0.1 Au is such that the base of the field line corotates with the Sun, the spiral angle is the preferred direction at 1 AU. The theory is also applicable to nonstationary flows

  6. Streaming potential of superhydrophobic microchannels.

    Science.gov (United States)

    Park, Hung Mok; Kim, Damoa; Kim, Se Young

    2017-03-01

    For the purpose of gaining larger streaming potential, it has been suggested to employ superhydrophobic microchannels with a large velocity slip. There are two kinds of superhydrophobic surfaces, one having a smooth wall with a large Navier slip coefficient caused by the hydrophobicity of the wall material, and the other having a periodic array of no- shear slots of air pockets embedded in a nonslip wall. The electrokinetic flows over these two superhydrophobic surfaces are modelled using the Navier-Stokes equation and convection-diffusion equations of the ionic species. The Navier slip coefficient of the first kind surfaces and the no-shear slot ratio of the second kind surfaces are similar in the sense that the volumetric flow rate increases as these parameter values increase. However, although the streaming potential increases monotonically with respect to the Navier slip coefficient, it reaches a maximum and afterward decreases as the no-shear ratio increases. The results of the present investigation imply that the characterization of superhydrophobic surfaces employing only the measurement of volumetric flow rate against pressure drop is not appropriate and the fine structure of the superhydrophobic surfaces must be verified before predicting the streaming potential and electrokinetic flows accurately. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Animal models for auditory streaming

    Science.gov (United States)

    Itatani, Naoya

    2017-01-01

    Sounds in the natural environment need to be assigned to acoustic sources to evaluate complex auditory scenes. Separating sources will affect the analysis of auditory features of sounds. As the benefits of assigning sounds to specific sources accrue to all species communicating acoustically, the ability for auditory scene analysis is widespread among different animals. Animal studies allow for a deeper insight into the neuronal mechanisms underlying auditory scene analysis. Here, we will review the paradigms applied in the study of auditory scene analysis and streaming of sequential sounds in animal models. We will compare the psychophysical results from the animal studies to the evidence obtained in human psychophysics of auditory streaming, i.e. in a task commonly used for measuring the capability for auditory scene analysis. Furthermore, the neuronal correlates of auditory streaming will be reviewed in different animal models and the observations of the neurons’ response measures will be related to perception. The across-species comparison will reveal whether similar demands in the analysis of acoustic scenes have resulted in similar perceptual and neuronal processing mechanisms in the wide range of species being capable of auditory scene analysis. This article is part of the themed issue ‘Auditory and visual scene analysis’. PMID:28044022

  8. Three-dimensional microbubble streaming flows

    Science.gov (United States)

    Rallabandi, Bhargav; Marin, Alvaro; Rossi, Massimiliano; Kaehler, Christian; Hilgenfeldt, Sascha

    2014-11-01

    Streaming due to acoustically excited bubbles has been used successfully for applications such as size-sorting, trapping and focusing of particles, as well as fluid mixing. Many of these applications involve the precise control of particle trajectories, typically achieved using cylindrical bubbles, which establish planar flows. Using astigmatic particle tracking velocimetry (APTV), we show that, while this two-dimensional picture is a useful description of the flow over short times, a systematic three-dimensional flow structure is evident over long time scales. We demonstrate that this long-time three-dimensional fluid motion can be understood through asymptotic theory, superimposing secondary axial flows (induced by boundary conditions at the device walls) onto the two-dimensional description. This leads to a general framework that describes three-dimensional flows in confined microstreaming systems, guiding the design of applications that profit from minimizing or maximizing these effects.

  9. Stream-lined Gating Systems with Improved Yield - Dimensioning and Experimental Validation

    DEFF Research Database (Denmark)

    Tiedje, Niels Skat; Skov-Hansen, Søren Peter

    the two types of lay-outs are cast in production. It is shown that flow in the stream-lined lay-out is well controlled and that the quality of the castings is as at least equal to that of castings produced with a traditional lay-out. Further, the yield is improved by 4 % relative to a traditional lay-out.......The paper describes how a stream-lined gating system where the melt is confined and controlled during filling can be designed. Commercial numerical modelling software has been used to compare the stream-lined design with a traditional gating system. These results are confirmed by experiments where...

  10. Global perspectives on the urban stream syndrome

    Science.gov (United States)

    Roy, Allison; Booth, Derek B.; Capps, Krista A.; Smith, Benjamin

    2016-01-01

    Urban streams commonly express degraded physical, chemical, and biological conditions that have been collectively termed the “urban stream syndrome”. The description of the syndrome highlights the broad similarities among these streams relative to their less-impaired counterparts. Awareness of these commonalities has fostered rapid improvements in the management of urban stormwater for the protection of downstream watercourses, but the focus on the similarities among urban streams has obscured meaningful differences among them. Key drivers of stream responses to urbanization can vary greatly among climatological and physiographic regions of the globe, and the differences can be manifested in individual stream channels even through the homogenizing veneer of urban development. We provide examples of differences in natural hydrologic and geologic settings (within similar regions) that can result in different mechanisms of stream ecosystem response to urbanization and, as such, should lead to different management approaches. The idea that all urban streams can be cured using the same treatment is simplistic, but overemphasizing the tremendous differences among natural (or human-altered) systems also can paralyze management. Thoughtful integration of work that recognizes the commonalities of the urban stream syndrome across the globe has benefitted urban stream management. Now we call for a more nuanced understanding of the regional, subregional, and local attributes of any given urban stream and its watershed to advance the physical, chemical, and ecological recovery of these systems.

  11. Neutron streaming analysis of an aqueous self-cooled blanket applied to MARS

    International Nuclear Information System (INIS)

    Varsamis, G.L.; Embrechts, M.J.; Steiner, D.

    1987-01-01

    A novel fusion reactor blanket concept, the Aqueous Self Cooled Blanket concept (ASCB), has recently been proposed. One of the first applications of this concept was to a MARS-like tandem mirror reactor. The design employs spiraling tubes of zircaloy-4 housed in a structural casing made of a vanadium alloy (V-15Cr-5Tl). One potential problem area for this design is the possibility for neutron streaming between the zircaloy tubes. This work examines this potential streaming path using the MCNP Monte Carlo code. The results of the total and the uncollided flux indicate a noticeable streaming effect on the uncollided flux only. An analysis of the energy deposition behind the blanket indicates that this effect is small, and therefore design modifications due to this streaming effect are not anticipated

  12. Streamlining Streaming : Tilläggsfunktioner och dess betydelse för att designa en streamingtjänst

    OpenAIRE

    Mähler, Viktor; Näslund, Erik

    2015-01-01

    Streaming is a big field in todays digitalized society. The streaming market is huge, both in regards to the customer base, but also in regards to different providers and their stakes within this market. But how does the different providers go about in order to provide their users with added value? What does the user prioritize? The purpose of this study is to examine which additional functions can be considered important when designing a streaming service, which in turn will create an added ...

  13. The distribution of copper in stream sediments in an anomalous stream near Steinkopf, Namaqualand

    International Nuclear Information System (INIS)

    De Bruin, D.

    1987-01-01

    Anomalous copper concentrations detected by the regional stream-sediment programme of the Geological Survey was investigated in a stream near Steinkopf, Namaqualand. A follow-up disclosed the presence of malachite mineralization. However, additional stream-sediment samples collected from the 'anomalous' stream revealed an erratic distribution of copper and also that the malachite mineralization had no direct effect on the copper distribution in the stream sediments. Low partial-extraction yields, together with X-ray diffraction analyses, indicated that dispersion is mainly mechanical and that the copper occurs as cations in the lattice of the biotite fraction of the stream sediments. (author). 8 refs., 5 figs., 1 tab

  14. The distribution of copper in stream sediments in an anomalous stream near Steinkopf, Namaqualand

    Energy Technology Data Exchange (ETDEWEB)

    De Bruin, D

    1987-01-01

    Anomalous copper concentrations detected by the regional stream-sediment programme of the Geological Survey was investigated in a stream near Steinkopf, Namaqualand. A follow-up disclosed the presence of malachite mineralization. However, additional stream-sediment samples collected from the 'anomalous' stream revealed an erratic distribution of copper and also that the malachite mineralization had no direct effect on the copper distribution in the stream sediments. Low partial-extraction yields, together with X-ray diffraction analyses, indicated that dispersion is mainly mechanical and that the copper occurs as cations in the lattice of the biotite fraction of the stream sediments. (author). 8 refs., 5 figs., 1 tab.

  15. Evaluation of Secondary Streams in Mixed Waste Treatment

    International Nuclear Information System (INIS)

    Haywood, Fred F.; Goldsmith, William A.; Allen, Douglas F.; Mezga, Lance J.

    1995-12-01

    The United States Department of Energy (DOE) and its predecessors have generated waste containing radioactive and hazardous chemical components (mixed wastes) for over 50 years. Facilities and processes generating these wastes as well as the regulations governing their management have changed. Now, DOE has 49 sites where mixed waste streams exist. The Federal Facility Compliance Act of 1992 (1) required DOE to prepare and obtain regulatory approval of plans for treating these mixed waste streams. Each of the involved DOE sites submitted its respective plan to regulators in April 1995 (2). Most of the individual plans were approved by the respective regulatory agencies in October 1995. The implementation of these plans has begun accordance with compliance instruments (orders) issued by the cognizant regulatory authority. Most of these orders include milestones that are fixed, firm and enforceable as defined in each compliance order. In many cases, mixed waste treatment that was already being carried out and survived the alternative selection process is being used now to treat selected mixed waste streams. For other waste streams at sites throughout the DOE complex treatment methods and schedules are subject to negotiation as the realties of ever decreasing budgets begin to drive the available options. Secondary wastes generated by individual waste treatment systems are also mixed wastes that require treatment in the appropriate treatment system. These secondary wastes may be solid or liquid waste (or both). For example debris washing will generate wastewater requiring treatment; wastewater treatment, in turn, will generate sludge or other residuals requiring treatment; liquid effluents must meet applicable limits of discharge permits. At large DOE sites, secondary waste streams will be a major influence in optimizing design for primary treatment. Understanding these impacts is important not only foe system design, but also for assurances that radiation releases and

  16. Removal of sulfur from process streams

    International Nuclear Information System (INIS)

    Brignac, D.G.

    1984-01-01

    A process wherein water is added to a non-reactive gas stream, preferably a hydrogen or hydrogen-containing gas stream, sufficient to raise the water level thereof to from about 0.2 percent to about 50 percent, based on the total volume of the process gas stream, and the said moist gas stream is contacted, at elevated temperature, with a particulate mass of a sulfur-bearing metal alumina spinel characterized by the formula MAl 2 O 4 , wherein M is chromium, iron, cobalt, nickel, copper, cadmium, mercury, or zinc to desorb sulfur thereon. In the sulfur sorption cycle, due to the simultaneous adsorption of water and sulfur, the useful life of the metal alumina spinel for sulfur adsorption can be extended, and the sorbent made more easily regenerable after contact with a sulfur-bearing gas stream, notably sulfur-bearing wet hydrogen or wet hydrogen-rich gas streams

  17. Organic carbon spiralling in stream ecosystems

    Energy Technology Data Exchange (ETDEWEB)

    Newbold, J D; Mulholland, P J; Elwood, J W; O' Neill, R V

    1982-01-01

    The term spiralling has been used to describe the combined processes of cycling and longitudinal transport in streams. As a measure or organic carbon spiralling, we introduced organic carbon turnover length, S, defined as the average or expected downstream distance travelled by a carbon atom between its entry or fixation in the stream and its oxidation. Using a simple model for organic carbon dynamics in a stream, we show that S is closely related to fisher and Likens' ecosystem efficiency. Unlike efficiency, however, S is independent of the length of the study reach, and values of S determined in streams of differing lengths can be compared. Using data from three different streams, we found the relationship between S and efficiency to agree closely with the model prediction. Hypotheses of stream functioning are discussed in the context of organic carbeon spiralling theory.

  18. The Pacific northwest stream quality assessment

    Science.gov (United States)

    Van Metre, Peter C.; Morace, Jennifer L.; Sheibley, Rich W.

    2015-01-01

    In 2015, the U.S. Geological Survey (USGS) National Water-Quality Assessment (NAWQA) program is assessing stream quality in the Pacific Northwest. The goals of the Pacific Northwest Stream Quality Assessment (Pacific Northwest study) are to assess the quality of streams in the region by characterizing multiple water-quality factors that are stressors to aquatic life and to evaluate the relation between these stressors and biological communities. The effects of urbanization and agriculture on stream quality for the Puget Lowlands and Willamette Valley are the focus of this regional study. Findings will provide the public and policymakers with information regarding which human and environmental factors are the most critical in affecting stream quality and, thus, provide insights about possible approaches to protect or improve the health of streams in the region.

  19. LHCb : The LHCb Turbo stream

    CERN Multimedia

    Puig Navarro, Albert

    2015-01-01

    The LHCb experiment will record an unprecedented dataset of beauty and charm hadron decays during Run II of the LHC, set to take place between 2015 and 2018. A key computing challenge is to store and process this data, which limits the maximum output rate of the LHCb trigger. So far, LHCb has written out a few kHz of events containing the full raw sub-detector data, which are passed through a full offline event reconstruction before being considered for physics analysis. Charm physics in particular is limited by trigger output rate constraints. A new streaming strategy includes the possibility to perform the physics analysis with candidates reconstructed in the trigger, thus bypassing the offline reconstruction. In the "turbo stream" the trigger will write out a compact summary of "physics" objects containing all information necessary for analyses, and this will allow an increased output rate and thus higher average efficiencies and smaller selection biases. This idea will be commissioned and developed during...

  20. Streaming potential measurements of biosurfaces

    Science.gov (United States)

    Van Wagenen, R. A.; Andrade, J. D.; Hibbs, J. B., Jr.

