WorldWideScience

Sample records for unit connection scheme

  1. An improved current control scheme for grid-connected DG unit based distribution system harmonic compensation

    DEFF Research Database (Denmark)

    He, Jinwei; Wei Li, Yun; Wang, Xiongfei;

    2013-01-01

    In order to utilize DG unit interfacing converters to actively compensate distribution system harmonics, this paper proposes an enhanced current control approach. It seamlessly integrates system harmonic mitigation capabilities with the primary DG power generation function. As the proposed curren...

  2. A Scheme for Connecting Quantum Components

    Institute of Scientific and Technical Information of China (English)

    TAN Xiao-Hui; FANG Xi-Ming; WANG Guo-You

    2006-01-01

    @@ We propose an approach to connect components of a quantum computer by using a linear cluster state, with which an arbitrary N-particle state can be perfectly propagated between quantum components in two ways that are based on feedback measurements and local transformation.

  3. Power flow control schemes for series-connected FACTS controllers

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Yang; Kazerani, Mehrdad [University of Waterloo, Department of Electrical & amp; Computer Engineering, Waterloo, Ont. (Canada N2L 3G1)

    2006-06-15

    Unified power flow controller (UPFC) and interline power flow controller (IPFC) are FACTS devices that can control the power flow in transmission lines by injecting active and reactive voltage components in series with the lines, using power converter modules, based on an externally regulated dc-link voltage. One key issue, in this application, is to find a relationship between the injected voltage and the resulting power flow in the line. In this paper, this relationship is derived analytically, and used to design two power flow control schemes. The proposed control schemes are applicable to any series-connected FACTS controller with the capability of producing a controllable voltage. In this paper, the proposed power flow control schemes are applied to a voltage-sourced converter-based IPFC, and the resulting control performances are examined using PSCAD/EMTDC simulation package. The simulation results show the effectiveness of the proposed power flow control schemes. (author)

  4. A Semantic Connected Coherence Scheme for Efficient Image Segmentation

    Directory of Open Access Journals (Sweden)

    S.Pannirselvam

    2012-06-01

    Full Text Available Image processing is a comprehensively research topic with an elongated history. Segmenting an image is the most challenging and difficult task in image processing and analysis. The principal intricacy met in image segmentation is the ability of techniques to discover semantic objects efficiently from an image without any prior knowledge. One recent work presented connected coherence tree algorithm (CCTA for image segmentation (with no prior knowledge which discovered regions of semantic coherence based on neighbor coherence segmentation criteria. It deployed an adaptive spatial scale and a suitable intensity-difference scale to extract several sets of coherent neighboring pixels and maximize the probability of single image content and minimize complex backgrounds. However CCTA segmented images either consists of small, lengthy and slender objects or rigorously ruined by noise, irregular lighting, occlusion, poor illumination, and shadow.In this paper, we present a Cluster based Semantic Coherent Tree (CBSCT scheme for image segmentation. CBSCT’s initial work is on the semantic connected coherence criteria for the image segregation. Semantic coherent regions are clustered based on Bayesian nearest neighbor search of neighborhood pixels. The segmentation regions are extracted from the images based on the cluster object purity obtained through semantic coherent regions. The clustered image regions are post processed with non linear noise filters. Performance metrics used in the evaluation of CBSCT are semantic coherent pixel size, number of cluster objects, and purity levels of the cluster, segmented coherent region intensity threshold, and quality of segmented images in terms of image clarity with PSNR.

  5. Admissibility, stable units and connected components

    CERN Document Server

    Xarez, J J

    2011-01-01

    Consider a reflection from a finitely-complete category $\\mathbb{C}$ into its full subcategory $\\mathbb{M}$, with unit $\\eta :1_\\mathbb{C}\\rightarrow HI$. Suppose there is a left-exact functor $U$ into the category of sets, such that $UH$ reflects isomorphisms and $U(\\eta_C)$ is a surjection, for every $C\\in\\mathbb{C}$. If, in addition, all the maps $\\mathbb{M}(T,M)\\rightarrow \\mathbf{Set}(1,U(M))$ induced by the functor $UH$ are surjections, where $T$ and 1 are respectively terminal objects in $\\mathbb{C}$ and $\\mathbf{Set}$, for every object $M$ in the full subcategory $\\mathbb{M}$, then it is true that: the reflection $H\\vdash I$ is semi-left-exact (admissible in the sense of categorical Galois theory) if and only if its connected components are "connected"; it has stable units if and only if any finite product of connected components is "connected". Where the meaning of "connected" is the usual in categorical Galois theory, and the definition of connected component with respect to the ground structure wil...

  6. A Multidata Connection Scheme for Big Data High-Dimension Using the Data Connection Coefficient

    Directory of Open Access Journals (Sweden)

    Yoon-su Jeong

    2015-01-01

    Full Text Available In the era of big data and cloud computing, sources and types of data vary, and the volume and flow of data are massive and continuous. With the widespread use of mobile devices and the Internet, huge volumes of data distributed over heterogeneous networks move forward and backward across networks. In order to meet the demands of big data service providers and customers, efficient technologies for processing and transferring big data over networks are needed. This paper proposes a multidata connection (MDC scheme that decreases the amount of power and time necessary for information to be communicated between the content server and the mobile users (i.e., the content consumers who are moving freely across different networks while using their mobile devices. MDC scheme is an approach to data validation that requires the presentation of two or more pieces of data in a heterogeneous environment of big data. The MDC transmits the difference of the consecutive data sequences instead of sending the data itself to the receiver, thus increasing transmission throughput and speed.

  7. INTERNET CONNECTIVITY FOR MASS PRODUCED UNITS WITHOUT USER INTERFACE

    DEFF Research Database (Denmark)

    2000-01-01

    To the manufacturer of mass produced units without a user interface, typically field level units, connection of these units to a communications network for enabling servicing, control and trackability is of interest. To provide this connection, a solution is described in which an interface...... comprising an ASIC is built into a mass produced unit, whereby the ASIC is incorporating selected portions of selected layers of the Internet Protocol. The mass produced unit is then allocated a unit address....

  8. On the Torsion Units of Integral Adjacency Algebras of Finite Association Schemes

    Directory of Open Access Journals (Sweden)

    Allen Herman

    2014-01-01

    Full Text Available Torsion units of group rings have been studied extensively since the 1960s. As association schemes are generalization of groups, it is natural to ask about torsion units of association scheme rings. In this paper we establish some results about torsion units of association scheme rings analogous to basic results for torsion units of group rings.

  9. Recovery schemes for different distributed connection management in generalized multi-protocol label switching networks

    Institute of Scientific and Technical Information of China (English)

    Can Wang; Yuefeng Ji

    2007-01-01

    As the wavelength division multiplexing (WDM) technology matures and the demands for bandwidth increase, survivability becomes more and more important in generalized multi-protocol label switching (GMPLS) controlled intelligent optical networks (IONs). There are great interests to study the performance of restorability under one certain connection management strategy. And studies in the problem of providing recovery from link failures under two different resource reservation schemes, forward reservation protocols (FRPs) and backward reservation protocols (BRPs), are presented. They are examined from the point of view of connection blocking probability, restorability and average recovery time. The two different connection management schemes and the survey of different recovery schemes are first presented. The performance of these recovery strategies is analyzed and compared both through theoretical analysis and simulation results. The main stressed idea is that using BRPs gives the best performance in terms of restorability and blocking probability in restorable GMPLS networks.

  10. Lyapunov-Based Control Scheme for Single-Phase Grid-Connected PV Central Inverters

    NARCIS (Netherlands)

    Meza, C.; Biel, D.; Jeltsema, D.; Scherpen, J. M. A.

    2012-01-01

    A Lyapunov-based control scheme for single-phase single-stage grid-connected photovoltaic central inverters is presented. Besides rendering the closed-loop system globally stable, the designed controller is able to deal with the system uncertainty that depends on the solar irradiance. A laboratory p

  11. Lyapunov-Based Control Scheme for Single-Phase Grid-Connected PV Central Inverters

    NARCIS (Netherlands)

    Meza, C.; Biel, D.; Jeltsema, D.; Scherpen, J. M. A.