    1976-01-01

    A technique based on the measurement of streaming potentials has been developed to evaluate the electrokinetic region of the cell periphery. This approach is feasible for cell lines propagated in in-vitro cell cultures in monolayer form. The advantage of this system is that cells may be evaluated in the living state atttached to a substrate; it is not necessary to subject the cells to enzymatic, chemical, or mechanical trauma required to obtain monodisperse suspensions which are then normally evaluated by microelectrophoresis. In this manner, it should be possible to study the influence of substrate and environmental factors on the charge density and potential at the cell periphery. The apparatus and procedure are described as well as some results concerning the electrokinetic potential of borosilicate capillaries as a function of ionic strength, pH, and temperature. The effect that turbulence and entrance flow conditions have on accurate streaming-potential measurements is discussed. The electrokinetic potential of BALB/c 3T12 fibroblasts has been quantified as a function of pH, ionic strength, glutaraldehyde fixation, and Giemsa staining.

  1. Pesticide load dynamics during stormwater flow events in Mediterranean coastal streams: Alexander stream case study.

    Science.gov (United States)

    Topaz, Tom; Egozi, Roey; Eshel, Gil; Chefetz, Benny

    2018-06-01

    Cultivated land is a major source of pesticides, which are transported with the runoff water and eroded soil during rainfall events and pollute riverine and estuarine environments. Common ecotoxicological assessments of riverine systems are mainly based on water sampling and analysis of only the dissolved phase, and address a single pesticide's toxicological impact under laboratory conditions. A clear overview of mixtures of pesticides in the adsorbed and dissolved phases is missing, and therefore the full ecotoxicological impact is not fully addressed. The aim of this study was to characterize and quantify pesticide concentrations in both suspended sediment and dissolved phases, to provide a better understanding of pesticide-load dynamics during storm events in coastal streams in a Mediterranean climate. High-resolution sampling campaigns of seven flood events were conducted during two rainy seasons in Alexander stream, Israel. Samples of suspended sediments were separated from the solution and both media were analyzed separately for 250 pesticides. A total of 63 pesticides were detected; 18 and 16 pesticides were found solely in the suspended sediments and solution, respectively. Significant differences were observed among the pesticide groups: only 7% of herbicide, 20% of fungicide and 42% of insecticide load was transported with the suspended sediments. However, in both dissolved and adsorbed phases, a mix of pesticides was found which were graded from "mobile" to "non-mobile" with varied distribution coefficients. Diuron, and tebuconazole were frequently found in large quantities in both phases. Whereas insecticide and fungicide transport is likely governed by application time and method, the governing factor for herbicide load was the magnitude of the stream discharge. The results show a complex dynamic of pesticide load affected by excessive use of pesticides, which should be taken into consideration when designing projects to monitor riverine and estuarine

  2. Acoustic streaming in the transducer plane in ultrasonic particle manipulation devices.

    Science.gov (United States)

    Lei, Junjun; Glynne-Jones, Peter; Hill, Martyn

    2013-06-07

    In acoustofluidic manipulation and sorting devices, Rayleigh streaming flows are typically found in addition to the acoustic radiation forces. However, experimental work from various groups has described acoustic streaming that occurs in planar devices in a plane parallel to the transducer face. This is typically a four-quadrant streaming pattern with the circulation parallel to the transducer. Understanding its origins is essential for creating designs that limit or control this phenomenon. The cause of this kind of streaming pattern has not been previously explained as it is different from the well-known classical streaming patterns such as Rayleigh streaming and Eckart streaming, whose circulation planes are generally perpendicular to the face of the acoustic transducer. In order to gain insight into these patterns we present a numerical method based on Nyborg's limiting velocity boundary condition that includes terms ignored in the Rayleigh analysis, and verify its predictions against experimental PIV results in a simple device. The results show that the modelled particle trajectories match those found experimentally. Analysis of the dominant terms in the driving equations shows that the origin of this kind of streaming pattern is related to the circulation of the acoustic intensity.

  3. On-stream chemical element monitor

    International Nuclear Information System (INIS)

    Averitt, O.R.; Dorsch, R.R.

    1979-01-01

    An apparatus and method for on-stream chemical element monitoring are described wherein a multiplicity of sample streams are flowed continuously through individual analytical cells and fluorescence analyses are performed on the sample streams in sequence, together with a method of controlling the time duration of each analysis as a function of the concomitant radiation exposure of a preselected perforate reference material interposed in the sample-radiation source path

  4. Smart Streaming for Online Video Services

    OpenAIRE

    Chen, Liang; Zhou, Yipeng; Chiu, Dah Ming

    2013-01-01

    Bandwidth consumption is a significant concern for online video service providers. Practical video streaming systems usually use some form of HTTP streaming (progressive download) to let users download the video at a faster rate than the video bitrate. Since users may quit before viewing the complete video, however, much of the downloaded video will be "wasted". To the extent that users' departure behavior can be predicted, we develop smart streaming that can be used to improve user QoE with ...

  5. Nutrient spiraling in streams and river networks

    Science.gov (United States)

    Ensign, Scott H.; Doyle, Martin W.

    2006-12-01

    Over the past 3 decades, nutrient spiraling has become a unifying paradigm for stream biogeochemical research. This paper presents (1) a quantitative synthesis of the nutrient spiraling literature and (2) application of these data to elucidate trends in nutrient spiraling within stream networks. Results are based on 404 individual experiments on ammonium (NH4), nitrate (NO3), and phosphate (PO4) from 52 published studies. Sixty-nine percent of the experiments were performed in first- and second-order streams, and 31% were performed in third- to fifth-order streams. Uptake lengths, Sw, of NH4 (median = 86 m) and PO4 (median = 96 m) were significantly different (α = 0.05) than NO3 (median = 236 m). Areal uptake rates of NH4 (median = 28 μg m-2 min-1) were significantly different than NO3 and PO4 (median = 15 and 14 μg m-2 min-1, respectively). There were significant differences among NH4, NO3, and PO4 uptake velocity (median = 5, 1, and 2 mm min-1, respectively). Correlation analysis results were equivocal on the effect of transient storage on nutrient spiraling. Application of these data to a stream network model showed that recycling (defined here as stream length ÷ Sw) of NH4 and NO3 generally increased with stream order, while PO4 recycling remained constant along a first- to fifth-order stream gradient. Within this hypothetical stream network, cumulative NH4 uptake decreased slightly with stream order, while cumulative NO3 and PO4 uptake increased with stream order. These data suggest the importance of larger rivers to nutrient spiraling and the need to consider how stream networks affect nutrient flux between terrestrial and marine ecosystems.

  6. How do land-based salmonid farms affect stream ecology?

    International Nuclear Information System (INIS)

    Tello, A.; Corner, R.A.; Telfer, T.C.

    2010-01-01

    Increasing research is highlighting the fact that streams provide crucial ecosystem services through the biogeochemical and ecological processes they sustain. Freshwater land-based salmonid farms commonly discharge their effluents into low order, headwater streams, partly due to the fact that adequate freshwater resources for production are commonly found in undisturbed areas. We review the effects of salmonid farm effluents on different biological components of stream ecosystems. Relevant considerations related to the temporal and spatial scales of effluent discharge and ecological effects are discussed. These highlight the need to characterize the patterns of stressor discharge when assessing environmental impacts and designing ecological effects studies. The potential role of multiple stressors in disrupting ecosystem structure and function is discussed with an emphasis on aquaculture veterinary medicines. Further research on the effects of veterinary medicines using relevant exposure scenarios would significantly contribute to our understanding of their impact in relation to other effluent stressors. - This article reviews the effects of aquaculture effluents on stream ecosystems with an emphasis on veterinary medicines and the temporal patterns of effluent discharge.

  7. Process analytical chemistry applied to actinide waste streams

    International Nuclear Information System (INIS)

    Day, R.S.

    1994-01-01

    The Department of Energy is being called upon to clean up it's legacy of waste from the nuclear complex generated during the cold war period. Los Alamos National Laboratory is actively involved in waste minimization and waste stream polishing activities associated with this clean up. The Advanced Testing Line for Actinide Separations (ATLAS) at Los Alamos serves as a developmental test bed for integrating flow sheet development of nitric acid waste streams with process analytical chemistry and process control techniques. The wastes require processing in glove boxes because of the radioactive components, thus adding to the difficulties of making analytical measurements. Process analytical chemistry methods provide real-time chemical analysis in support of existing waste stream operations and enhances the development of new waste stream polishing initiatives. The instrumentation and methods being developed on ATLAS are designed to supply near-real time analyses on virtually all of the chemical parameters found in nitric acid processing of actinide waste. These measurements supply information on important processing parameters including actinide oxidation states, free acid concentration, interfering anions and metal impurities

  8. innovation in radioactive waste water-stream management

    International Nuclear Information System (INIS)

    Shaaban, D.A.E.F.

    2010-01-01

    treatment of radioactive waste dtreams is receiving considereble attention in most countries. the present work is for the radioactive wastewater stream management, by volume reduction by a mutual heating and humidificaction of a compressed dry air introduced through the wastewater. in the present work, a mathematical model describing the volume reduction by at the optimum operating condition is determined. a set of coupled first order differential equations, obtained through the mass and energy conservations laws, are used to obtain the humidity ratio, water diffused to the air stream, water temperature, and humid air stream temperature distributions through the bubbling column. these coupled differential equations are simulataneously solved numerically by the developed computer program using fourth order rung-kutta method. the results obtained, according to the present mathematical model, revealed that the air bubble state variables such as mass transfer coefficient (K G ) and interfacial area (a) have a strong effect on the process. therefore, the behavior of the air bubble state variables with coulmn height can be predicted and optimized. moreover, the design curves of the volumetric reduction of the wastewater streams are obtained and assessed at the different operating conditions. an experimental setup was constructed to verify the suggested model. comperhensive comparison between suggested model results, recent experimental measurements and the results of previous work was carried out

  9. Video Streaming for Creative Writing at International Elementary School

    Directory of Open Access Journals (Sweden)

    Deni Darmawan

    2013-02-01

    Full Text Available This study aims at overcoming difficulty in learning language, both in Indonesian Language and English at international elementary school, especially in creative writing. Creative writing as part of human activity is creativity with language medium as prose (narrative, description, poem (old, new and modern, as well as drama (dialogue, role play, and sosio drama. Specific target to be achieved is the design of Video Streaming for all kinds of creative writing in the language of Indonesian and English. This investigation is a continuation of the previos investigation that has managed to make a video leaning in English for Math and Science as integrated learning to early class at international elementary school. The method used follow the principles of developmental reasearch. The firts stage is script writing video streaming through brainstorming with teachers, lecturers, teams of investigators Indonesia (UPI and Malaysia (USM. The second stage manuscript, making finalization Video Streaming, make the Web, media experts and creative writing material team investigators. The third stage, testing the Video Streaming, Web and dissemination of results into all the international elementary school in Indonesia and Malaysia.

  10. StreamStats in Oklahoma - Drainage-Basin Characteristics and Peak-Flow Frequency Statistics for Ungaged Streams

    Science.gov (United States)

    Smith, S. Jerrod; Esralew, Rachel A.

    2010-01-01

    The USGS Streamflow Statistics (StreamStats) Program was created to make geographic information systems-based estimation of streamflow statistics easier, faster, and more consistent than previously used manual techniques. The StreamStats user interface is a map-based internet application that allows users to easily obtain streamflow statistics, basin characteristics, and other information for user-selected U.S. Geological Survey data-collection stations and ungaged sites of interest. The application relies on the data collected at U.S. Geological Survey streamflow-gaging stations, computer aided computations of drainage-basin characteristics, and published regression equations for several geographic regions comprising the United States. The StreamStats application interface allows the user to (1) obtain information on features in selected map layers, (2) delineate drainage basins for ungaged sites, (3) download drainage-basin polygons to a shapefile, (4) compute selected basin characteristics for delineated drainage basins, (5) estimate selected streamflow statistics for ungaged points on a stream, (6) print map views, (7) retrieve information for U.S. Geological Survey streamflow-gaging stations, and (8) get help on using StreamStats. StreamStats was designed for national application, with each state, territory, or group of states responsible for creating unique geospatial datasets and regression equations to compute selected streamflow statistics. With the cooperation of the Oklahoma Department of Transportation, StreamStats has been implemented for Oklahoma and is available at http://water.usgs.gov/osw/streamstats/. The Oklahoma StreamStats application covers 69 processed hydrologic units and most of the state of Oklahoma. Basin characteristics available for computation include contributing drainage area, contributing drainage area that is unregulated by Natural Resources Conservation Service floodwater retarding structures, mean-annual precipitation at the

  11. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  12. The Overview and Appliance of some Streaming Video software solutions

    OpenAIRE

    Qin , Yan

    2010-01-01

    This paper introduces the basic streaming media technology, the streaming media system structure, principles of streaming media technology; streaming media file formats and so on. After that, it discusses the use streaming media in distance education, broadband video on demand, Internet broadcasting, video conferences and a more detailed exposition in streaming media. As the existing technology has been unable to satisfy the increasing needs of the Internet users, the streaming media technol...

  13. Geochemical survey of stream sediments of the Piceance Creek Basin, Colorado

    Energy Technology Data Exchange (ETDEWEB)

    Ringrose, C.D.