    2012-01-01

    A Lyapunov-based control scheme for single-phase single-stage grid-connected photovoltaic central inverters is presented. Besides rendering the closed-loop system globally stable, the designed controller is able to deal with the system uncertainty that depends on the solar irradiance. A laboratory p

  12. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  13. Enhancing spoken connected-digit recognition accuracy by error correction codes – A novel scheme

    Indian Academy of Sciences (India)

    Sunil K Kopparapu; P V S Rao

    2004-10-01

    Recognizing spoken connected-digit numbers accurately is an important problem and has very many applications. Though state-of-the-art word recognition systems have gained acceptable accuracy levels, the accuracy of recognition of current connected spoken digits (and other short words) is very poor. In this paper, we develop a novel scheme to enhance the accuracy of recognizing a connected number. The basic idea proposed in this paper is to increase the number of digits in a number and use these appended digits to increase the overall accuracy of recognizing the number, as is done in the error-correcting code literature. We further show that the developed scheme is able to uniquely and exactly correct single-digit errors.

  14. Fishing for meaningful units in connected speech

    DEFF Research Database (Denmark)

    Henrichsen, Peter Juel; Christiansen, Thomas Ulrich

    2009-01-01

    In many branches of spoken language analysis including ASR, the set of smallest meaningful units of speech is taken to coincide with the set of phones or phonemes. However, fishing for phones is difficult, error-prone, and computationally expensive. We present an experiment, based on machine...

  15. Fishing for meaningful units in connected speech

    DEFF Research Database (Denmark)

    Henrichsen, Peter Juel; Christiansen, Thomas Ulrich

    2009-01-01

    was far lower than for phonemic recognition. Our findings show that it is possible to automatically characterize a linguistic message, without detailed spectral information or presumptions about the target units. Further, fishing for simple meaningful cues and enhancing these selectively would potentially...... be a more effective way of achieving intelligibility transfer, which is the end goal for speech transducing technologies....

  16. Adapting Parcellation Schemes to Study Fetal Brain Connectivity in Serial Imaging Studies

    DEFF Research Database (Denmark)

    Cheng, Xi; Wilm, Jakob; Seshamani, Sharmishtaa

    2013-01-01

    of the developing fetal brain such functional and associated structural markers are not consistently present over time. In this study we adapt two non-atlas based parcellation schemes to study the development of connectivity networks of a fetal monkey brain using Diffusion Weighted Imaging techniques. Results......A crucial step in studying brain connectivity is the definition of the Regions Of Interest (ROI's) which are considered as nodes of a network graph. These ROI's identified in structural imaging reflect consistent functional regions in the anatomies being compared. However in serial studies...

  17. A scheme for synchronizing clocks connected by a packet communication network

    Science.gov (United States)

    dos Santos, R. V.; Monteiro, L. H. A.

    2012-07-01

    Consider a communication system in which a transmitter equipment sends fixed-size packets of data at a uniform rate to a receiver equipment. Consider also that these equipments are connected by a packet-switched network, which introduces a random delay to each packet. Here we propose an adaptive clock recovery scheme able of synchronizing the frequencies and the phases of these devices, within specified limits of precision. This scheme for achieving frequency and phase synchronization is based on measurements of the packet arrival times at the receiver, which are used to control the dynamics of a digital phase-locked loop. The scheme performance is evaluated via numerical simulations performed by using realistic parameter values.

  18. Dynamical real-space renormalization group calculations with a highly connected clustering scheme on disordered networks.

    Science.gov (United States)

    Balcan, D; Erzan, A

    2005-02-01

    We have defined a type of clustering scheme preserving the connectivity of the nodes in a network, ignored by the conventional Migdal-Kadanoff bond moving process. In high dimensions, our clustering scheme performs better for correlation length and dynamical critical exponents than the conventional Migdal-Kadanoff bond moving scheme. In two and three dimensions we find the dynamical critical exponents for the kinetic Ising model to be z=2.13 and z=2.09 , respectively, at the pure Ising fixed point. These values are in very good agreement with recent Monte Carlo results. We investigate the phase diagram and the critical behavior of randomly bond diluted lattices in d=2 and 3 in the light of this transformation. We also provide exact correlation exponent and dynamical critical exponent values on hierarchical lattices with power-law and Poissonian degree distributions.

  19. Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment

    Directory of Open Access Journals (Sweden)

    Jun-jun Wu

    2012-09-01

    Full Text Available Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile terminal and further affect the security of mobile network. But the traditional access control and authentication mechanism cannot resolve such security issues. On the basis of trusted computing technology, we proposed a mobile trusted network architecture by extending the trusted network connection in mobile environment. And an improvement EAP-EHash method is used in the proposed architecture to implement authentication. We defined two service scenarios in the authentication scheme, home network authentication and roaming network authentication. The process of each scenario is described in detail. By introducing the pseudonym mechanism, our scheme can protect user identity. And the connection status not only depends on the identification process, but also the trust status of the platform. The analysis shows that our scheme benefits the properties of user identity anonymity, mutual authentication, fake agent resistance, platform integrity verification, EAP and TNC Compatible. And the ciphersuite negotiation makes our scheme more suitable for resource limited mobile terminals.

  20. Adaptive Protection Scheme for a Distribution System Considering Grid-Connected and Islanded Modes of Operation

    Directory of Open Access Journals (Sweden)

    Yavuz Ates

    2016-05-01

    Full Text Available The renewable energy-based distributed generation (DG implementation in power systems has been an active research area during the last few decades due to several environmental, economic and political factors. Although the integration of DG offers many advantages, several concerns, including protection schemes in systems with the possibility of bi-directional power flow, are raised. Thus, new protection schemes are strongly required in power systems with a significant presence of DG. In this study, an adaptive protection strategy for a distribution system with DG integration is proposed. The proposed strategy considers both grid-connected and islanded operating modes, while the adaptive operation of the protection is dynamically realized considering the availability of DG power production (related to faults or meteorological conditions in each time step. Besides, the modular structure and fast response of the proposed strategy is validated via simulations conducted on the IEEE 13-node test system.

  1. Connectivity Maintenance Based on Multiple Relay UAVs Selection Scheme in Cooperative Surveillance

    Directory of Open Access Journals (Sweden)

    Qian Zhu

    2016-12-01

    Full Text Available For the purpose of remote command and situation awareness, multiple unmanned aerial vehicles (UAVs cooperative surveillance with a ground station via multihop communications is presented in this paper. Considering limited communication capacities, a reliable UAV-to-UAV communication relay chain is dynamically established for connectivity maintenance and real-time surveillance information transmission. Firstly, a multiple UAVs cooperative surveillance framework is constructed with history detection information and surveillance payoff estimation. Secondly, four attributes are proposed to characterize differences among UAV alternatives in communication network containing a ground station, and a novel multiple relay UAVs selection scheme based on fuzzy optimum selection is developed to achieve tradeoff between surveillance mission and connectivity maintenance. Furthermore, satisfied with collision avoidance, limited communication and UAV kinematic constraints, the optimal UAV motion plan is obtained by decentralized receding horizon control, which is solved by particle swarm optimization with elite mechanism. Simulations demonstrate the effectiveness of the proposed methods in multi UAVs cooperative surveillance.

  2. Improved Power Decoupling Scheme for Single-Phase Grid-Connected Differential Inverter with Realistic Mismatch in Storage Capacitances

    DEFF Research Database (Denmark)

    Yao, Wenli; Wang, Xiongfei; Loh, Poh Chiang;

    2017-01-01

    A single-phase differential inverter consists of two elementary dc-dc converters, sharing a common dc source and a common ac output terminal. The other ac terminals of the two converters are connected to the grid in the case of grid-connected applications. The differential inverter has subsequent...... provided have verified the computation and control scheme developed....

  3. UNITED STABILIZING SCHEME FOR EDGE DELAY IN OPTICAL BURST SWITCHED NETWORKS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A novel scheme, namely united stabilizing scheme for edge delay, is introduced in optical burst switched networks. In the scheme, the limits of burst length and assembly time are both set according to certain qualifications. For executing the scheme, the conception for unit input bit rate is introduced to improve universality, and the assembly algorithm with a buffer safety space under the self-similar traffic model at each ingress edge router is proposed. Then, the components of burst and packet delay are concluded, and the equations that limits of burst length and assembly time should satisfy to stabilize the burst edge delay under different buffer offered loads are educed. The simulation results show that united stabilizing scheme stabilizes both burst and packet edge delay to a great extent when buffer offered load changes from 0.1 to 1, and the edge delay of burst and packet are near the limit values under larger offered load, respectively.

  4. Voltage Control Scheme with Distributed Generation and Grid Connected Converter in a DC Microgrid

    Directory of Open Access Journals (Sweden)

    Jong-Chan Choi

    2014-10-01

    Full Text Available Direct Current (DC microgrids are expected to become larger due to the rapid growth of DC energy sources and power loads. As the scale of the system expends, the importance of voltage control will be increased to operate power systems stably. Many studies have been performed on voltage control methods in a DC microgrid, but most of them focused only on a small scale microgrid, such as a building microgrid. Therefore, a new control method is needed for a middle or large scale DC microgrid. This paper analyzes voltage drop problems in a large DC microgrid and proposes a cooperative voltage control scheme with a distributed generator (DG and a grid connected converter (GCC. For the voltage control with DGs, their location and capacity should be considered for economic operation in the systems. Accordingly, an optimal DG allocation algorithm is proposed to minimize the capacity of a DG for voltage control in DC microgrids. The proposed methods are verified with typical load types by a simulation using MATLAB and PSCAD/EMTDC.

  5. Software for simulation of utilization schemes of secondary energy from the exhaust gases of metallurgical units

    Science.gov (United States)

    Olennikov, A. A.; Tsymbal, V. P.

    2016-09-01

    The work is devoted to the program complex intended for designing schemes of secondary energy utilization from metallurgical units. The structure of the software system is based on three levels of complex systems assembled from subsystems. The mathematical models of a complex process of heat transfer and gas dynamics occurring in the energy utilization units and gas cleaning devices. We describe the user interaction with the software package, and show the calculation results in the form of plots.

  6. Modeling and Analysis of Resonance in LCL-Type Grid-Connected Inverters under Different Control Schemes

    Directory of Open Access Journals (Sweden)

    Yanxue Yu

    2017-01-01

    Full Text Available As a basic building block in power systems, the three-phase voltage-source inverter (VSI connects the distributed energy to the grid. For the inductor-capacitor-inductor (LCL-filter three-phase VSI, according to different current sampling position and different reference frame, there mainly exist four control schemes. Different control schemes present different impedance characteristics in their corresponding determined frequency range. To analyze the existing resonance phenomena due to the variation of grid impedances, the sequence impedance models of LCL-type grid-connected three-phase inverters under different control schemes are presented using the harmonic linearization method. The impedance-based stability analysis approach is then applied to compare the relative stability issues due to the impedance differences at some frequencies and to choose the best control scheme and the better controller parameters regulating method for the LCL-type three-phase VSI. The simulation and experiments both validate the resonance analysis results.

  7. The Hilbert schemes of locally Cohen-Macaulay curves in P^3 may after all be connected

    CERN Document Server

    Lella, Paolo

    2011-01-01

    Progress on the problem whether the Hilbert schemes of locally Cohen-Macaulay curves in projective 3 space are connected has been hampered by the lack of an answer to a question that was raised by Robin Hartshorne in his paper "On the connectedness of the Hilbert scheme of curves in projective 3 space" Comm. Algebra 28 (2000) and more recently in the open problems list of the 2010 AIM workshop Components of Hilbert Schemes available at http://aimpl.org/hilbertschemes: does there exist a flat irreducible family of curves whose general member is a union of d disjoint lines on a smooth quadric surface and whose special member is a locally Cohen-Macaulay curve in a double plane? In this paper we give a positive answer to this question: for every d, we construct a family with the required properties, whose special fiber is an extremal curve in the sense of Martin-Deschamps and Perrin. From this we conclude that every effective divisor in a smooth quadric surface is in the connected component of its Hilbert scheme ...

  8. Minimization of entropy production in separate and connected process units

    Energy Technology Data Exchange (ETDEWEB)

    Roesjorde, Audun

    2004-08-01

    The objective of this thesis was to further develop a methodology for minimizing the entropy production of single and connected chemical process units. When chemical process equipment is designed and operated at the lowest entropy production possible, the energy efficiency of the equipment is enhanced. We have found for single process units that the entropy production could be reduced with up to 20-40%, given the degrees of freedom in the optimization. In processes, our results indicated that even bigger reductions were possible. The states of minimum entropy production were studied and important painter's for obtaining significant reductions in the entropy production were identified. Both from sustain ability and economical viewpoints knowledge of energy efficient design and operation are important. In some of the systems we studied, nonequilibrium thermodynamics was used to model the entropy production. In Chapter 2, we gave a brief introduction to different industrial applications of nonequilibrium thermodynamics. The link between local transport phenomena and overall system description makes nonequilibrium thermodynamics a useful tool for understanding design of chemical process units. We developed the methodology of minimization of entropy production in several steps. First, we analyzed and optimized the entropy production of single units: Two alternative concepts of adiabatic distillation; diabatic and heat-integrated distillation, were analyzed and optimized in Chapter 3 to 5. In diabatic distillation, heat exchange is allowed along the column, and it is this feature that increases the energy efficiency of the distillation column. In Chapter 3, we found how a given area of heat transfer should be optimally distributed among the trays in a column separating a mixture of propylene and propane. The results showed that heat exchange was most important on the trays close to the re boiler and condenser. In Chapter 4 and 5, we studied how the entropy

  9. Renormalization Conditions and the Sliding Scale in the Implicit Regularization Scheme A Simple Connection

    CERN Document Server

    Brizola, A; Sampaio, M D; Nemes, M C; Sampaio, Marcos

    2002-01-01

    We describe in detail how a sliding scale is introduced in the renormalization of a QFT according to integer-dimensional implicit regularization scheme. We show that since no regulator needs to be specified at intermediate steps of the calculation, the introduction of a mass scale is a direct consequence of a set of renormalization conditions. As an illustration the one loop beta-function for QED and lambda*phi^4 theories are derived. They are given in terms of derivatives of appropriately systematized functions (related to definited parts of the amplitudes) with respect to a mass scale mu. Our formal scheme can be easily generalized to higher loop calculations.

  10. A Combined Two-Method MPPT Control Scheme for Grid-Connected Photovoltaic Systems

    DEFF Research Database (Denmark)

    Dorofte, Christinel; Borup, Uffe; Blaabjerg, Frede

    2005-01-01

    In order to increase the output efficiency of a grid-connected photovoltaic (PV) system it is important to have an efficient Maximum Power Point Tracker (MPPT). In the case of low irradiation, the Perturb and Observe (PO) and Incremental Conductance (IC) methods have a poor efficiency, because of...

  11. Improved FRT Control Scheme for DFIG Wind Turbine Connected to a Weak Grid

    DEFF Research Database (Denmark)

    Abulanwar, Elsayed; Chen, Zhe; Iov, Florin

    2013-01-01

    Locked Loop (DSOGIFLL) is utilized to extract a robust grid voltage synchronization signal irrespective of the mains condition to enhance the overall system performance. Besides, a decoupled double synchronous reference frame (DDSRF) dq current controller is devoted for the grid side converter, (GSC......), controller to counteract current ripples and tackle the DC link voltage fluctuations. Also, a reactive power support scheme to manage the DFIG reactive power during contingencies and fulfill the grid codes obligations is presented. Moreover, additional control terms are employed with the DFIG converters...

  12. Efficiency study of different photovoltaic plant connection schemes under dynamic shading

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez Reinoso, C.R.; Milone, D.H. [Centro de Investigacion y Desarrollo en Senales, Sistemas e Inteligencia Computacional (SINC), Facultad de Ing. y Ciencias Hidricas UNL-CONICET, Ciudad Universitaria (3000) Santa Fe (Argentina); Buitrago, R.H. [Instituto de Desarrollo Tecnologico para la Industria Quimica (INTEC) UNL-CONICET, Guemes 3450 (3000) Santa Fe (Argentina)

    2010-06-15

    An important growth in the power of the photovoltaic systems connected to a grid has recently been observed. In spite of the advances in module technology, the problems in the system design increased, especially regarding the surface of the earth they occupy. In this work we propose a complete model for plant simulation with different wiring diagrams and under dynamic shading. Results obtained from simulations showed that the configuration with the lowest performance was that of only one serial-parallel group, whereas the highest efficiency corresponded to a design of groups of modules in parallel connected then in series. In general, a higher efficiency was obtained diminishing the quantity of modules in series and increasing their number in parallel. The simulation model proposed allows exploring different alternatives of wiring modules and finding the most efficient configurations for photovoltaic plants of medium and high power. (author)

  13. Dynamic Evaluation of LCL-type Grid-Connected Inverters with Different Current Feedback Control Schemes

    DEFF Research Database (Denmark)

    Han, Yang; Li, Zipeng; Guerrero, Josep M.