    1977-01-01

    A stream sediment survey was conducted in the Piceance Creek Basin to study the spatial distribution of Zn, Mo, Hg, Cd and As for future baseline considerations. The pH and organic matter were also measured. From samples taken at the mouths (junctions) of most of the named creeks in the basin, it is concluded that none of the streams contained sediments with anomalous trace element concentrations with respect to the basin. But it is thought that Mo and possibly As could be potentially toxic because of their abundance and their mobility under the stream sediments' alkaline condition. From a different sampling plan, designed to describe the background variance of five streams (Roan, Black Sulfur, Parachute, Yellow and Piceance Creeks), it was found that most of the variance occurred at distances from 0-10 m within 2 km stream segments 10 km apart for Mo, Hg, Az, and organic matter. When the variance between the five streams was considered, it was found to dominate the variances of the other factors for Mo, Hg, and Zn. This variance between streams is actually thought to represent the variance between the major drainage system in the basin. When comparison is made between the two sampling design results, it is thought that the trace element concentrations of stream junction samples represented the best range of expected values for the entire basin. The expected ranges of the trace elements from the nested design are thought to be reasonable estimates of preliminary baselines for Parachute Creek, Roan Creek and Black Sulfur Creek within the restricted limits of the streams defined in the text. From the experience gained in pursuing this study, it is thought that composite sampling should be considered, where feasible, to reduce the analytical load and to reduce the small scale variance.

  14. Interaction between stream temperature, streamflow, and groundwater exchanges in alpine streams

    Science.gov (United States)

    Constantz, James E.

    1998-01-01

    Four alpine streams were monitored to continuously collect stream temperature and streamflow for periods ranging from a week to a year. In a small stream in the Colorado Rockies, diurnal variations in both stream temperature and streamflow were significantly greater in losing reaches than in gaining reaches, with minimum streamflow losses occurring early in the day and maximum losses occurring early in the evening. Using measured stream temperature changes, diurnal streambed infiltration rates were predicted to increase as much as 35% during the day (based on a heat and water transport groundwater model), while the measured increase in streamflow loss was 40%. For two large streams in the Sierra Nevada Mountains, annual stream temperature variations ranged from 0° to 25°C. In summer months, diurnal stream temperature variations were 30–40% of annual stream temperature variations, owing to reduced streamflows and increased atmospheric heating. Previous reports document that one Sierra stream site generally gains groundwater during low flows, while the second Sierra stream site may lose water during low flows. For August the diurnal streamflow variation was 11% at the gaining stream site and 30% at the losing stream site. On the basis of measured diurnal stream temperature variations, streambed infiltration rates were predicted to vary diurnally as much as 20% at the losing stream site. Analysis of results suggests that evapotranspiration losses determined diurnal streamflow variations in the gaining reaches, while in the losing reaches, evapotranspiration losses were compounded by diurnal variations in streambed infiltration. Diurnal variations in stream temperature were reduced in the gaining reaches as a result of discharging groundwater of relatively constant temperature. For the Sierra sites, comparison of results with those from a small tributary demonstrated that stream temperature patterns were useful in delineating discharges of bank storage following

  15. Radiation shielding techniques and applications. 3. Analysis of Photon Streaming Through and Around Shield Doors

    International Nuclear Information System (INIS)

    Barnett, Marvin; Hack, Joe; Nathan, Steve; White, Travis

    2001-01-01

    Westinghouse Safety Management Solutions (Westinghouse SMS) has been tasked with providing radiological engineering design support for the new Commercial Light Water Reactor Tritium Extraction Facility (CLWR-TEF) being constructed at the Savannah River Site (SRS). The Remote Handling Building (RHB) of the CLWR-TEF will act as the receiving facility for irradiated targets used in the production of tritium for the U.S. Department of Energy (DOE). Because of the high dose rates, approaching 50 000 rads/h (500 Gy/h) from the irradiated target bundles, significant attention has been made to shielding structures within the facility. One aspect of the design that has undergone intense review is the shield doors. The RHB has six shield doors that needed to be studied with respect to photon streaming. Several aspects had to be examined to ensure that the design meets the radiation dose levels. Both the thickness and streaming issues around the door edges were designed and examined. Photon streaming through and around a shield door is a complicated problem, creating a reliance on computer modeling to perform the analyses. The computer code typically used by the Westinghouse SMS in the evaluation of photon transport through complex geometries is the MCNP Monte Carlo computer code. The complexity of the geometry within the problem can cause problems even with the Monte Carlo codes. Striking a balance between how the code handles transport through the shield door with transport through the streaming paths, particularly with the use of typical variance reduction methods, is difficult when trying to ensure that all important regions of the model are sampled appropriately. The thickness determination used a simple variance reduction technique. In construction, the shield door will not be flush against the wall, so a solid rectangular slab leaves streaming paths around the edges. Administrative controls could be used to control dose to workers; however, 10 CFR 835.1001 states

  16. Stingray tidal stream energy device - phase 3

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The 150 kW Stingray demonstrator was designed, built and installed by The Engineering Business (EB) in 2002, becoming the world's first full-scale tidal stream generator. The concept and technology are described in the reports from Phases 1 and 2 of the project. This report provides an overview of Phase 3 - the re-installation of Stingray in Yell Sound in the Shetland Isles between July and September 2003 for further testing at slack water and on the flood tide to confirm basic machine characteristics, develop the control strategy and to demonstrate performance and power collection through periods of continuous operation. The overall aim was to demonstrate that electricity could be generated at a potentially commercially viable unit energy cost; cost modelling indicated a future unit energy cost of 6.7 pence/kWh when 100 MW capacity had been installed. The report describes: project objectives, targets and activities; design and production; marine operations including installation and demobilisation; environmental monitoring and impact, including pre-installation and post-decommissioning surveys; stakeholder involvement; test results on machine characteristics, sensor performance, power cycle analysis, power collection, transmission performance and efficiency, current data analysis; validation of the mathematical model; the background to the economic model; cost modelling; and compliance with targets set by the Department of Trade and Industry (DTI).

  17. Stingray tidal stream energy device - phase 3

    International Nuclear Information System (INIS)

    2005-01-01

    The 150 kW Stingray demonstrator was designed, built and installed by The Engineering Business (EB) in 2002, becoming the world's first full-scale tidal stream generator. The concept and technology are described in the reports from Phases 1 and 2 of the project. This report provides an overview of Phase 3 - the re-installation of Stingray in Yell Sound in the Shetland Isles between July and September 2003 for further testing at slack water and on the flood tide to confirm basic machine characteristics, develop the control strategy and to demonstrate performance and power collection through periods of continuous operation. The overall aim was to demonstrate that electricity could be generated at a potentially commercially viable unit energy cost; cost modelling indicated a future unit energy cost of 6.7 pence/kWh when 100 MW capacity had been installed. The report describes: project objectives, targets and activities; design and production; marine operations including installation and demobilisation; environmental monitoring and impact, including pre-installation and post-decommissioning surveys; stakeholder involvement; test results on machine characteristics, sensor performance, power cycle analysis, power collection, transmission performance and efficiency, current data analysis; validation of the mathematical model; the background to the economic model; cost modelling; and compliance with targets set by the Department of Trade and Industry (DTI)

  18. Shifting stream planform state decreases stream productivity yet increases riparian animal production

    Science.gov (United States)

    Venarsky, Michael P.; Walters, David M.; Hall, Robert O.; Livers, Bridget; Wohl, Ellen

    2018-01-01

    In the Colorado Front Range (USA), disturbance history dictates stream planform. Undisturbed, old-growth streams have multiple channels and large amounts of wood and depositional habitat. Disturbed streams (wildfires and logging tested how these opposing stream states influenced organic matter, benthic macroinvertebrate secondary production, emerging aquatic insect flux, and riparian spider biomass. Organic matter and macroinvertebrate production did not differ among sites per unit area (m−2), but values were 2 ×–21 × higher in undisturbed reaches per unit of stream valley (m−1 valley) because total stream area was higher in undisturbed reaches. Insect emergence was similar among streams at the per unit area and per unit of stream valley. However, rescaling insect emergence to per meter of stream bank showed that the emerging insect biomass reaching the stream bank was lower in undisturbed sites because multi-channel reaches had 3 × more stream bank than single-channel reaches. Riparian spider biomass followed the same pattern as emerging aquatic insects, and we attribute this to bottom-up limitation caused by the multi-channeled undisturbed sites diluting prey quantity (emerging insects) reaching the stream bank (riparian spider habitat). These results show that historic landscape disturbances continue to influence stream and riparian communities in the Colorado Front Range. However, these legacy effects are only weakly influencing habitat-specific function and instead are primarily influencing stream–riparian community productivity by dictating both stream planform (total stream area, total stream bank length) and the proportional distribution of specific habitat types (pools vs riffles).

  19. A Statistical Method to Predict Flow Permanence in Dryland Streams from Time Series of Stream Temperature

    Directory of Open Access Journals (Sweden)

    Ivan Arismendi

    2017-12-01

    Full Text Available Intermittent and ephemeral streams represent more than half of the length of the global river network. Dryland freshwater ecosystems are especially vulnerable to changes in human-related water uses as well as shifts in terrestrial climates. Yet, the description and quantification of patterns of flow permanence in these systems is challenging mostly due to difficulties in instrumentation. Here, we took advantage of existing stream temperature datasets in dryland streams in the northwest Great Basin desert, USA, to extract critical information on climate-sensitive patterns of flow permanence. We used a signal detection technique, Hidden Markov Models (HMMs, to extract information from daily time series of stream temperature to diagnose patterns of stream drying. Specifically, we applied HMMs to time series of daily standard deviation (SD of stream temperature (i.e., dry stream channels typically display highly variable daily temperature records compared to wet stream channels between April and August (2015–2016. We used information from paired stream and air temperature data loggers as well as co-located stream temperature data loggers with electrical resistors as confirmatory sources of the timing of stream drying. We expanded our approach to an entire stream network to illustrate the utility of the method to detect patterns of flow permanence over a broader spatial extent. We successfully identified and separated signals characteristic of wet and dry stream conditions and their shifts over time. Most of our study sites within the entire stream network exhibited a single state over the entire season (80%, but a portion of them showed one or more shifts among states (17%. We provide recommendations to use this approach based on a series of simple steps. Our findings illustrate a successful method that can be used to rigorously quantify flow permanence regimes in streams using existing records of stream temperature.

  20. A statistical method to predict flow permanence in dryland streams from time series of stream temperature

    Science.gov (United States)

    Arismendi, Ivan; Dunham, Jason B.; Heck, Michael; Schultz, Luke; Hockman-Wert, David

    2017-01-01

    Intermittent and ephemeral streams represent more than half of the length of the global river network. Dryland freshwater ecosystems are especially vulnerable to changes in human-related water uses as well as shifts in terrestrial climates. Yet, the description and quantification of patterns of flow permanence in these systems is challenging mostly due to difficulties in instrumentation. Here, we took advantage of existing stream temperature datasets in dryland streams in the northwest Great Basin desert, USA, to extract critical information on climate-sensitive patterns of flow permanence. We used a signal detection technique, Hidden Markov Models (HMMs), to extract information from daily time series of stream temperature to diagnose patterns of stream drying. Specifically, we applied HMMs to time series of daily standard deviation (SD) of stream temperature (i.e., dry stream channels typically display highly variable daily temperature records compared to wet stream channels) between April and August (2015–2016). We used information from paired stream and air temperature data loggers as well as co-located stream temperature data loggers with electrical resistors as confirmatory sources of the timing of stream drying. We expanded our approach to an entire stream network to illustrate the utility of the method to detect patterns of flow permanence over a broader spatial extent. We successfully identified and separated signals characteristic of wet and dry stream conditions and their shifts over time. Most of our study sites within the entire stream network exhibited a single state over the entire season (80%), but a portion of them showed one or more shifts among states (17%). We provide recommendations to use this approach based on a series of simple steps. Our findings illustrate a successful method that can be used to rigorously quantify flow permanence regimes in streams using existing records of stream temperature.

  1. Applicability of Existing Objective Metrics of Perceptual Quality for Adaptive Video Streaming

    DEFF Research Database (Denmark)

    Søgaard, Jacob; Krasula, Lukás; Shahid, Muhammad

    2016-01-01

    Objective video quality metrics are designed to estimate the quality of experience of the end user. However, these objective metrics are usually validated with video streams degraded under common distortion types. In the presented work, we analyze the performance of published and known full......-reference and noreference quality metrics in estimating the perceived quality of adaptive bit-rate video streams knowingly out of scope. Experimental results indicate not surprisingly that state of the art objective quality metrics overlook the perceived degradations in the adaptive video streams and perform poorly...

  2. An ecohydrological stream type cassification of intermittent and ephemeral streams in the Southwestern United States 2397

    Science.gov (United States)

    Ephemeral and intermittent streams are the predominant fluvial forms in arid and semi-arid environments. Various studies have shown biological and habitat diversity in these lands to be considerably higher along stream corridors in comparison to adjacent uplands, yet knowledge of how these streams f...

  3. The ventral stream offers more affordance and the dorsal stream more memory than believed

    NARCIS (Netherlands)

    Postma, Albert; van der Lubbe, Robert Henricus Johannes; Zuidhoek, Sander

    2002-01-01

    Opposed to Norman's proposal, processing of affordance is likely to occur not solely in the dorsal stream but also in the ventral stream. Moreover, the dorsal stream might do more than just serve an important role in motor actions. It supports egocentric location coding as well. As such, it would

  4. Stream invertebrate productivity linked to forest subsidies: 37 stream-years of reference and experimental data

    Science.gov (United States)

    J. Bruce Wallace; Susan L Eggert; Judy L. Meyer; Jackson R. Webster

    2015-01-01

    Riparian habitats provide detrital subsidies of varying quantities and qualities to recipient ecosystems. We used long-term data from three reference streams (covering 24 stream-years) and 13-year whole-stream organic matter manipulations to investigate the influence of terrestrial detrital quantity and quality on benthic invertebrate community structure, abundance,...

  5. Evaluation of the streaming-matrix method for discrete-ordinates duct-streaming calculations

    International Nuclear Information System (INIS)

    Clark, B.A.; Urban, W.T.; Dudziak, D.J.

    1983-01-01

    A new deterministic streaming technique called the Streaming Matrix Hybrid Method (SMHM) is applied to two realistic duct-shielding problems. The results are compared to standard discrete-ordinates and Monte Carlo calculations. The SMHM shows promise as an alternative deterministic streaming method to standard discrete-ordinates

  6. Leaf litter processing in West Virginia mountain streams: effects of temperature and stream chemistry

    Science.gov (United States)

    Jacquelyn M. Rowe; William B. Perry; Sue A. Perry

    1996-01-01

    Climate change has the potential to alter detrital processing in headwater streams, which receive the majority of their nutrient input as terrestrial leaf litter. Early placement of experimental leaf packs in streams, one month prior to most abscission, was used as an experimental manipulation to increase stream temperature during leaf pack breakdown. We studied leaf...

  7. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  8. Streaming Multiframe Deconvolutions on GPUs

    Science.gov (United States)

    Lee, M. A.; Budavári, T.

    2015-09-01

    Atmospheric turbulence distorts all ground-based observations, which is especially detrimental to faint detections. The point spread function (PSF) defining this blur is unknown for each exposure and varies significantly over time, making image analysis difficult. Lucky imaging and traditional co-adding throws away lots of information. We developed blind deconvolution algorithms that can simultaneously obtain robust solutions for the background image and all the PSFs. It is done in a streaming setting, which makes it practical for large number of big images. We implemented a new tool that runs of GPUs and achieves exceptional running times that can scale to the new time-domain surveys. Our code can quickly and effectively recover high-resolution images exceeding the quality of traditional co-adds. We demonstrate the power of the method on the repeated exposures in the Sloan Digital Sky Survey's Stripe 82.

  9. Streaming Algorithms for Line Simplification

    DEFF Research Database (Denmark)

    Abam, Mohammad; de Berg, Mark; Hachenberger, Peter

    2010-01-01

    this problem in a streaming setting, where we only have a limited amount of storage, so that we cannot store all the points. We analyze the competitive ratio of our algorithms, allowing resource augmentation: we let our algorithm maintain a simplification with 2k (internal) points and compare the error of our...... simplification to the error of the optimal simplification with k points. We obtain the algorithms with O(1) competitive ratio for three cases: convex paths, where the error is measured using the Hausdorff distance (or Fréchet distance), xy-monotone paths, where the error is measured using the Hausdorff distance...... (or Fréchet distance), and general paths, where the error is measured using the Fréchet distance. In the first case the algorithm needs O(k) additional storage, and in the latter two cases the algorithm needs O(k 2) additional storage....

  10. Innovation in radioactive wastewater-stream management: Part one

    International Nuclear Information System (INIS)

    Karameldin, A.

    2005-01-01

    Treatment of radioactive wastewater streams is receiving considerable attention in most countries that have nuclear reactors. The first Egyptian research reactor ETRR-1 has been operating for 40 years, resulting in accumulation of large quantities of wastewater collected in special drainage tanks called SDTs. Previous attempts were aimed at the volumetric reduction of streams present in SDTs, by reverse osmosis systems, which previously succeeded in reducing the water volume present in SDTs from 450 m 3 to 50 m 3 (during the period 1998-2000). The main drawbacks of the RO system are the additional amount of secondary wastes (turbidity and emulsion filters media replacement, and the excessive amounts of chemicals for the membrane cleaning, flushing and storing), and a limited contaminant release in the SDTs area, resulting in the decommissioning of the RO system. Meanwhile, the SDTs waste contents recently reached 500 m 3 . Recently, the invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilises the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs. From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs has indicated that the proposed optimal evaporating temperature is around 75 deg. C. The design curve of the daily volumetric reduction of the wastewater streams vs. the necessary volumetric airflow rates at different operating temperatures has been achieved. Recently, an experimental facility is being constructed to obtain the optimal operating parameters of the system, regarding the probable emissions of the radioactive nuclides within the permissible release limits. (author)

  11. Predicting quality of experience in multimedia streaming

    NARCIS (Netherlands)

    Menkovski, V.; Oredope, A.; Liotta, A.; Cuadra Sánchez, A.

    2009-01-01

    Measuring and predicting the user’s Quality of Experience (QoE) of a multimedia stream is the first step towards improving and optimizing the provision of mobile streaming services. This enables us to better understand how Quality of Service (QoS) parameters affect service quality, as it is actually

  12. Flooding in ephemeral streams: incorporating transmission losses

    Science.gov (United States)

    Stream flow in semiarid lands commonly occurs as a form of flash floods in dry ephemeral stream beds. The goal of this research is to couple hydrological and hydraulic models treats channel transmission losses and test the methodology in the USDA-ARS Walnut Gulch Experimental Watershed (WGEW). For h...

  13. Organism-substrate relationships in lowland streams

    NARCIS (Netherlands)

    Tolkamp, H.H.

    1980-01-01

    A field and laboratory study on the microdistribution of bottom dwelling macroinvertebrates to investigate the role of the stream substrate In the development and preservation of the macroinvertebrate communities in natural, undisturbed lowland streams is described. Field data on bottom substrates

  14. What Can Hierarchies Do for Data Streams?

    DEFF Research Database (Denmark)

    Yin, Xuepeng; Pedersen, Torben Bach

    2007-01-01

    Abstract. Much effort has been put into building data streams management systems for querying data streams. However, the query languages have mostly been SQL-based and aimed for low-level analysis of base data; therefore, there has been little work on supporting OLAP-like queries that provide rea...

  15. Coldwater fish in wadeable streams [Chapter 8

    Science.gov (United States)

    Jason B. Dunham; Amanda E. Rosenberger; Russell F. Thurow; C. Andrew Dolloff; Philip J. Howell

    2009-01-01

    Small, wadeable streams comprise the majority of habitats available to fishes in fluvial networks. Wadeable streams are generally less than 1 m deep, and fish can be sampled without the use of water craft. Cold waters are defined as having mean 7-d summer maximum water temperatures of less than 20°C and providing habitat for coldwater fishes.

  16. Round-Robin Streaming with Generations

    DEFF Research Database (Denmark)

    Li, Yao; Vingelmann, Peter; Pedersen, Morten Videbæk

    2012-01-01

    We consider three types of application layer coding for streaming over lossy links: random linear coding, systematic random linear coding, and structured coding. The file being streamed is divided into sub-blocks (generations). Code symbols are formed by combining data belonging to the same...

  17. Streaming for Mathematics in Victorian Secondary Schools

    Science.gov (United States)

    Forgasz, Helen

    2010-01-01

    Streaming (or ability grouping) for mathematics learning is a contentious issue. It can also be considered an issue of equity or social justice as some students may be adversely affected by the practice. Currently, the Victorian Department of Education and Early Childhood Development (DEECD) does not appear to have clear guidelines on streaming.…

  18. Salmon carcass movements in forest streams

    Science.gov (United States)

    Burke Strobel; Daniel R. Shivley; Brett B. Roper

    2009-01-01

    The movements of salmon carcasses over time were studied in two forest streams in the context of a large-scale salmon carcass supplementation program. The objectives were to assess both the level of treatment after stream flows had displaced carcasses and to evaluate whether the magnitude of carcass movements outside of a given reach could be predicted. The movements...

  19. THE PAL 5 STAR STREAM GAPS

    International Nuclear Information System (INIS)

    Carlberg, R. G.; Hetherington, Nathan; Grillmair, C. J.

    2012-01-01

    Pal 5 is a low-mass, low-velocity-dispersion, globular cluster with spectacular tidal tails. We use the Sloan Digital Sky Survey Data Release 8 data to extend the density measurements of the trailing star stream to 23 deg distance from the cluster, at which point the stream runs off the edge of the available sky coverage. The size and the number of gaps in the stream are measured using a filter which approximates the structure of the gaps found in stream simulations. We find 5 gaps that are at least 99% confidence detections with about a dozen gaps at 90% confidence. The statistical significance of a gap is estimated using bootstrap resampling of the control regions on either side of the stream. The density minimum closest to the cluster is likely the result of the epicyclic orbits of the tidal outflow and has been discounted. To create the number of 99% confidence gaps per unit length at the mean age of the stream requires a halo population of nearly a thousand dark matter sub-halos with peak circular velocities above 1 km s –1 within 30 kpc of the galactic center. These numbers are a factor of about three below cold stream simulation at this sub-halo mass or velocity but, given the uncertainties in both measurement and more realistic warm stream modeling, are in substantial agreement with the LCDM prediction.

  20. Storm Sewage Dilution in Smaller Streams

    DEFF Research Database (Denmark)

    Larsen, Torben; Vestergaard, Kristian

    1987-01-01

    A numerical model has been used to show how dilution in smaller streams can be effected by unsteady hydraulic conditions caused by a storm sewage overflow.......A numerical model has been used to show how dilution in smaller streams can be effected by unsteady hydraulic conditions caused by a storm sewage overflow....

  1. Neotropical Amphibian Declines Affect Stream Ecosystem Properties

    Science.gov (United States)

    Connelly, S.; Pringle, C. M.; Bixby, R. J.; Whiles, M. R.; Lips, K. R.; Brenes, R.; Colon-Gaud, J. C.; Kilham, S.; Hunte-Brown, M.

    2005-05-01

    Global declines of amphibians are well documented, yet effects of these dramatic losses on ecosystem structure and function are poorly understood. As part of a larger collaborative project, we compared two upland Panamanian streams. Both streams are biologically and geologically similar; however, one stream (Fortuna) has recently experienced almost complete extirpation of stream-dwelling frogs, while the other (Cope) still has intact populations. We experimentally excluded tadpoles from localized areas in each stream. We then compared chlorophyll a, algal community composition, ash-free dry mass (AFDM), inorganic matter, and insect assemblages in control and exclusion areas. Additionally, we sampled the natural substrate of both streams monthly for chlorophyll a, algal community composition, AFDM, and inorganic matter. At Cope, chlorophyll a, AFDM, and inorganic matter were greater in areas where tadpoles were excluded than in their presence. Numbers of dominant algal species (e.g., Nupela praecipua and Eunotia siolii) were greater in the exclusion versus control treatments. Monthly sampling of natural substrate indicated higher chlorophyll a and AFDM at Cope compared to Fortuna. Our data suggest that stream-dwelling anuran larvae have significant impacts on algal communities. These results also have implications for predicting the relevance of short-term experimental manipulations to long-term, whole-stream processes.

  2. Global pressures, specific responses: effects of nutrient enrichment in streams from different biomes

    International Nuclear Information System (INIS)

    Artigas, Joan; García-Berthou, Emili; Gómez, Nora; Romaní, Anna M; Sabater, Sergi; Bauer, Delia E; Cochero, Joaquín; Cortelezzi, Agustina; Rodrigues-Capítulo, Alberto; Castro, Maria I; Donato, John C; Colautti, Darío C; Elosegi, Arturo; Feijoó, Claudia; Giorgi, Adonis; Leggieri, Leonardo; Muñoz, Isabel

    2013-01-01

    We assessed the effects of nutrient enrichment on three stream ecosystems running through distinct biomes (Mediterranean, Pampean and Andean). We increased the concentrations of N and P in the stream water 1.6–4-fold following a before–after control–impact paired series (BACIPS) design in each stream, and evaluated changes in the biomass of bacteria, primary producers, invertebrates and fish in the enriched (E) versus control (C) reaches after nutrient addition through a predictive-BACIPS approach. The treatment produced variable biomass responses (2–77% of explained variance) among biological communities and streams. The greatest biomass response was observed for algae in the Andean stream (77% of the variance), although fish also showed important biomass responses (about 9–48%). The strongest biomass response to enrichment (77% in all biological compartments) was found in the Andean stream. The magnitude and seasonality of biomass responses to enrichment were highly site specific, often depending on the basal nutrient concentration and on windows of ecological opportunity (periods when environmental constraints other than nutrients do not limit biomass growth). The Pampean stream, with high basal nutrient concentrations, showed a weak response to enrichment (except for invertebrates), whereas the greater responses of Andean stream communities were presumably favored by wider windows of ecological opportunity in comparison to those from the Mediterranean stream. Despite variation among sites, enrichment globally stimulated the algal-based food webs (algae and invertebrate grazers) but not the detritus-based food webs (bacteria and invertebrate shredders). This study shows that nutrient enrichment tends to globally enhance the biomass of stream biological assemblages, but that its magnitude and extent within the food web are complex and are strongly determined by environmental factors and ecosystem structure. (letter)

  3. StreamStats: A water resources web application

    Science.gov (United States)

    Ries, Kernell G.; Guthrie, John G.; Rea, Alan H.; Steeves, Peter A.; Stewart, David W.

    2008-01-01

    Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (the flow that is exceeded, on average, once in 100 years and has a 1-percent chance of being exceeded in any year, sometimes referred to as the 100-year flood) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; water-use appropriations and permitting; wastewater and industrial discharge permitting; hydropower facility design and regulation; and the setting of minimum required streamflows to protect freshwater ecosystems. In addition, researchers, planners, regulators, and others often need to know the physical and climatic characteristics of the drainage basins (basin characteristics) and the influence of human activities, such as dams and water withdrawals, on streamflow upstream from locations of interest to understand the mechanisms that control water availability and quality at those locations. Knowledge of the streamflow network and downstream human activities also is necessary to adequately determine whether an upstream activity, such as a water withdrawal, can be allowed without adversely affecting downstream activities.Streamflow statistics could be needed at any location along a stream. Most often, streamflow statistics are needed at ungaged sites, where no streamflow data are available to compute the statistics. At U.S. Geological Survey (USGS) streamflow data-collection stations, which include streamgaging stations, partial-record stations, and miscellaneous-measurement stations, streamflow statistics can be computed from available data for the stations. Streamflow data are collected continuously at streamgaging stations

  4. The idiosyncrasies of streams: local variability mitigates vulnerability of trout to changing conditions

    Science.gov (United States)

    Andrea Watts; Brooke Penaluna; Jason Dunham

    2016-01-01

    Land use and climate change are two key factors with the potential to affect stream conditions and fish habitat. Since the 1950s, Washington and Oregon have required forest practices designed to mitigate the effects of timber harvest on streams and fish. Yet questions remain about the extent to which these practices are effective. Add in the effects of climate change—...