    2015-01-01

    Proportional-resonant (PR) compensator and LCL filter becomes a better choice in grid-connected inverter system with high performance and low costs. However, the resonance phenomenon caused by LCL filter affect the system stability significantly. In this paper, the stability problem of three...... of the controller and filter with different feedback configurations are provided. The impacts of digital delay, PR parameters and LCL parameters on different control strategies are also investigated. Finally, the theoretical analysis are validated by simulation results....

  14. A New Coordinated Voltage Control Scheme for Offshore AC Grid of HVDC Connected Offshore Wind Power Plants

    DEFF Research Database (Denmark)

    Sakamuri, Jayachandra N.; Cutululis, Nicolaos Antonio; Rather, Zakir Hussain;

    2015-01-01

    This paper proposes a coordinated voltage control scheme (CVCS) which enhances the voltage ride through (VRT) capability of an offshore AC grid comprised of a cluster of offshore wind power plants (WPP) connected through AC cables to the offshore voltage source converter based high voltage DC (VSC-HVDC......) converter station. Due to limited short circuit power contribution from power electronic interfaced variable speed wind generators and with the onshore main grid decoupled by the HVDC link, the offshore AC grid becomes more vulnerable to dynamic voltage events. Therefore, a short circuit fault...... in the offshore AC Grid is likely to have significant implications on the voltage of the offshore AC grid, hence on the power flow to the onshore mainland grid. The proposed CVCS integrates individual local reactive power control of wind turbines and of the HVDC converter with the secondary voltage controller...

  15. Community wind power ownership schemes in Europe and their relevance to the United States

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark

    2001-05-15

    With varying success, the United States and Europe have followed a more or less parallel path of policies to support wind development over the past twenty years. Feed-in laws and tax incentives first popularized in California in the early 1980s and greatly expanded upon in Europe during the 1990s are gradually giving way to market-based support mechanisms such as renewable portfolio standards, which are being implemented in one form or another in ten US states and at least three European nations. At the same time, electricity markets are being liberalized in both the US and Europe, and many electricity consumers are being given the choice to support the development of renewable energy through higher tariffs, both in traditionally regulated and newly competitive markets. One notable area in which wind development in Europe and United States has not evolved in common, however, is with respect to the level of community ownership of wind turbines or clusters. While community ownership of wind projects is unheard of in the United States, in Europe, local wind cooperatives or other participatory business schemes have been responsible for a large share of total wind development. In Denmark, for example, approximately 80% of all wind turbines are either individually or cooperatively owned, and a similar pattern holds in Germany, the world leader in installed wind capacity. Sweden also has a strong wind cooperative base, and the UK has recently made forays into community wind ownership. Why is it that wind development has evolved this way in Europe, but not in the United States? What incremental effect have community-owned wind schemes had on European wind development? Have community-owned wind schemes driven development in Europe, or are they merely a vehicle through which the fundamental driving institutions have been channeled? Is there value to having community wind ownership in the US? Is there reason to believe that such schemes would succeed in the US? If so, which

  16. ASP - Grid connections of large power generating units; ASP - Anslutning av stoerre produktionsanlaeggningar till elnaetet

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Aake; Larsson, Richard [Vattenfall Power Consultants, Stockholm (Sweden)

    2006-12-15

    Grid connections of large power generating units normally require more detailed studies compared to small single units. The required R and D-level depends on the specific characteristics of the production units and the connecting grid. An inquiry for a grid connection will raise questions for the grid owner regarding transmission capability, losses, fault currents, relay protection, dynamic stability etc. Then only a few larger wind farms have been built, the experiences from these types of grid connections are limited and for that reason it can be difficult to identify issues appropriate for further studies. To ensure that electric power generating units do not have unacceptable impact on the grid, directions from the Swedish TSO (Svenska Kraftnaet) have been stated. The directions deal, for example, with power generation in specific ranges of voltage level and frequency and the possibility to remain connected to the grid when different faults occur. The requirements and the consequences of these directions are illustrated. There are three main issues that should be considered: Influence on the power flow from generating units regarding voltage level, currents, losses etc.; Different types of electric systems in generating units contribute to different levels of fault currents. For that reason the resulting fault current levels have to be studied; It is required that generating units should remain connected to the grid at different modes of operation and faults. These modes have to be verified. Load flow and dynamic studies normally demand computer models. Comprehensive models, for instance of wind farms, can bee difficult to design and normally large computer capacity is required. Therefore simplified methods to perform relevant studies are described. How to model an electric power generating unit regarding fault currents and dynamic stability is described. An inquiry for a grid connection normally brings about a discussion concerning administration. To make it

  17. Critical incidents connected to nurses’ leadership in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Elaine Cantarella Lima

    Full Text Available ABSTRACT Objective: The goal of this study is to analyze nurses’ leadership in intensive care units at hospitals in the state of São Paulo, Brazil, in the face of positive and negative critical incidents. Method: Exploratory, descriptive study, conducted with 24 nurses by using the Critical Incident Technique as a methodological benchmark. Results: Results were grouped into 61 critical incidents distributed into categories. Researchers came to the conclusion that leadership-related situations interfere with IC nurses’ behaviors. Among these situations they found: difficulty in the communication process; conflicts in the daily exercise of nurses’ activities; people management; and the setting of high quality care targets. Final considerations: Researchers identified a mixed leadership model, leading them to the conclusion that nurses’ knowledge and practice of contemporary leadership theories/styles are crucial because they facilitate the communication process, focusing on behavioral aspects and beliefs, in addition to valuing flexibility. This positively impacts the organization’s results.

  18. Will the Australia-United States Free Trade Agreement undermine the Pharmaceutical Benefits Scheme?

    Science.gov (United States)

    Harvey, Ken J; Faunce, Thomas A; Lokuge, Buddhima; Drahos, Peter

    2004-09-06

    The Australia-United States Free Trade Agreement (AUSFTA) contains major concessions to the US pharmaceutical industry that may undermine the egalitarian principles and operation of the Pharmaceutical Benefits Scheme (PBS) and substantially increase the costs of medicinal drugs to Australian consumers. AUSFTA's approach to the PBS excessively emphasises the need to reward manufacturers of "innovative" new pharmaceuticals, instead of emphasising consumers' need for equitable and affordable access to necessary medicines (the first principle of our National Medicines Policy). Several features of AUSFTA may bring pressure to bear on the Pharmaceutical Benefits Advisory Committee (PBAC) to list "innovative" drugs that the committee initially rejected because the evidence for cost-effectiveness was not compelling. Intellectual property provisions of AUSFTA are likely to delay the entry of PBS cost-reducing generic products when pharmaceutical patents expire. We support the many concerned health and consumer organisations who have asked the Senate either not to pass the enabling legislation, or to delay its passage until a fairer deal in terms of public health can be obtained.

  19. Realization of Simply Connected Polygonal Linkages and Recognition of Unit Disk Contact Trees

    NARCIS (Netherlands)

    Bowen, Clinton; Durocher, Stephane; Löffler, Maarten; Rounds, Anika; Schulz, André; Tóth, Csaba

    2015-01-01

    We consider two variants of the fundamental question of determining whether a simply connected flexible combinatorial structure can be realized in Euclidean space. Two models are considered: body-and-joint frameworks and contact graphs of unit disks in the plane. (1) We show that it is strongly

  20. Car fleet renewal schemes: environmental and safety impacts. France, Germany and the United States

    NARCIS (Netherlands)

    Fraga, F.S.; et al.

    2011-01-01

    TNO carried out an in-depth look at the impacts of car scrappage schemes for the International Transport Forum of the OECD (Organisation for Economic Co-operation and Development) and the FIA Foundation. The study comes to some interesting conclusions: Car fleet renewal schemes can reduce CO2 emissi

  1. Analytical methods used in the United Kingdom Wildlife Incident Investigation Scheme for the detection of animal poisoning by pesticides.