  5. Shifting stream planform state decreases stream productivity yet increases riparian animal production

    Science.gov (United States)

    Venarsky, Michael P.; Walters, David M.; Hall, Robert O.; Livers, Bridget; Wohl, Ellen

    2018-01-01

    In the Colorado Front Range (USA), disturbance history dictates stream planform. Undisturbed, old-growth streams have multiple channels and large amounts of wood and depositional habitat. Disturbed streams (wildfires and logging production, emerging aquatic insect flux, and riparian spider biomass. Organic matter and macroinvertebrate production did not differ among sites per unit area (m−2), but values were 2 ×–21 × higher in undisturbed reaches per unit of stream valley (m−1 valley) because total stream area was higher in undisturbed reaches. Insect emergence was similar among streams at the per unit area and per unit of stream valley. However, rescaling insect emergence to per meter of stream bank showed that the emerging insect biomass reaching the stream bank was lower in undisturbed sites because multi-channel reaches had 3 × more stream bank than single-channel reaches. Riparian spider biomass followed the same pattern as emerging aquatic insects, and we attribute this to bottom-up limitation caused by the multi-channeled undisturbed sites diluting prey quantity (emerging insects) reaching the stream bank (riparian spider habitat). These results show that historic landscape disturbances continue to influence stream and riparian communities in the Colorado Front Range. However, these legacy effects are only weakly influencing habitat-specific function and instead are primarily influencing stream–riparian community productivity by dictating both stream planform (total stream area, total stream bank length) and the proportional distribution of specific habitat types (pools vs riffles).

  6. Stream Response to an Extreme Defoliation Event

    Science.gov (United States)

    Gold, A.; Loffredo, J.; Addy, K.; Bernhardt, E. S.; Berdanier, A. B.; Schroth, A. W.; Inamdar, S. P.; Bowden, W. B.

    2017-12-01

    Extreme climatic events are known to profoundly impact stream flow and stream fluxes. These events can also exert controls on insect outbreaks, which may create marked changes in stream characteristics. The invasive Gypsy Moth (Lymantria dispar dispar) experiences episodic infestations based on extreme climatic conditions within the northeastern U.S. In most years, gypsy moth populations are kept in check by diseases. In 2016 - after successive years of unusually warm, dry spring and summer weather -gypsy moth caterpillars defoliated over half of Rhode Island's 160,000 forested ha. No defoliation of this magnitude had occurred for more than 30 years. We examined one RI headwater stream's response to the defoliation event in 2016 compared with comparable data in 2014 and 2015. Stream temperature and flow was gauged continuously by USGS and dissolved oxygen (DO) was measured with a YSI EXO2 sonde every 30 minutes during a series of deployments in the spring, summer and fall from 2014-2016. We used the single station, open channel method to estimate stream metabolism metrics. We also assessed local climate and stream temperature data from 2009-2016. We observed changes in stream responses during the defoliation event that suggest changes in ET, solar radiation and heat flux. Although the summer of 2016 had more drought stress (PDSI) than previous years, stream flow occurred throughout the summer, in contrast to several years with lower drought stress when stream flow ceased. Air temperature in 2016 was similar to prior years, but stream temperature was substantially higher than the prior seven years, likely due to the loss of canopy shading. DO declined dramatically in 2016 compared to prior years - more than the rising stream temperatures would indicate. Gross Primary Productivity was significantly higher during the year of the defoliation, indicating more total fixation of inorganic carbon from photo-autotrophs. In 2016, Ecosystem Respiration was also higher and Net

  7. Motion of shocks through interplanetary streams

    International Nuclear Information System (INIS)

    Burlaga, L.F.; Scudder, J.D.

    1975-01-01

    A model for the motion of flare-generated shocks through interplanetary streams is presented, illustrating the effects of a stream-shock interaction on the shock strength and geometry. It is a gas dynamic calculation based on Whitham's method and on an empirical approximation for the relevant characteristics of streams. The results show that the Mach number of a shock can decrease appreciably to near unity in the interaction region ahead of streams and that the interaction of a spherically symmetric shock with a spiral-shaped corotating stream can cause significant distortions of the initial shock front geometry. The geometry of the February 15--16, 1967, shock discussed by Lepping and Chao (1972) is qualitatively explained by this model

  8. The composition of corotating energetic particle streams

    International Nuclear Information System (INIS)

    McGuire, R.E.; von Rosenvinge, T.T.; McDonald, F.B.

    1978-01-01

    The relative abundances of 1.5--23 MeV per nucleon ions in corotating nucleon streams are compared with ion abundances in particle events associated with solar flares and with solar and solar wind abundances. He/O and C/O ratios are found to be a factor of the order 2--3 greater in corotating streams than in flare-associated events. The distribution of H/He ratios in corotating streams is found to be much narrower and of lower average value than in flare-associated events. H/He in corotating energetic particle streams compares favorably in both lack of variability and numerical value with H/He in high-speed solar wind plasma streams. The lack of variability suggests that the source population for the corotating energetic particles is the solar wind, a suggestion consistent with acceleration of the corotating particles in interplanetary space

  9. The ecology and biogeochemistry of stream biofilms.

    Science.gov (United States)

    Battin, Tom J; Besemer, Katharina; Bengtsson, Mia M; Romani, Anna M; Packmann, Aaron I

    2016-04-01

    Streams and rivers form dense networks, shape the Earth's surface and, in their sediments, provide an immensely large surface area for microbial growth. Biofilms dominate microbial life in streams and rivers, drive crucial ecosystem processes and contribute substantially to global biogeochemical fluxes. In turn, water flow and related deliveries of nutrients and organic matter to biofilms constitute major constraints on microbial life. In this Review, we describe the ecology and biogeochemistry of stream biofilms and highlight the influence of physical and ecological processes on their structure and function. Recent advances in the study of biofilm ecology may pave the way towards a mechanistic understanding of the effects of climate and environmental change on stream biofilms and the biogeochemistry of stream ecosystems.

  10. StreamExplorer: A Multi-Stage System for Visually Exploring Events in Social Streams.

    Science.gov (United States)

    Wu, Yingcai; Chen, Zhutian; Sun, Guodao; Xie, Xiao; Cao, Nan; Liu, Shixia; Cui, Weiwei

    2017-10-18

    Analyzing social streams is important for many applications, such as crisis management. However, the considerable diversity, increasing volume, and high dynamics of social streams of large events continue to be significant challenges that must be overcome to ensure effective exploration. We propose a novel framework by which to handle complex social streams on a budget PC. This framework features two components: 1) an online method to detect important time periods (i.e., subevents), and 2) a tailored GPU-assisted Self-Organizing Map (SOM) method, which clusters the tweets of subevents stably and efficiently. Based on the framework, we present StreamExplorer to facilitate the visual analysis, tracking, and comparison of a social stream at three levels. At a macroscopic level, StreamExplorer uses a new glyph-based timeline visualization, which presents a quick multi-faceted overview of the ebb and flow of a social stream. At a mesoscopic level, a map visualization is employed to visually summarize the social stream from either a topical or geographical aspect. At a microscopic level, users can employ interactive lenses to visually examine and explore the social stream from different perspectives. Two case studies and a task-based evaluation are used to demonstrate the effectiveness and usefulness of StreamExplorer.Analyzing social streams is important for many applications, such as crisis management. However, the considerable diversity, increasing volume, and high dynamics of social streams of large events continue to be significant challenges that must be overcome to ensure effective exploration. We propose a novel framework by which to handle complex social streams on a budget PC. This framework features two components: 1) an online method to detect important time periods (i.e., subevents), and 2) a tailored GPU-assisted Self-Organizing Map (SOM) method, which clusters the tweets of subevents stably and efficiently. Based on the framework, we present Stream

  11. Applied algebra codes, ciphers and discrete algorithms

    CERN Document Server

    Hardy, Darel W; Walker, Carol L

    2009-01-01

    This book attempts to show the power of algebra in a relatively simple setting.-Mathematical Reviews, 2010… The book supports learning by doing. In each section we can find many examples which clarify the mathematics introduced in the section and each section is followed by a series of exercises of which approximately half are solved in the end of the book. Additional the book comes with a CD-ROM containing an interactive version of the book powered by the computer algebra system Scientific Notebook. … the mathematics in the book are developed as needed and the focus of the book lies clearly o

  12. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  13. Ebullitive methane emissions from oxygenated wetland streams

    Science.gov (United States)

    Crawford, John T.; Stanley, Emily H.; Spawn, Seth A.; Finlay, Jacques C.; Striegl, Robert G.

    2014-01-01

    Stream and river carbon dioxide emissions are an important component of the global carbon cycle. Methane emissions from streams could also contribute to regional or global greenhouse gas cycling, but there are relatively few data regarding stream and river methane emissions. Furthermore, the available data do not typically include the ebullitive (bubble-mediated) pathway, instead focusing on emission of dissolved methane by diffusion or convection. Here, we show the importance of ebullitive methane emissions from small streams in the regional greenhouse gas balance of a lake and wetland-dominated landscape in temperate North America and identify the origin of the methane emitted from these well-oxygenated streams. Stream methane flux densities from this landscape tended to exceed those of nearby wetland diffusive fluxes as well as average global wetland ebullitive fluxes. Total stream ebullitive methane flux at the regional scale (103 Mg C yr−1; over 6400 km2) was of the same magnitude as diffusive methane flux previously documented at the same scale. Organic-rich stream sediments had the highest rates of bubble release and higher enrichment of methane in bubbles, but glacial sand sediments also exhibited high bubble emissions relative to other studied environments. Our results from a database of groundwater chemistry support the hypothesis that methane in bubbles is produced in anoxic near-stream sediment porewaters, and not in deeper, oxygenated groundwaters. Methane interacts with other key elemental cycles such as nitrogen, oxygen, and sulfur, which has implications for ecosystem changes such as drought and increased nutrient loading. Our results support the contention that streams, particularly those draining wetland landscapes of the northern hemisphere, are an important component of the global methane cycle.

  14. Experimental investigation of acoustic streaming in a cylindrical wave guide up to high streaming Reynolds numbers.

    Science.gov (United States)

    Reyt, Ida; Bailliet, Hélène; Valière, Jean-Christophe

    2014-01-01

    Measurements of streaming velocity are performed by means of Laser Doppler Velocimetry and Particle Image Velociimetry in an experimental apparatus consisting of a cylindrical waveguide having one loudspeaker at each end for high intensity sound levels. The case of high nonlinear Reynolds number ReNL is particularly investigated. The variation of axial streaming velocity with respect to the axial and to the transverse coordinates are compared to available Rayleigh streaming theory. As expected, the measured streaming velocity agrees well with the Rayleigh streaming theory for small ReNL but deviates significantly from such predictions for high ReNL. When the nonlinear Reynolds number is increased, the outer centerline axial streaming velocity gets distorted towards the acoustic velocity nodes until counter-rotating additional vortices are generated near the acoustic velocity antinodes. This kind of behavior is followed by outer streaming cells only and measurements in the near wall region show that inner streaming vortices are less affected by this substantial evolution of fast streaming pattern. Measurements of the transient evolution of streaming velocity provide an additional insight into the evolution of fast streaming.

  15. Introduction to stream: An Extensible Framework for Data Stream Clustering Research with R

    Directory of Open Access Journals (Sweden)

    Michael Hahsler

    2017-02-01

    Full Text Available In recent years, data streams have become an increasingly important area of research for the computer science, database and statistics communities. Data streams are ordered and potentially unbounded sequences of data points created by a typically non-stationary data generating process. Common data mining tasks associated with data streams include clustering, classification and frequent pattern mining. New algorithms for these types of data are proposed regularly and it is important to evaluate them thoroughly under standardized conditions. In this paper we introduce stream, a research tool that includes modeling and simulating data streams as well as an extensible framework for implementing, interfacing and experimenting with algorithms for various data stream mining tasks. The main advantage of stream is that it seamlessly integrates with the large existing infrastructure provided by R. In addition to data handling, plotting and easy scripting capabilities, R also provides many existing algorithms and enables users to interface code written in many programming languages popular among data mining researchers (e.g., C/C++, Java and Python. In this paper we describe the architecture of stream and focus on its use for data stream clustering research. stream was implemented with extensibility in mind and will be extended in the future to cover additional data stream mining tasks like classification and frequent pattern mining.

  16. The Midwest Stream Quality Assessment—Influences of human activities on streams

    Science.gov (United States)

    Van Metre, Peter C.; Mahler, Barbara J.; Carlisle, Daren M.; Coles, James F.

    2018-04-16

    Healthy streams and the fish and other organisms that live in them contribute to our quality of life. Extensive modification of the landscape in the Midwestern United States, however, has profoundly affected the condition of streams. Row crops and pavement have replaced grasslands and woodlands, streams have been straightened, and wetlands and fields have been drained. Runoff from agricultural and urban land brings sediment and chemicals to streams. What is the chemical, physical, and biological condition of Midwestern streams? Which physical and chemical stressors are adversely affecting biological communities, what are their origins, and how might we lessen or avoid their adverse effects?In 2013, the U.S. Geological Survey (USGS) conducted the Midwest Stream Quality Assessment to evaluate how human activities affect the biological condition of Midwestern streams. In collaboration with the U.S. Environmental Protection Agency National Rivers and Streams Assessment, the USGS sampled 100 streams, chosen to be representative of the different types of watersheds in the region. Biological condition was evaluated based on the number and diversity of fish, algae, and invertebrates in the streams. Changes to the physical habitat and chemical characteristics of the streams—“stressors”—were assessed, and their relation to landscape factors and biological condition was explored by using mathematical models. The data and models help us to better understand how the human activities on the landscape are affecting streams in the region.

  17. Stream Habitat Reach Summary - North Coast [ds63

    Data.gov (United States)

    California Natural Resource Agency — The shapefile is based on habitat unit level data summarized at the stream reach level. The database represents salmonid stream habitat surveys from 645 streams of...

  18. Determination of water quality index and portability of Iguedo stream ...

    African Journals Online (AJOL)

    Determination of water quality index and portability of Iguedo stream in Edo ... has been found functional in assessing the water quality of this stream based on the ... Key words: Water quality index, physicochemical parameters, Iguedo Stream.

  19. Mixed and Low-Level Treatment Facility Project. Appendix B, Waste stream engineering files, Part 1, Mixed waste streams

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-01

    This appendix contains the mixed and low-level waste engineering design files (EDFS) documenting each low-level and mixed waste stream investigated during preengineering studies for Mixed and Low-Level Waste Treatment Facility Project. The EDFs provide background information on mixed and low-level waste generated at the Idaho National Engineering Laboratory. They identify, characterize, and provide treatment strategies for the waste streams. Mixed waste is waste containing both radioactive and hazardous components as defined by the Atomic Energy Act and the Resource Conservation and Recovery Act, respectively. Low-level waste is waste that contains radioactivity and is not classified as high-level waste, transuranic waste, spent nuclear fuel, or 11e(2) byproduct material as defined by DOE 5820.2A. Test specimens of fissionable material irradiated for research and development only, and not for the production of power or plutonium, may be classified as low-level waste, provided the concentration of transuranic is less than 100 nCi/g. This appendix is a tool that clarifies presentation format for the EDFS. The EDFs contain waste stream characterization data and potential treatment strategies that will facilitate system tradeoff studies and conceptual design development. A total of 43 mixed waste and 55 low-level waste EDFs are provided.

  20. Ecological health in the Nation's streams

    Science.gov (United States)

    Carlisle, Daren M.; Woodside, Michael D.

    2013-01-01

    Aquatic biological communities, which are collections of organisms, are a direct measure of stream health because they indicate the ability of a stream to support life. This fact sheet highlights selected findings of a national assessment of stream health by the National Water-Quality Assessment (NAWQA) Program of the U.S. Geological Survey (USGS). The assessment was unique in that it integrated the condition of three biological communities—algae, macroinvertebrates, and fish—as well as measures of streamflow modification, pesticides, nutrients, and other factors. At least one biological community was altered at 83 percent of assessed streams, and the occurrence of altered communities was highest in urban streams. Streamflows were modified at 86 percent of assessed streams, and increasing severity of streamflow modification was associated with increased occurrence of altered biological communities. Agricultural and urban land use in watersheds may contribute pesticides and nutrients to stream waters, and increasing concentrations of these chemicals were associated with increased occurrence of altered biological communities.

  1. Network Monitoring as a Streaming Analytics Problem

    KAUST Repository

    Gupta, Arpit

    2016-11-02

    Programmable switches make it easier to perform flexible network monitoring queries at line rate, and scalable stream processors make it possible to fuse data streams to answer more sophisticated queries about the network in real-time. Unfortunately, processing such network monitoring queries at high traffic rates requires both the switches and the stream processors to filter the traffic iteratively and adaptively so as to extract only that traffic that is of interest to the query at hand. Others have network monitoring in the context of streaming; yet, previous work has not closed the loop in a way that allows network operators to perform streaming analytics for network monitoring applications at scale. To achieve this objective, Sonata allows operators to express a network monitoring query by considering each packet as a tuple and efficiently partitioning each query between the switches and the stream processor through iterative refinement. Sonata extracts only the traffic that pertains to each query, ensuring that the stream processor can scale traffic rates of several terabits per second. We show with a simple example query involving DNS reflection attacks and traffic traces from one of the world\\'s largest IXPs that Sonata can capture 95% of all traffic pertaining to the query, while reducing the overall data rate by a factor of about 400 and the number of required counters by four orders of magnitude. Copyright 2016 ACM.

  2. Acoustic streaming of a sharp edge.

    Science.gov (United States)

    Ovchinnikov, Mikhail; Zhou, Jianbo; Yalamanchili, Satish

    2014-07-01

    Anomalous acoustic streaming is observed emanating from sharp edges of solid bodies that are vibrating in fluids. The streaming velocities can be orders of magnitude higher than expected from the Rayleigh streaming at similar amplitudes of vibration. Acoustic velocity of fluid relative to a solid body diverges at a sharp edge, giving rise to a localized time-independent body force acting on the fluid. This force results in a formation of a localized jet. Two-dimensional numerical simulations are performed to predict acoustic streaming for low amplitude vibration using two methods: (1) Steady-state solution utilizing perturbation theory and (2) direct transient solution of the Navier-Stokes equations. Both analyses agree with each other and correctly predict the streaming of a sharp-edged vibrating blade measured experimentally. The origin of the streaming can be attributed to the centrifugal force of the acoustic fluid flow around a sharp edge. The dependence of this acoustic streaming on frequency and velocity is examined using dimensional analysis. The dependence law is devised and confirmed by numerical simulations.

  3. Quality models for audiovisual streaming

    Science.gov (United States)

    Thang, Truong Cong; Kim, Young Suk; Kim, Cheon Seog; Ro, Yong Man

    2006-01-01

    Quality is an essential factor in multimedia communication, especially in compression and adaptation. Quality metrics can be divided into three categories: within-modality quality, cross-modality quality, and multi-modality quality. Most research has so far focused on within-modality quality. Moreover, quality is normally just considered from the perceptual perspective. In practice, content may be drastically adapted, even converted to another modality. In this case, we should consider the quality from semantic perspective as well. In this work, we investigate the multi-modality quality from the semantic perspective. To model the semantic quality, we apply the concept of "conceptual graph", which consists of semantic nodes and relations between the nodes. As an typical of multi-modality example, we focus on audiovisual streaming service. Specifically, we evaluate the amount of information conveyed by a audiovisual content where both video and audio channels may be strongly degraded, even audio are converted to text. In the experiments, we also consider the perceptual quality model of audiovisual content, so as to see the difference with semantic quality model.

  4. High Definition Video Streaming Using H.264 Video Compression

    OpenAIRE

    Bechqito, Yassine

    2009-01-01

    This thesis presents high definition video streaming using H.264 codec implementation. The experiment carried out in this study was done for an offline streaming video but a model for live high definition streaming is introduced, as well. Prior to the actual experiment, this study describes digital media streaming. Also, the different technologies involved in video streaming are covered. These include streaming architecture and a brief overview on H.264 codec as well as high definition t...

  5. Fast algorithm for automatically computing Strahler stream order

    Science.gov (United States)

    Lanfear, Kenneth J.

    1990-01-01

    An efficient algorithm was developed to determine Strahler stream order for segments of stream networks represented in a Geographic Information System (GIS). The algorithm correctly assigns Strahler stream order in topologically complex situations such as braided streams and multiple drainage outlets. Execution time varies nearly linearly with the number of stream segments in the network. This technique is expected to be particularly useful for studying the topology of dense stream networks derived from digital elevation model data.

  6. Acoustofluidics 14: Applications of acoustic streaming in microfluidic devices.

    Science.gov (United States)

    Wiklund, Martin; Green, Roy; Ohlin, Mathias

    2012-07-21

    In part 14 of the tutorial series "Acoustofluidics--exploiting ultrasonic standing wave forces and acoustic streaming in microfluidic systems for cell and particle manipulation", we provide a qualitative description of acoustic streaming and review its applications in lab-on-a-chip devices. The paper covers boundary layer driven streaming, including Schlichting and Rayleigh streaming, Eckart streaming in the bulk fluid, cavitation microstreaming and surface-acoustic-wave-driven streaming.

  7. Time-Based Data Streams: Fundamental Concepts for a Data Resource for Streams

    Energy Technology Data Exchange (ETDEWEB)

    Beth A. Plale

    2009-10-10

    Real time data, which we call data streams, are readings from instruments, environmental, bodily or building sensors that are generated at regular intervals and often, due to their volume, need to be processed in real time. Often a single pass is all that can be made on the data, and a decision to discard or keep the instance is made on the spot. Too, the stream is for all practical purposes indefinite, so decisions must be made on incomplete knowledge. This notion of data streams has a different set of issues from a file, for instance, that is byte streamed to a reader. The file is finite, so the byte stream is becomes a processing convenience more than a fundamentally different kind of data. Through the duration of the project we examined three aspects of streaming data: the first, techniques to handle streaming data in a distributed system organized as a collection of web services, the second, the notion of the dashboard and real time controllable analysis constructs in the context of the Fermi Tevatron Beam Position Monitor, and third and finally, we examined provenance collection of stream processing such as might occur as raw observational data flows from the source and undergoes correction, cleaning, and quality control. The impact of this work is severalfold. We were one of the first to advocate that streams had little value unless aggregated, and that notion is now gaining general acceptance. We were one of the first groups to grapple with the notion of provenance of stream data also.

  8. Tritium removal from air streams by catalytic oxidation and water adsorption

    International Nuclear Information System (INIS)

    Sherwood, A.E.

    1976-06-01

    An effective method of capturing tritium from air streams is by catalytic oxidation followed by water adsorption on a microporous solid adsorbent. Performance of a burner/dryer combination is illustrated by overall mass balance equations. Engineering design methods for packed bed reactors and adsorbers are reviewed, emphasizing the experimental data needed for design and the effect of operating conditions on system performance

  9. How and Why Does Stream Water Temperature Vary at Small Spatial Scales in a Headwater Stream?

    Science.gov (United States)

    Morgan, J. C.; Gannon, J. P.; Kelleher, C.

    2017-12-01

    The temperature of stream water is controlled by climatic variables, runoff/baseflow generation, and hyporheic exchange. Hydrologic conditions such as gaining/losing reaches and sources of inflow can vary dramatically along a stream on a small spatial scale. In this work, we attempt to discern the extent that the factors of air temperature, groundwater inflow, and precipitation influence stream temperature at small spatial scales along the length of a stream. To address this question, we measured stream temperature along the perennial stream network in a 43 ha catchment with a complex land use history in Cullowhee, NC. Two water temperature sensors were placed along the stream network on opposite sides of the stream at 100-meter intervals and at several locations of interest (i.e. stream junctions). The forty total sensors recorded the temperature every 10 minutes for one month in the spring and one month in the summer. A subset of sampling locations where stream temperature was consistent or varied from one side of the stream to the other were explored with a thermal imaging camera to obtain a more detailed representation of the spatial variation in temperature at those sites. These thermal surveys were compared with descriptions of the contributing area at the sample sites in an effort to discern specific causes of differing flow paths. Preliminary results suggest that on some branches of the stream stormflow has less influence than regular hyporheic exchange, while other tributaries can change dramatically with stormflow conditions. We anticipate this work will lead to a better understanding of temperature patterns in stream water networks. A better understanding of the importance of small-scale differences in flow paths to water temperature may be able to inform watershed management decisions in the future.

  10. Stream sediment geochemical surveys for uranium

    International Nuclear Information System (INIS)

    Price, V.; Ferguson, R.B.

    1979-01-01

    Stream sediment is more universally available than ground and surface waters and comprises the bulk of NURE samples. Orientation studies conducted by the Savannah River Laboratory indicate that several mesh sizes can offer nearly equivalent information. Sediment is normally sieved in the field to pass a 420-micrometer screen (US Std. 40 mesh) and that portion of the dried sediment passing a 149-micrometer screen (US Std. 100 mesh) is recovered for analysis. Sampling densities usually vary with survey objectives and types of deposits anticipated. Principal geologic features that can be portrayed at a scale of 1:250,000, such as major tectonic units, plutons, and pegmatite districts, are readily defined using a sampling density of 1 site per 5 square miles (13 km 2 ). More detailed studies designed to define individual deposits require greater sampling density. Analyses for elements known to be associated with uranium in a particular mineral host may be used to estimate the relative proportion of uranium in several forms. For example, uranium may be associated with thorium and cerium in monazite, and with zirconium and hafnium in zircon. Readily leachable uranium may be adsorbed to trapped in oxide coatings on mineral particles. Soluble or mobile uranium may indicate an ore source, whereas uranium in monazite or zircon is not likely to be economically attractive. Various schemes may be used to estimate for form of uranium in a sample. Simple elemental ratios are a useful first approach. Multiple ratios and subtractive formulas empirically designed to account for the presence of particular minerals are more useful. Residuals calculated from computer-derived regression equations or factor scores appear to have the greatest potential for locating uranium anomalies

  11. Two tales of legacy effects on stream nutrient behaviour

    Science.gov (United States)

    Bieroza, M.; Heathwaite, A. L.

    2017-12-01

    historical loads of nutrients) has different effects on nutrients stream responses, depending on their dominant sources and pathways. Both types of time lags, biogeochemical for phosphorus and hydrologic for nitrate, need to be taken into account when designing and evaluating the effectiveness of the agri-environmental mitigation measures.