    Science.gov (United States)

    Brown, Peter M; Turnbull, Gordon; Charman, Sheonaidh; Charlton, Andrew J A; Jones, Ainsley

    2005-01-01

    The United Kingdom Wildlife Incident Investigation Scheme (WIIS) investigates cases of suspected poisoning of wildlife, honey bees, and companion animals by pesticides. Together with field inquiries and veterinary post-mortem examinations, the analytical procedures presented here provide a comprehensive approach to the investigation of these cases. The paper covers selection of animal tissues for analysis and methods suitable for the analysis of honey bees and for various types of bait. Seven multiresidue methods cover around 130 pesticides, and methods are also described for a further 8 compounds. These methods are currently used on samples submitted to the Scheme in England and Wales.

  2. Approximation Algorithms for the Connected Dominating Set Problem in Unit Disk Graphs

    Institute of Scientific and Technical Information of China (English)

    Gang Lu; Ming-Tian Zhou; Yong Tang; Ming-Yuan Zhao; Xin-Zheng Niu; Kun She

    2009-01-01

    The connected dominating set (CDS) problem, which consists of finding a smallest connected dominating set for graphs is an NP-hard problem in the unit disk graphs (UDGs). This paper focuses on the CDS problem in wireless networks. Investigation of some properties of independent set (IS) in UDGs shows that geometric features of nodes distribution like angle and area can be used to design efficient heuristics for the approximation algorithms. Several constant factor approximation algorithms are presented for the CDS problem in UDGs. Simulation results show that the proposed algorithms perform better than some known ones.

  3. Unique features of storm surges through power transformers 6-35/0 , 4 kV winding connection with the scheme "triangle -star with distributed neutral".

    Directory of Open Access Journals (Sweden)

    Aleksandr Grinev

    2014-04-01

    Full Text Available This article analyzes the transmission of storm surges in the network 0.38 / 0.22 kV neutral to earth through the power transformers 6-35/0 , 4 kV winding connection with the scheme "triangle -star with distributed neutral ." Proposed equivalent circuit for cases falling storm waves on the three phases simultaneously and fall of waves on one phase. The article can be useful to specialists in the field of electromagnetic compatibility.

  4. Models of regional habitat quality and connectivity for pumas (Puma concolor) in the southwestern United States.

    Science.gov (United States)

    Dickson, Brett G; Roemer, Gary W; McRae, Brad H; Rundall, Jill M

    2013-01-01

    The impact of landscape changes on the quality and connectivity of habitats for multiple wildlife species is of global conservation concern. In the southwestern United States, pumas (Puma concolor) are a well distributed and wide-ranging large carnivore that are sensitive to loss of habitat and to the disruption of pathways that connect their populations. We used an expert-based approach to define and derive variables hypothesized to influence the quality, location, and permeability of habitat for pumas within an area encompassing the entire states of Arizona and New Mexico. Survey results indicated that the presence of woodland and forest cover types, rugged terrain, and canyon bottom and ridgeline topography were expected to be important predictors of both high quality habitat and heightened permeability. As road density, distance to water, or human population density increased, the quality and permeability of habitats were predicted to decline. Using these results, we identified 67 high quality patches across the study area, and applied concepts from electronic circuit theory to estimate regional patterns of connectivity among these patches. Maps of current flow among individual pairs of patches highlighted possible pinch points along two major interstate highways. Current flow summed across all pairs of patches highlighted areas important for keeping the entire network connected, regardless of patch size. Cumulative current flow was highest in Arizona north of the Colorado River and around Grand Canyon National Park, and in the Sky Islands region owing to the many small habitat patches present. Our outputs present a first approximation of habitat quality and connectivity for dispersing pumas in the southwestern United States. Map results can be used to help target finer-scaled analyses in support of planning efforts concerned with the maintenance of puma metapopulation structure, as well as the protection of landscape features that facilitate the dispersal

  5. Models of regional habitat quality and connectivity for pumas (Puma concolor in the southwestern United States.

    Directory of Open Access Journals (Sweden)

    Brett G Dickson

    Full Text Available The impact of landscape changes on the quality and connectivity of habitats for multiple wildlife species is of global conservation concern. In the southwestern United States, pumas (Puma concolor are a well distributed and wide-ranging large carnivore that are sensitive to loss of habitat and to the disruption of pathways that connect their populations. We used an expert-based approach to define and derive variables hypothesized to influence the quality, location, and permeability of habitat for pumas within an area encompassing the entire states of Arizona and New Mexico. Survey results indicated that the presence of woodland and forest cover types, rugged terrain, and canyon bottom and ridgeline topography were expected to be important predictors of both high quality habitat and heightened permeability. As road density, distance to water, or human population density increased, the quality and permeability of habitats were predicted to decline. Using these results, we identified 67 high quality patches across the study area, and applied concepts from electronic circuit theory to estimate regional patterns of connectivity among these patches. Maps of current flow among individual pairs of patches highlighted possible pinch points along two major interstate highways. Current flow summed across all pairs of patches highlighted areas important for keeping the entire network connected, regardless of patch size. Cumulative current flow was highest in Arizona north of the Colorado River and around Grand Canyon National Park, and in the Sky Islands region owing to the many small habitat patches present. Our outputs present a first approximation of habitat quality and connectivity for dispersing pumas in the southwestern United States. Map results can be used to help target finer-scaled analyses in support of planning efforts concerned with the maintenance of puma metapopulation structure, as well as the protection of landscape features that facilitate

  6. Stakeholder Perceptions of Unit Based Waste Disposal Schemes in Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Calvin Lakhan

    2015-06-01

    Full Text Available This study examines stakeholder perceptions of pay as you throw schemes (PAYT in Ontario, Canada. Using a combination of panel and semi-structured survey data from provincial municipalities, focus is placed on analyzing: (a the effects of PAYT systems on municipal recycling rates and program costs (b stakeholder perceptions on the perceived effectiveness of PAYT policy (c how locality affects PAYT program costs and affect municipal recycling rates and (d the impact of Ontario’s “one Blue Box per household” provision on PAYT schemes. The results of the analysis show that while the implementation of PAYT schemes do increase municipal recycling rates, there are opportunities for further improvement. In Ontario, the effectiveness of PAYT policy is impaired by inconsistent enforcement, administrative burden, and the inadequate capacity of household recycling bins (“blue bins”.

  7. Performance Improvement for Two-Stage Single-Phase Grid-Connected Converters Using a Fast DC Bus Control Scheme and a Novel Synchronous Frame Current Controller

    Directory of Open Access Journals (Sweden)

    Bingzhang Li

    2017-03-01

    Full Text Available Two-stage single-phase grid-connected converters are widely used in renewable energy applications. Due to the presence of a second harmonic ripple across the DC bus voltage, it is very challenging to design the DC bus voltage control scheme in single-phase grid-connected inverters. The DC bus voltage controller must filter the ripple and balance a tradeoff between low harmonic distortion and high bandwidth. This paper presents a fast DC bus voltage controller, which uses a second order digital finite impulse response (FIR notch filter in conjunction with input power feedforward scheme to ensure the steady-state and dynamic performance. To gain the input power without extra hardware, a Kalman filter is incorporated to estimate the DC bus input current. At the same time, a modulation compensation strategy is implemented to eliminate the nonlinearity of the grid current control loop, which is caused by the DC bus voltage ripple. Moreover, a novel synchronous frame current controller for single-phase systems is also introduced, and its equivalent model in stationary frame has been derived. Simulation and experimental results are provided to verify the effective of the proposed control scheme.

  8. Didactical Design Material Units of Distance and Speed to Developed Mathematical Connection in Elementary School

    Science.gov (United States)

    Jannah, R. R.; Apriliya, S.; Karlimah

    2017-03-01

    This study aims to develop alternative instructional design based of barriers learning which identified by developing mathematical connection capabilities to the material unit of distance and speed. The research was conducted in the fifth grade elementary school Instructional design is complemented with a hypothetical learning trajectory in the form of a pedagogical didactic anticipation. The method used is descriptive method with qualitative approach. Techniques data collection used were observation, interviews, and documentation. The instrument used the researchers themselves are equipped with an instrument written test. The data were analyzed qualitatively to determine the student learning obstacles, then arrange hypothetical learning trajectory and pedagogical didactic anticipation. Learning obstacle are identified, it is learning obstacle related the connections between mathematical topics, learning obstacle related with other disciplines, and learning obstacle related with everyday life. The results of this research are improvement and development of didactic design in mathematics which has activities mathematical connection to the material unit of distance and speed in elementary school. The learning activities are carried out is using varied methods include method lectures, demonstrations, practice and exercise, as well as using the modified instructional media.

  9. Evaluation of New Schemes Efficacy for Blatta Orientalis and Blattella Germanica Control in Food Units with HACCP Implementation

    Directory of Open Access Journals (Sweden)

    VINELA REFUGJATI

    2015-12-01

    Full Text Available Blatta orientalis and Blattella germanica are the most common pests in the food industry. The aim of this study is the evaluation of new treatment schemes effectiveness as well as the monetary cost, humans and environment toxicity against Blatta orientalis and Blattella germanica. The study was carried out in 28 food units infested with Blattella germanica and Blatta orientalis in Tirana. The duration of the study was 24 months. The treatment efficacy of 2.15% imidacloprid (in gel form is tested for 12 months, in thirteen units meanwhile one unit served as a control unit. The monetary cost of insecticide mentioned was calculated using the quantity and treatment duration of insecticide applied. For this reason, we calculated the quantity of gel baits used in seven food units as well as the quantity of insecticide in spray form used in seven others food units for a period of 12 months. Technical and safety data sheets were used to assess human and environment safety. Insect elimination was achieved by the end of the ninth week. This study found that in the units which used imidacloprid the short term cost was 21 Euro / unit, while in other units which used the classic method the cost was 8.3 Euro / unit. Our study identified that at the units which used imidacloprid the annual cost was 68 Euro while in the other category the cost was 78 Euro.Technical and safety data sheets detected that insecticides in gel form are safer for human and environment. As in analog studies conducted by foreign researchers, we found that the use of insecticides in gel form is the right choice for Blatta orientalis and Blattella germanica control.

  10. Connecting Payments for Ecosystem Services and Agri-Environment Regulation: An Analysis of the Welsh Glastir Scheme

    Science.gov (United States)

    Wynne-Jones, Sophie

    2013-01-01

    Policy debates in the European Union have increasingly emphasised "Payments for Ecosystem Services" (PES) as a model for delivering agri-environmental objectives. This paper examines the Glastir scheme, introduced in Wales in 2009, as a notable attempt to move between long standing models of European agri-environment regulation and…

  11. Connecting Payments for Ecosystem Services and Agri-Environment Regulation: An Analysis of the Welsh Glastir Scheme

    Science.gov (United States)

    Wynne-Jones, Sophie

    2013-01-01

    Policy debates in the European Union have increasingly emphasised "Payments for Ecosystem Services" (PES) as a model for delivering agri-environmental objectives. This paper examines the Glastir scheme, introduced in Wales in 2009, as a notable attempt to move between long standing models of European agri-environment regulation and emerging…

  12. Connecting Payments for Ecosystem Services and Agri-Environment Regulation: An Analysis of the Welsh Glastir Scheme

    Science.gov (United States)

    Wynne-Jones, Sophie

    2013-01-01

    Policy debates in the European Union have increasingly emphasised "Payments for Ecosystem Services" (PES) as a model for delivering agri-environmental objectives. This paper examines the Glastir scheme, introduced in Wales in 2009, as a notable attempt to move between long standing models of European agri-environment regulation and…

  13. Bonding with books: the parent-infant connection in the neonatal intensive care unit.

    Science.gov (United States)

    Walker, Lynne J

    2013-01-01

    Parents of infants in the neonatal intensive care unit (NICU) experience one of the most stressful events of their lives. At times, they are unable to participate fully, if at all, in the care of their infant. Parents in the NICU have a need to participate in the care of their infant to attain the parental role. Parental reading to infants in the NICU is an intervention that can connect the parent and infant and offers a way for parents to participate in caregiving. This intervention may have many benefits and may positively affect the parent-infant relationship.

  14. MODELING OF THREE-PHASE THREE LEG TRANSFORMER DEVICES FOR ENGINEERING CALCULATIONS OF ASYMMETRICAL MODES FOR DIFFERENT SCHEMES OF WINDING CONNECTIONS

    Directory of Open Access Journals (Sweden)

    Bosneaga V.A

    2013-08-01

    Full Text Available The model is proposed for the calculation and research of steady state asymmetric modes and transients in three-phase three legs transformer devices with arbitrary diagram of windings connection, taking into account the electromagnetic coupling of the windings, located on different legs. Using as an example distribution transformer of 10/0.4 kV calculations and analysis were performed of the most characteristic steady asymmetrical modes, that occur during short circuit, phase failure, unbalanced load for the most common windings connections and, in particular, associated with the occurrence of zero sequence magnetic flow. For the considered regimes and schemes vector diagrams were constructed for currents and voltages as well as for the relative values of magnetic flow, which give a clear idea about their particular features.

  15. Patents, pills and politics: the Australia-United States Free Trade Agreement and the Pharmaceutical Benefits Scheme.

    Science.gov (United States)

    Harvey, Ken

    2004-11-08

    There is tension between the need of the pharmaceutical innovator for intellectual property protection and the need of society for equitable and affordable access to innovative drugs. The recent Australia-United States Free Trade Agreement provides a nice illustration of this interplay between patents, pills and politics. This article provides a brief history of patent law as applied to pharmaceuticals, describes how the Pharmaceutical Benefits Scheme got caught up in AUSFTA negotiations, analyses the clauses that are likely to impact upon the PBS and describes the political process that reviewed and ultimately amended the AUSFTA.

  16. Dynamic Resource Reservation and Connectivity Tracking to Support Real-Time Communication among Mobile Units

    Directory of Open Access Journals (Sweden)

    Almeida Luis

    2005-01-01

    Full Text Available Wireless communication technology is spreading quickly in almost all the information technology areas as a consequence of a gradual enhancement in quality and security of the communication, together with a decrease in the related costs. This facilitates the development of relatively low-cost teams of autonomous (robotic mobile units that cooperate to achieve a common goal. Providing real-time communication among the team units is highly desirable for guaranteeing a predictable behavior in those applications in which the robots have to operate autonomously in unstructured environments. This paper proposes a MAC protocol for wireless communication that supports dynamic resource reservation and topology management for relatively small networks of cooperative units (10–20 units. The protocol uses a slotted time-triggered medium access transmission control that is collision-free, even in the presence of hidden nodes. The transmissions are scheduled according to the earliest deadline first scheduling policy. An adequate admission control guarantees the timing constraints of the team communication requirements, including when new nodes dynamically join or leave the team. The paper describes the protocol focusing on the consensus procedure that supports coherent changes in the global system. We also introduce a distributed connectivity tracking mechanism that is used to detect network partition and absent or crashed nodes. Finally, a set of simulation results are shown that illustrate the effectiveness of the proposed approaches.

  17. Network coding based joint signaling and dynamic bandwidth allocation scheme for inter optical network unit communication in passive optical networks

    Science.gov (United States)

    Wei, Pei; Gu, Rentao; Ji, Yuefeng

    2014-06-01

    As an innovative and promising technology, network coding has been introduced to passive optical networks (PON) in recent years to support inter optical network unit (ONU) communication, yet the signaling process and dynamic bandwidth allocation (DBA) in PON with network coding (NC-PON) still need further study. Thus, we propose a joint signaling and DBA scheme for efficiently supporting differentiated services of inter ONU communication in NC-PON. In the proposed joint scheme, the signaling process lays the foundation to fulfill network coding in PON, and it can not only avoid the potential threat to downstream security in previous schemes but also be suitable for the proposed hybrid dynamic bandwidth allocation (HDBA) scheme. In HDBA, a DBA cycle is divided into two sub-cycles for applying different coding, scheduling and bandwidth allocation strategies to differentiated classes of services. Besides, as network traffic load varies, the entire upstream transmission window for all REPORT messages slides accordingly, leaving the transmission time of one or two sub-cycles to overlap with the bandwidth allocation calculation time at the optical line terminal (the OLT), so that the upstream idle time can be efficiently eliminated. Performance evaluation results validate that compared with the existing two DBA algorithms deployed in NC-PON, HDBA demonstrates the best quality of service (QoS) support in terms of delay for all classes of services, especially guarantees the end-to-end delay bound of high class services. Specifically, HDBA can eliminate queuing delay and scheduling delay of high class services, reduce those of lower class services by at least 20%, and reduce the average end-to-end delay of all services over 50%. Moreover, HDBA also achieves the maximum delay fairness between coded and uncoded lower class services, and medium delay fairness for high class services.