  12. Design Tools for Dynamic, Data-Driven, Stream Mining Systems

    Science.gov (United States)

    2015-01-01

    growth in technologies for sensing and computation has contributed to large increases in the volume of data that must be managed and analyzed in many...recognition, speaker identification, pattern recognition) and wireless communication (e.g., GSM, digital radio, NFC , Bluetooth), as well as control...systems for performance and energy consumption. In Proceedings of the IEEE Real-Time Technology and Applications Symposium, pages 124–132, 2003. [49

  13. Stream Processing Using Grammars and Regular Expressions

    DEFF Research Database (Denmark)

    Rasmussen, Ulrik Terp

    disambiguation. The first algorithm operates in two passes in a semi-streaming fashion, using a constant amount of working memory and an auxiliary tape storage which is written in the first pass and consumed by the second. The second algorithm is a single-pass and optimally streaming algorithm which outputs...... as much of the parse tree as is semantically possible based on the input prefix read so far, and resorts to buffering as many symbols as is required to resolve the next choice. Optimality is obtained by performing a PSPACE-complete pre-analysis on the regular expression. In the second part we present...... Kleenex, a language for expressing high-performance streaming string processing programs as regular grammars with embedded semantic actions, and its compilation to streaming string transducers with worst-case linear-time performance. Its underlying theory is based on transducer decomposition into oracle...

  14. Authentication for Propulsion Test Streaming Video

    Data.gov (United States)

    National Aeronautics and Space Administration — A streaming video system was developed and implemented at SSC to support various propulsion projects at SSC. These projects included J-2X and AJ-26 rocket engine...

  15. Watershed impervious cover relative to stream location

    Data.gov (United States)

    U.S. Environmental Protection Agency — Estimates of watershed (12-digit huc) impervious cover and impervious cover near streams and water body shorelines for three dates (2001, 2006, 2011) using NLCD...

  16. Radiation streaming with SAM-CE

    International Nuclear Information System (INIS)

    De Gangi, N.; Cohen, M.O.; Waluschka, E.; Steinberg, H.A.

    1980-01-01

    The SAM-CE Monte Carlo code has been employed to calculate doses, due to neutron streaming, on the operating floor and other locations of the Millstone Unit II Nuclear Power Facility. Calculated results were compared against measured doses

  17. Stream biomonitoring using macroinvertebrates around the globe

    NARCIS (Netherlands)

    Buss, Daniel F.; Carlisle, Daren M.; Chon, Tae Soo; Culp, Joseph; Harding, Jon S.; Keizer-Vlek, H.E.; Robinson, Wayne A.; Strachan, Stephanie; Thirion, Christa; Hughes, Robert M.

    2015-01-01

    Water quality agencies and scientists are increasingly adopting standardized sampling methodologies because of the challenges associated with interpreting data derived from dissimilar protocols. Here, we compare 13 protocols for monitoring streams from different regions and countries around the

  18. Reactive solute transport in acidic streams

    Science.gov (United States)

    Broshears, R.E.

    1996-01-01

    Spatial and temporal profiles of Ph and concentrations of toxic metals in streams affected by acid mine drainage are the result of the interplay of physical and biogeochemical processes. This paper describes a reactive solute transport model that provides a physically and thermodynamically quantitative interpretation of these profiles. The model combines a transport module that includes advection-dispersion and transient storage with a geochemical speciation module based on MINTEQA2. Input to the model includes stream hydrologic properties derived from tracer-dilution experiments, headwater and lateral inflow concentrations analyzed in field samples, and a thermodynamic database. Simulations reproduced the general features of steady-state patterns of observed pH and concentrations of aluminum and sulfate in St. Kevin Gulch, an acid mine drainage stream near Leadville, Colorado. These patterns were altered temporarily by injection of sodium carbonate into the stream. A transient simulation reproduced the observed effects of the base injection.

  19. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  20. Indication of pesticide effects and recolonization in streams.

    Science.gov (United States)

    Knillmann, Saskia; Orlinskiy, Polina; Kaske, Oliver; Foit, Kaarina; Liess, Matthias

    2018-07-15

    The agricultural use of pesticides leads to environmentally relevant pesticide concentrations that cause adverse effects on stream ecosystems. These effects on invertebrate community composition can be identified by the bio-indicator SPEAR pesticides . However, refuge areas have been found to partly confound the indicator. On the basis of three monitoring campaigns of 41 sites in Central Germany, we identified 11 refuge taxa. The refuge taxa, mainly characterized by dispersal-based resilience, were observed only nearby uncontaminated stream sections and independent of the level of pesticide pressure. Through incorporation of this information into the revised SPEAR pesticides indicator, the community structure specifically identified the toxic pressure and no longer depended on the presence of refuge areas. With regard to ecosystem functions, leaf litter degradation was predicted by the revised SPEAR pesticides and the median water temperature at a site (R 2  = 0.38, P = 0.003). Furthermore, we designed the bio-indicator SPEAR refuge to quantify the magnitude of general recolonization at a given stream site. We conclude that the taxonomic composition of aquatic invertebrate communities enables a specific indication of anthropogenic stressors and resilience of ecosystems. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Innovation in radioactive wastewater-stream management. Pt. 1

    International Nuclear Information System (INIS)

    Karameldin, A.

    2002-01-01

    Recently an invention of a system for volume reduction of the wastewater streams present in SDTs has been achieved. This system substantially utilized the air conditioning and ventilation techniques in water transfer from the wastewater to air. This process is promoted by a mutual heating and humidification of a compressed dry air introduced through SDTs (or in another tank). From the probable release of radioactive nuclides point of view, the analysis of the evaporation of waste streams present in SDTs have been indicated that the proposed optimal evaporating temperature is round 75 C. The design curve of the daily volumetric reduction of the wastewater streams versus the necessary volumetric airflow rates at different operating temperature has been achieved. The evaporating temperature varied from 40 C to 95 C with a step of 5 C. The obtained curve illustrates that the required volumetric airflow rate utilized to evaporate one m 3 /day (when maintaining SDTs at the temperature 75 C) is less than 90 m 3 /h. The assessments of the obtained curve have been indicated that this system is feasible and viable, economic and has no secondary waste residuals. Recently, an experimental facility proposed to be constructed to obtain the optimal operating parameters of the system, regarding to the probable emissions of the radioactive nuclides within the permissible release limits. (authors)

  2. Fragmentation and quench behavior of corium melt streams in water

    International Nuclear Information System (INIS)

    Spencer, B.W.; Wang, K.; Blomquist, C.A.; McUmber, L.M.; Schneider, J.P.

    1994-02-01

    The interaction of molten core materials with water has been investigated for the pour stream mixing mode. This interaction plays a crucial role during the later stages of in-vessel core melt progression inside a light water reactor such as during the TMI-2 accident. The key issues which arise during the molten core relocation include: (i) the thermal attack and possible damage to the RPV lower head from the impinging molten fuel stream and/or the debris bed, (ii) the molten fuel relocation pathways including the effects of redistribution due to core support structure and the reactor lower internals, (iii) the quench rate of the molten fuel through the water in the lower plenum, (iv) the steam generation and hydrogen generation during the interaction, (v) the transient pressurization of the primary system, and (vi) the possibility of a steam explosion. In order to understand these issues, a series of six experiments (designated CCM-1 through -6) was performed in which molten corium passed through a deep pool of water in a long, slender pour stream mode. Results discussed include the transient temperatures and pressures, the rate and magnitude of steam/hydrogen generation, and the posttest debris characteristics

  3. Restoring Wood-Rich Hotspots in Mountain Stream Networks

    Science.gov (United States)

    Wohl, E.; Scott, D.

    2016-12-01

    Mountain streams commonly include substantial longitudinal variability in valley and channel geometry, alternating repeatedly between steep, narrow and relatively wide, low gradient segments. Segments that are wider and lower gradient than neighboring steeper sections are hotspots with respect to: retention of large wood (LW) and finer sediment and organic matter; uptake of nutrients; and biomass and biodiversity of aquatic and riparian organisms. These segments are also more likely to be transport-limited with respect to floodplain and instream LW. Management designed to protect and restore riverine LW and the physical and ecological processes facilitated by the presence of LW is likely to be most effective if focused on relatively low-gradient stream segments. These segments can be identified using a simple, reach-scale gradient analysis based on high-resolution DEMs, with field visits to identify factors that potentially limit or facilitate LW recruitment and retention, such as forest disturbance history or land use. Drawing on field data from the western US, this presentation outlines a procedure for mapping relatively low-gradient segments in a stream network and for identifying those segments where LW reintroduction or retention is most likely to balance maximizing environmental benefits derived from the presence of LW while minimizing hazards associated with LW.

  4. Compensatory stream and wetland mitigation in North Carolina: an evaluation of regulatory success.

    Science.gov (United States)

    Hill, Tammy; Kulz, Eric; Munoz, Breda; Dorney, John R

    2013-05-01

    Data from a probability sample were used to estimate wetland and stream mitigation success from 2007 to 2009 across North Carolina (NC). "Success" was defined as whether the mitigation site met regulatory requirements in place at the time of construction. Analytical results were weighted by both component counts and mitigation size. Overall mitigation success (including preservation) was estimated at 74 % (SE = 3 %) for wetlands and 75 % (SE = 4 %) for streams in NC. Compared to the results of previous studies, wetland mitigation success rates had increased since the mid-1990s. Differences between mitigation providers (mitigation banks, NC Ecosystem Enhancement Program's design-bid-build and full-delivery programs, NC Department of Transportation and private permittee-responsible mitigation) were generally not significant although permittee-responsible mitigation yielded higher success rates in certain circumstances. Both wetland and stream preservation showed high rates of success and the stream enhancement success rate was significantly higher than that of stream restoration. Additional statistically significant differences when mitigation size was considered included: (1) the Piedmont yielded a lower stream mitigation success rate than other areas of the state, and (2) recently constructed wetland mitigation projects demonstrated a lower success rate than those built prior to 2002. Opportunities for improvement exist in the areas of regulatory record-keeping, understanding the relationship between post-construction establishment and long-term ecological trajectories of stream and wetland restoration projects, incorporation of numeric ecological metrics into mitigation monitoring and success criteria, and adaptation of stream mitigation designs to achieve greater success in the Piedmont.

  5. Side Stream Filtration for Cooling Towers

    Energy Technology Data Exchange (ETDEWEB)

    None

    2012-10-20

    This technology evaluation assesses side stream filtration options for cooling towers, with an objective to assess key attributes that optimize energy and water savings along with providing information on specific technology and implementation options. This information can be used to assist Federal sites to determine which options may be most appropriate for their applications. This evaluation provides an overview of the characterization of side stream filtration technology, describes typical applications, and details specific types of filtration technology.

  6. Stream sediment sampling and analysis. Final report

    International Nuclear Information System (INIS)

    Means, J.L.; Voris, P.V.; Headington, G.L.

    1986-04-01

    The objectives were to sample and analyze sediments from upstream and downstream locations (relative to the Goodyear Atomic plant site) of three streams for selected pollutants. The three streams sampled were the Scioto River, Big Beaver Creek, and Big Run Creek. Sediment samples were analyzed for EPA's 129 priority pollutants (Clean Water Act) as well as isotopic uranium ( 234 U, 235 U, and 238 U) and technetium-99

  7. Landscaping Considerations for Urban Stream Restoration Projects

    National Research Council Canada - National Science Library

    Bailey, Pam

    2004-01-01

    ... after restoration and its functionality for public use. The landscaping component of such stream and riparian restoration projects must be emphasized given its importance of visual success and public perception. The purpose of this technical note is to address landscaping considerations associated with urban stream and riparian restoration projects, and provide ideas to managers for enhancing the visual appeal and aesthetic qualities of urban projects.

  8. Rotenone persistence model for montane streams

    Science.gov (United States)

    Brown, Peter J.; Zale, Alexander V.

    2012-01-01

    The efficient and effective use of rotenone is hindered by its unknown persistence in streams. Environmental conditions degrade rotenone, but current label instructions suggest fortifying the chemical along a stream based on linear distance or travel time rather than environmental conditions. Our objective was to develop models that use measurements of environmental conditions to predict rotenone persistence in streams. Detailed measurements of ultraviolet radiation, water temperature, dissolved oxygen, total dissolved solids (TDS), conductivity, pH, oxidation–reduction potential (ORP), substrate composition, amount of organic matter, channel slope, and travel time were made along stream segments located between rotenone treatment stations and cages containing bioassay fish in six streams. The amount of fine organic matter, biofilm, sand, gravel, cobble, rubble, small boulders, slope, pH, TDS, ORP, light reaching the stream, energy dissipated, discharge, and cumulative travel time were each significantly correlated with fish death. By using logistic regression, measurements of environmental conditions were paired with the responses of bioassay fish to develop a model that predicted the persistence of rotenone toxicity in streams. This model was validated with data from two additional stream treatment reaches. Rotenone persistence was predicted by a model that used travel time, rubble, and ORP. When this model predicts a probability of less than 0.95, those who apply rotenone can expect incomplete eradication and should plan on fortifying rotenone concentrations. The significance of travel time has been previously identified and is currently used to predict rotenone persistence. However, rubble substrate, which may be associated with the degradation of rotenone by adsorption and volatilization in turbulent environments, was not previously considered.

  9. Hydraulic Aspects of Vegetation Maintanence in Streams

    DEFF Research Database (Denmark)

    Larsen, Torben; Vestergaard, Kristian

    1991-01-01

    This paper describes the importance of the underwater vegetation on Danish streams and some of the consequences of vegetation maintenance. the influence of the weed on the hydraulic conditions is studied through experiments in a smaller stream and the effect of cutting channels through the weed...... is measured. A method for predicting the Manning's n as a function of the discharge conditions is suggested, and also a working hypothesis for predictions of the effect of channel cutting is presented....

  10. Information Behavior on Social Live Streaming Services

    Directory of Open Access Journals (Sweden)

    Scheibe, Katrin

    2016-06-01

    Full Text Available In the last few years, a new type of synchronous social networking services (SNSs has emerged—social live streaming services (SLSSs. Studying SLSSs is a new and exciting research field in information science. What information behaviors do users of live streaming platforms exhibit? In our empirical study we analyzed information production behavior (i.e., broadcasting as well as information reception behavior (watching streams and commenting on them. We conducted two quantitative investigations, namely an online survey with YouNow users (N = 123 and observations of live streams on YouNow (N = 434. YouNow is a service with video streams mostly made by adolescents for adolescents. YouNow users like to watch streams, to chat while watching, and to reward performers by using emoticons. While broadcasting, there is no anonymity (as in nearly all other WWW services. Synchronous SNSs remind us of the film The Truman Show, as anyone has the chance to consciously broadcast his or her own life real-time.

  11. REVISED STREAM CODE AND WASP5 BENCHMARK

    International Nuclear Information System (INIS)

    Chen, K

    2005-01-01

    STREAM is an emergency response code that predicts downstream pollutant concentrations for releases from the SRS area to the Savannah River. The STREAM code uses an algebraic equation to approximate the solution of the one dimensional advective transport differential equation. This approach generates spurious oscillations in the concentration profile when modeling long duration releases. To improve the capability of the STREAM code to model long-term releases, its calculation module was replaced by the WASP5 code. WASP5 is a US EPA water quality analysis program that simulates one-dimensional pollutant transport through surface water. Test cases were performed to compare the revised version of STREAM with the existing version. For continuous releases, results predicted by the revised STREAM code agree with physical expectations. The WASP5 code was benchmarked with the US EPA 1990 and 1991 dye tracer studies, in which the transport of the dye was measured from its release at the New Savannah Bluff Lock and Dam downstream to Savannah. The peak concentrations predicted by the WASP5 agreed with the measurements within ±20.0%. The transport times of the dye concentration peak predicted by the WASP5 agreed with the measurements within ±3.6%. These benchmarking results demonstrate that STREAM should be capable of accurately modeling releases from SRS outfalls

  12. Controlling the acoustic streaming by pulsed ultrasounds.

    Science.gov (United States)

    Hoyos, Mauricio; Castro, Angélica

    2013-01-01

    We propose a technique based on pulsed ultrasounds for controlling, reducing to a minimum observable value the acoustic streaming in closed ultrasonic standing wave fluidic resonators. By modifying the number of pulses and the repetition time it is possible to reduce the velocity of the acoustic streaming with respect to the velocity generated by the continuous ultrasound mode of operation. The acoustic streaming is observed at the nodal plane where a suspension of 800nm latex particles was focused by primary radiation force. A mixture of 800nm and 15μm latex particles has been also used for showing that the acoustic streaming is hardly reduced while primary and secondary forces continue to operate. The parameter we call "pulse mode factor" i.e. the time of applied ultrasound divided by the duty cycle, is found to be the adequate parameter that controls the acoustic streaming. We demonstrate that pulsed ultrasound is more efficient for controlling the acoustic streaming than the variation of the amplitude of the standing waves. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. South Stream Project and the Ukrainian Factor

    Directory of Open Access Journals (Sweden)

    Roxana Ioana Banciu

    2015-03-01

    Full Text Available The paper seeks to develop an analysis of the South Stream project in view of the Ukrainian crisis. We cannot put aside the internal factor as Ukraine is facing serious internal issues such as corruption and instability, therefore Russia’s invasion of Ukraine can not be simply ignored in this pipeline project. The article uses mostly facts that happened throughout last years, as well as for and against declarations in the case of the South Stream project and its mother Russia. When we hear about South Stream, we think of Russia and since 2007, this pipeline has encouraged Putin’s faith in energy superpower. A good point to start with was to gather all declarations since then and cover all actions that regard the South Stream game. In Russian foreign policy for the South Stream race, Soft Power was used more than enough and it has recently made room for Hard Power, which is the Ukraine never ending episode. Insights of the South Stream story have been lately related both softly and hardly, this is the reason why I have chosen to analyse both sides in order to complete the energy landscape.

  14. Online feature selection with streaming features.

    Science.gov (United States)

    Wu, Xindong; Yu, Kui; Ding, Wei; Wang, Hao; Zhu, Xingquan

    2013-05-01

    We propose a new online feature selection framework for applications with streaming features where the knowledge of the full feature space is unknown in advance. We define streaming features as features that flow in one by one over time whereas the number of training examples remains fixed. This is in contrast with traditional online learning methods that only deal with sequentially added observations, with little attention being paid to streaming features. The critical challenges for Online Streaming Feature Selection (OSFS) include 1) the continuous growth of feature volumes over time, 2) a large feature space, possibly of unknown or infinite size, and 3) the unavailability of the entire feature set before learning starts. In the paper, we present a novel Online Streaming Feature Selection method to select strongly relevant and nonredundant features on the fly. An efficient Fast-OSFS algorithm is proposed to improve feature selection performance. The proposed algorithms are evaluated extensively on high-dimensional datasets and also with a real-world case study on impact crater detection. Experimental results demonstrate that the algorithms achieve better compactness and higher prediction accuracy than existing streaming feature selection algorithms.

  15. Strategies for managing the effects of urban development on streams

    Science.gov (United States)

    Cappiella, Karen; Stack, William P.; Fraley-McNeal, Lisa; Lane, Cecilia; McMahon, Gerard

    2012-01-01

    Urban development remains an important agent of environmental change in the United States. The U.S. population grew by 17 percent from 1982 to 1997, while urbanized land area grew by 47 percent, suggesting that urban land consumption far outpaced population growth (Fulton and others, 2001; Sierra Club, 2003; American Farmland Trust, 2009). Eighty percent of Americans now live in metropolitan areas. Each American effectively occupies about 20 percent more developed land (for housing, schools, shopping, roads, and other related services) than 20 years ago (Markham and Steinzor, 2006). Passel and Cohn (2008) predict a dramatic 48 percent increase in the population of the United States from 2005 to 2050. The advantages and challenges of living in these developed areas—convenience, congestion, employment, pollution—are part of the day-to-day realities of most Americans. Nowhere are the environmental changes associated with urban development more evident than in urban streams. The U.S. Geological Survey's National Water-Quality Assessment (NAWQA) Program investigation of the effects of urban development on stream ecosystems (EUSE) during 1999–2004 provides the most spatially comprehensive analysis of stream impacts of urban development that has been completed in the United States. A nationally consistent study design was used in nine metropolitan areas of the United States—Portland, Oregon; Salt Lake City, Utah; Birmingham, Alabama; Atlanta, Georgia; Raleigh, North Carolina; Boston, Massachusetts; Denver, Colorado; Dallas, Texas; and Milwaukee, Wisconsin. A summary report published as part of the EUSE study describes several of these impacts on urban streams (Coles and others, 2012).

  16. The Stream-Catchment (StreamCat) and Lake-Catchment ...

    Science.gov (United States)

    Background/Question/MethodsLake and stream conditions respond to both natural and human-related landscape features. Characterizing these features within contributing areas (i.e., delineated watersheds) of streams and lakes could improve our understanding of how biological conditions vary spatially and improve the use, management, and restoration of these aquatic resources. However, the specialized geospatial techniques required to define and characterize stream and lake watersheds has limited their widespread use in both scientific and management efforts at large spatial scales. We developed the StreamCat and LakeCat Datasets to model, predict, and map the probable biological conditions of streams and lakes across the conterminous US (CONUS). Both StreamCat and LakeCat contain watershed-level characterizations of several hundred natural (e.g., soils, geology, climate, and land cover) and anthropogenic (e.g., urbanization, agriculture, mining, and forest management) landscape features for ca. 2.6 million stream segments and 376,000 lakes across the CONUS, respectively. These datasets can be paired with field samples to provide independent variables for modeling and other analyses. We paired 1,380 stream and 1,073 lake samples from the USEPAs National Aquatic Resource Surveys with StreamCat and LakeCat and used random forest (RF) to model and then map an invertebrate condition index and chlorophyll a concentration, respectively. Results/ConclusionsThe invertebrate

  17. PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liao Jianxin; Lei Zhengxiong; Ma Xutao; Zhu Xiaomin

    2006-01-01

    A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strategy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.

  18. Geology, Streamflow, and Water Chemistry of the Talufofo Stream Basin, Saipan, Northern Mariana Islands

    Science.gov (United States)

    Izuka, Scot K.; Ewart, Charles J.

    1995-01-01

    A study of the geology, streamflow, and water chemistry of Talufofo Stream Basin, Saipan, Commonwealth of the Northern Mariana Islands, was undertaken to determine the flow characteristics of Talufofo Stream and the relation to the geology of the drainage basin. The Commonwealth government is exploring the feasibility of using water from Talufofo Stream to supplement Saipan's stressed municipal water supply. Streamflow records from gaging stations on the principal forks of Talufofo Stream indicate that peak streamflows and long-term average flow are higher at the South Fork gaging station than at the Middle Fork gaging station because the drainage area of the South Fork gaging station is larger, but persistent base flow from ground-water discharge during dry weather is greater in the Middle Fork gaging station. The sum of the average flows at the Middle Fork and South Fork gaging stations, plus an estimate of the average flow at a point in the lower reaches of the North Fork, is about 2.96 cubic feet per second or 1.91 million gallons per day. Although this average represents the theoretical maximum long-term draft rate possible from the Talufofo Stream Basin if an adequate reservoir can be built, the actual amount of surface water available will be less because of evaporation, leaks, induced infiltration, and reservoir-design constraints. Base-flow characteristics, such as stream seepage and spring discharge, are related to geology of the basin. Base flow in the Talufofo Stream Basin originates as discharge from springs near the base of limestones located in the headwaters of Talufofo Stream, flows over low-permeability volcanic rocks in the middle reaches, and seeps back into the high-permeability limestones in the lower reaches. Water sampled from Talufofo Stream during base flow had high dissolved-calcium concentrations (between 35 and 98 milligrams per liter), characteristic of water from a limestone aquifer. Concentrations of potassium, sodium, and chloride

  19. Resource synergy in stream periphyton communities

    Energy Technology Data Exchange (ETDEWEB)

    Hill, Walter [University of Illinois, Urbana-Champaign; Fanta, S.E. [University of Illinois; Roberts, Brian J [ORNL; Francoeur, Steven N. [Eastern Michigan University, Ypsilanti, MI

    2011-03-01

    1. Light and nutrients play pivotal roles in determining the growth of autotrophs, yet the potential for synergistic interactions between the two resources in algal communities is poorly understood, especially in stream ecosystems. In this study, light and phosphorus were manipulated in large experimental streams to examine resource colimitation and synergy in stream periphyton. 2. Whole-stream metabolism was simultaneously limited by light and phosphorus. Increasing the supply of either light or phosphorus resulted in significant increases in primary production and the transformation of the streams from heterotrophy to autotrophy. 3. Resource-driven changes in periphyton community structure occurred in concert with changes in production. Algal assemblages in highly shaded streams were composed primarily of small diatoms such as Achnanthidium minutissima, whereas larger diatoms such as Melosira varians predominated at higher irradiances. Phosphorus enrichment had relatively little effect on assemblage structure, but it did substantially diminish the abundance of Meridion circulare, a diatom whose mucilaginous colonies were conspicuously abundant in phosphorus-poor, high-light streams. Bacterial biomass declined relative to algal biomass with increases in primary productivity, regardless of whether the increases were caused by light or phosphorus. 4. Synergistic effects on primary production appeared to occur because the availability of one resource facilitated the utilization of the other. Light increased the abundance of large diatoms, which are known to convert high concentrations of nutrients into primary production more effectively than smaller taxa. Phosphorus enrichment led to the replacement of Meridion circulare by non-mucilaginous taxa in phosphorus-enriched streams, and we hypothesize that this change enabled more efficient use of light in photosynthesis. Higher ratios of chlorophyll a : biomass in phosphorus-enriched streams may have also led to more

  20. THE ORBIT OF THE ORPHAN STREAM

    International Nuclear Information System (INIS)

    Newberg, Heidi Jo; Willett, Benjamin A.; Yanny, Brian; Xu Yan

    2010-01-01

    We use recent Sloan Extension for Galactic Understanding and Exploration (SEGUE) spectroscopy and the Sloan Digital Sky Survey (SDSS) and SEGUE imaging data to measure the sky position, distance, and radial velocities of stars in the tidal debris stream that is commonly referred to as the 'Orphan Stream'. We fit orbital parameters to the data and find a prograde orbit with an apogalacticon, perigalacticon, and eccentricity of 90 kpc, 16.4 kpc, and e = 0.7, respectively. Neither the dwarf galaxy UMa II nor the Complex A gas cloud has velocities consistent with a kinematic association with the Orphan Stream. It is possible that Segue-1 is associated with the Orphan Stream, but no other known Galactic clusters or dwarf galaxies in the Milky Way lie along its orbit. The detected portion of the stream ranges from 19 to 47 kpc from the Sun and is an indicator of the mass interior to these distances. There is a marked increase in the density of Orphan Stream stars near (l, b) = (253 0 , 49 0 ), which could indicate the presence of the progenitor at the edge of the SDSS data. If this is the progenitor, then the detected portion of the Orphan Stream is a leading tidal tail. We find blue horizontal branch (BHB) stars and F turnoff stars associated with the Orphan Stream. The turnoff color is (g - r) 0 = 0.22. The BHB stars have a low metallicity of [Fe/H] WBG = -2.1. The orbit is best fit to a halo potential with a halo plus disk mass of about 2.6 x 10 11 M sun , integrated to 60 kpc from the Galactic center. Our fits are done to orbits rather than full N-body simulations; we show that if N-body simulations are used, the inferred mass of the galaxy would be slightly smaller. Our best fit is found with a logarithmic halo speed of v halo = 73 ± 24 km s -1 , a disk+bulge mass of M(R 11 M sun , and a halo mass of M(R 11 M sun . However, we can find similar fits to the data that use a Navarro-Frenk-White halo profile or that have smaller disk masses and correspondingly larger