  18. Induction and Mentoring of Novice Teachers: A Scheme for the United Arab Emirates

    Science.gov (United States)

    Ibrahim, Ali S.

    2012-01-01

    Induction and mentoring of novice teachers have gained considerable worldwide attention. However, in the United Arab Emirates, graduates from teacher education programmes are recruited as teachers without being provided with any formal school-based support. They suffer from stress, overload, and low self-esteem and a high percentage leave…

  19. Development of a thermal scheme for a cogeneration combined-cycle unit with an SVBR-100 reactor

    Science.gov (United States)

    Kasilov, V. F.; Dudolin, A. A.; Krasheninnikov, S. M.

    2017-02-01

    At present, the prospects for development of district heating that can increase the effectiveness of nuclear power stations (NPS), cut down their payback period, and improve protection of the environment against harmful emissions are being examined in the nuclear power industry of Russia. It is noted that the efficiency of nuclear cogeneration power stations (NCPS) is drastically affected by the expenses for heat networks and heat losses during transportation of a heat carrier through them, since NPSs are usually located far away from urban area boundaries as required for radiation safety of the population. The prospects for using cogeneration power units with small or medium power reactors at NPSs, including combined-cycle units and their performance indices, are described. The developed thermal scheme of a cogeneration combined-cycle unit (CCU) with an SBVR-100 nuclear reactor (NCCU) is presented. This NCCU should use a GE 6FA gasturbine unit (GTU) and a steam-turbine unit (STU) with a two-stage district heating plant. Saturated steam from the nuclear reactor is superheated in a heat-recovery steam generator (HRSG) to 560-580°C so that a separator-superheater can be excluded from the thermal cycle of the turbine unit. In addition, supplemental fuel firing in HRSG is examined. NCCU effectiveness indices are given as a function of the ambient air temperature. Results of calculations of the thermal cycle performance under condensing operating conditions indicate that the gross electric efficiency η el NCCU gr of = 48% and N el NCCU gr = 345 MW can be achieved. This efficiency is at maximum for NCCU with an SVBR-100 reactor. The conclusion is made that the cost of NCCU installed kW should be estimated, and the issue associated with NCCUs siting with reference to urban area boundaries must be solved.

  20. A geometric correction scheme for spatial leakage effects in MEG/EEG seed-based functional connectivity mapping.

    Science.gov (United States)

    Wens, Vincent; Marty, Brice; Mary, Alison; Bourguignon, Mathieu; Op de Beeck, Marc; Goldman, Serge; Van Bogaert, Patrick; Peigneux, Philippe; De Tiège, Xavier

    2015-11-01

    Spatial leakage effects are particularly confounding for seed-based investigations of brain networks using source-level electroencephalography (EEG) or magnetoencephalography (MEG). Various methods designed to avoid this issue have been introduced but are limited to particular assumptions about its temporal characteristics. Here, we investigate the usefulness of a model-based geometric correction scheme (GCS) to suppress spatial leakage emanating from the seed location. We analyze its properties theoretically and then assess potential advantages and limitations with simulated and experimental MEG data (resting state and auditory-motor task). To do so, we apply Minimum Norm Estimation (MNE) for source reconstruction and use variation of error parameters, statistical gauging of spatial leakage correction and comparison with signal orthogonalization. Results show that the GCS has a local (i.e., near the seed) effect only, in line with the geometry of MNE spatial leakage, and is able to map spatially all types of brain interactions, including linear correlations eliminated after signal orthogonalization. Furthermore, it is robust against the introduction of forward model errors. On the other hand, the GCS can be affected by local overcorrection effects and seed mislocation. These issues arise with signal orthogonalization too, although significantly less extensively, so the two approaches complement each other. The GCS thus appears to be a valuable addition to the spatial leakage correction toolkits for seed-based FC analyses in source-projected MEG/EEG data.

  1. A solar PV augmented hybrid scheme for enhanced wind power generation through improved control strategy for grid connected doubly fed induction generator

    Directory of Open Access Journals (Sweden)

    Adikanda Parida

    2016-12-01

    Full Text Available In this paper, a wind power generation scheme using a grid connected doubly fed induction generator (DFIG augmented with solar PV has been proposed. A reactive power-based rotor speed and position estimation technique with reduced machine parameter sensitivity is also proposed to improve the performance of the DFIG controller. The estimation algorithm is based on model reference adaptive system (MRAS, which uses the air gap reactive power as the adjustable variable. The overall generation reliability of the wind energy conversion system can be considerably improved as both solar and wind energy can supplement each other during lean periods of either of the sources. The rotor-side DC-link voltage and active power generation at the stator terminals of the DFIG are maintained constant with minimum storage battery capacity using single converter arrangement without grid-side converter (GSC. The proposed scheme has been simulated and experimentally validated with a practical 2.5 kW DFIG using dSPACE CP1104 module which produced satisfactory results.

  2. Curricular Units: Powerful Tools to Connect the Syllabus with Students’ Needs and Interests

    Directory of Open Access Journals (Sweden)

    Ariza Ariza Aleida

    2004-08-01

    Full Text Available A basic component of any language program is the construction of the curriculum. There is a variety of approaches to curriculum planning and implementation from the technical production perspective to the critical view. The current article emerged from the analysis of the syllabus in a Basic English course in the undergraduate program at Universidad Nacional de Colombia and the design and implementation of a curricular unit. Such unit proved to be a powerful tool to connect what was set in the program, what students needed in terms of language and what they were interested in terms of culture. Key words: Curriculum, Curricular Unit Platform, Constructivism, Teaching- Communicative Language, Task-Based Approach Un componente esencial en un programa de idiomas es la construcción del currículo. Existe una gran variedad de enfoques en términos del diseño y la implementación del currículo; desde una perspectiva reducida a la producción técnica, hasta una visión crítica y transformadora. El presente artículo se gesta a partir tanto del análisis de un programa correspondiente al curso Inglés Básico I en la licenciatura ofrecida por la Universidad Nacional de Colombia, como del diseño y la implementación de una unidad curricular. Dicha unidad curricular se caracterizó por convertirse en una herramienta de conexión entre los contenidos y procedimientos planteados en un programa y las necesidades comunicativas e intereses culturales de los estudiantes. Palabras claves: Currículo, Plataforma Curricular, Unidad Curricular, Constructivismo, Lenguas Extranjeras-Enseñanza Comunicativa, Enfoque basado en Tareas

  3. Study on the energy-efficient scheme based on the interconnection of optical-network-units for next generation optical access network

    Science.gov (United States)

    Lv, Yunxin; Jiang, Ning; Qiu, Kun; Xue, Chenpeng

    2014-12-01

    An energy-efficient scheme based on the interconnection of optical network unit (ONU) is introduced, which can significantly reduce the energy consumption of the low-traffic operation. The energy consumption model for the ONU-interconnected optical access network (OAN) based on the electronic switch (ES) technology is established, and the energy efficiency of the proposed scheme is analyzed and compared with that of the OAN using optical switch (OS). The simulation results demonstrate that the ONU-interconnected scheme can efficiently reduce the energy consumption of OAN, and it shows a good energy consumption performance under daily traffic model.

  4. Evaluation of structural deformations of a mechanical connecting unit oxidizer supplies by thermo-mechanical simulation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang Woo [Dept. of Mechanical Engineering, Institute of Machine Convergence Technology, Hankyong National University, Anseong (Korea, Republic of)

    2016-10-15

    A Mechanical connecting unit (MCU) used in ground facilities for a Liquid propellant rocket (LPR) acts as a bridge between the onboard system and the ground oxidizer filling system. It should be resistant to structural deformations in order to guarantee successful supply of a cryogenic oxidizer and high pressure gases without reduction of sealing capability. The MCU consists of many components and linkages and operates under harsh conditions induced by a cryogenic oxidizer, high pressure gases and other mechanical forces. Thus, the evaluation of structural deformation of the MCU considering complex conditions is expensive and time consuming. The present study efficiently evaluates the structural deformations of the key components of the MCU by Thermo-mechanical simulation (TMS) based on the superposition principle. Deformations due to the mechanical loadings including weights, pressures, and spring forces are firstly evaluated by using a non-linear flexible body simulation module (FFlex) of Multi-body dynamics (MBD) software, RecurDyn. Then, thermal deformations for the deformed geometries obtained by RecurDyn were subsequently calculated. It was conducted by using a Finite element (FE) analysis software, ANSYS. The total deformations for the onboard plate and multi-channel plate in the connecting section due to the mechanical and thermal loadings were successfully evaluated. Moreover, the outer gaps at six points between two plates were calculated and verified by comparison to the measured data. Their values and tendencies showed a good agreement. The author concluded that the TMS using MBD software considering flexible bodies and an FE simulator can efficiently evaluate structural deformations of the MCU operating under the complex load and boundary conditions.

  5. DCT domain feature extraction scheme based on motor unit action potential of EMG signal for neuromuscular disease classification.

    Science.gov (United States)

    Doulah, Abul Barkat Mollah Sayeed Ud; Fattah, Shaikh Anowarul; Zhu, Wei-Ping; Ahmad, M Omair

    2014-01-01

    A feature extraction scheme based on discrete cosine transform (DCT) of electromyography (EMG) signals is proposed for the classification of normal event and a neuromuscular disease, namely the amyotrophic lateral sclerosis. Instead of employing DCT directly on EMG data, it is employed on the motor unit action potentials (MUAPs) extracted from the EMG signal via a template matching-based decomposition technique. Unlike conventional MUAP-based methods, only one MUAP with maximum dynamic range is selected for DCT-based feature extraction. Magnitude and frequency values of a few high-energy DCT coefficients corresponding to the selected MUAP are used as the desired feature which not only reduces computational burden, but also offers better feature quality with high within-class compactness and between-class separation. For the purpose of classification, the K-nearest neighbourhood classifier is employed. Extensive analysis is performed on clinical EMG database and it is found that the proposed method provides a very satisfactory performance in terms of specificity, sensitivity and overall classification accuracy.

  6. Study on Schemes Suitable for Thyritors Switching of Three-phase Delta-connected Capacitor Banks%晶闸管投切电容无功补偿角型接线方案的研究

    Institute of Scientific and Technical Information of China (English)

    戴朝波; 雷林绪; 林海雪

    2001-01-01

    对于三相平衡负载的无功补偿,提出了晶闸管投切电容无功补偿角型接线的两种新的经济型方案。第一种采用晶闸管的反并联,第二种利用晶闸管和二极管的反并联。相对于常规的接线方案,新方案则要显得更加经济且能够快速地控制电容器组的投入和切除。%Delta-connected capacitor banks are used for powerfactor improvement of balanced three-phase loads (e.g., thr-ee-phase induction motors, etc. ) and are normally switched inand out using antiparallel thyristors. This paper describes twonovel schemes for thyristors switching delta-connected capacitorbanks. While the first scheme is composed of antiparallelthyristors, the second scheme takes full advantage of anti-par-allel combination of diode and thyristor. Compared with the ex-isting scheme, these two novel schemes are more economical,moreover, both of them can switch delta-connected capacitorbanks in and out very quickly and, hence, is suitable for staticvar compensator (SVC) application.

  7. Evaluation of Surface Hydrological Connectivity Between a Forested Coastal Wetland and Regulated Waters of the United States

    Science.gov (United States)

    Dean, D. D.; Wilcox, B. P.; Jacob, J. S.; Sipocz, A.; Munster, C.

    2008-12-01

    Rapid urbanization, industry, and agriculture have put enormous developmental pressure on coastal forested wetlands along the Texas coast. At least 97,000 acres of freshwater forested wetlands on the Texas coast have been lost since 1955, amid much larger losses of other coastal wetland types (TPWD-Texas Wetlands Conservation Plan, 1996). Some coastal wetlands are protected by federal regulations under the Clean Water Act in an effort to maintain wetland hydrological and ecological services, such as water quality improvement and flood control. However, federal protection of many important coastal wetlands is dependent upon documented proof of a hydrologic connection to federally protected Waters of the United States and reasonable influence on the quality of those waters. This study focuses on a 13 acre catchment of coastal flatwoods wetland with an ambiguous legal status because of a possible , but undocumented, hydrologic connection to regulated Waters of the United States. Documentation of the hydrologic connectivity of this type of wetland is critical because of the geographic extent of similar wetlands and their contributions to water quality. The objective of the study was to determine if a hydrologic connection exists, and if so, to quantify the strength of the connection. A surface connection was established based on runoff and rainfall data collected since April of 2005, with the wetland discharging surface water directly into an adjacent protected wetland. The connection was weak during dry years, but in years with average rainfall, surface runoff accounted for a much more significant portion of the water budget. These results suggest that runoff water from similar wetlands contributes directly to protected wetland waters, and may influence water quality downstream.

  8. Connectivity Theory at Work: The Referrals between Science and Mathematics in a Science Unit

    Science.gov (United States)

    Mehmetlioglu, Deniz; Ozdem, Yasemin

    2014-01-01

    Researches carried out all around the world showed that students learn more effectively if they are able to make connections between subjects. This case reports based on an investigation of how mathematics concepts were connected to science concepts by a science teacher in an elementary science classroom, and on the science teacher's views…

  9. Control scheme towards enhancing power quality and operational efficiency of single-phase two-stage grid-connected photovoltaic systems

    Directory of Open Access Journals (Sweden)

    Mahmoud Salem

    2015-12-01

    Full Text Available Achieving high reliable grid-connected photovoltaic (PV systems with high power quality and high operation efficiency is highly required for distributed generation units. A double grid-frequency voltage ripple is found on the dc-link voltage in single-phase photovoltaic grid-connected systems due to the unbalance of the instantaneous dc input and ac output powers. This voltage ripple has undesirable effects on the power quality and operational efficiency of the whole system. Harmonic distortion in the injected current to the grid is one of the problems caused by this double grid-frequency voltage ripple. The double grid frequency ripple propagates to the PV voltage and current which disturb the extracted maximum power from the PV array. This paper introduces intelligent solutions towards mitigate the side effects of the double grid-frequency voltage ripple on the transferred power quality and the operational efficiency of single-phase two-stage grid-connected PV system. The proposed system has three control loops: MPPT control loop, dc-link voltage control loop and inverter current control loop. Solutions are introduced for all the three control loops in the system. The current controller cancels the dc-link voltage effect on the total harmonic distortion of the output current. The dc-link voltage controller is designed to generate a ripple free reference current signal that leads to enhance the quality of the output power. Also a modified MPPT controller is proposed to optimize the extracted power from the PV array. Simulation results show that higher injected power quality is achieved and higher efficiency of the overall system is realized.

  10. Comparison of Standards and Technical Requirements of Grid-Connected Wind Power Plants in China and the United States

    Energy Technology Data Exchange (ETDEWEB)

    Gao, David Wenzhong [Alternative Power Innovations, LLC; Muljadi, Eduard [National Renewable Energy Lab. (NREL), Golden, CO (United States); Tian, Tian [National Renewable Energy Lab. (NREL), Golden, CO (United States); Miller, Mackay [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wang, Weisheng [China Electric Power Research Inst. (China)

    2016-09-01

    The rapid deployment of wind power has made grid integration and operational issues focal points in industry discussions and research. Compliance with grid connection standards for wind power plants (WPPs) is crucial to ensuring the reliable and stable operation of the electric power grid. This report compares the standards for grid-connected WPPs in China to those in the United States to facilitate further improvements in wind power standards and enhance the development of wind power equipment. Detailed analyses of power quality, low-voltage ride-through capability, active power control, reactive power control, voltage control, and wind power forecasting are provided to enhance the understanding of grid codes in the two largest markets of wind power. This study compares WPP interconnection standards and technical requirements in China to those in the United States.

  11. The Optimized Operation of Gas Turbine Combined Heat and Power Units Oriented for the Grid-Connected Control

    Science.gov (United States)

    Xia, Shu; Ge, Xiaolin

    2016-04-01

    In this study, according to various grid-connected demands, the optimization scheduling models of Combined Heat and Power (CHP) units are established with three scheduling modes, which are tracking the total generation scheduling mode, tracking steady output scheduling mode and tracking peaking curve scheduling mode. In order to reduce the solution difficulty, based on the principles of modern algebraic integers, linearizing techniques are developed to handle complex nonlinear constrains of the variable conditions, and the optimized operation problem of CHP units is converted into a mixed-integer linear programming problem. Finally, with specific examples, the 96 points day ahead, heat and power supply plans of the systems are optimized. The results show that, the proposed models and methods can develop appropriate coordination heat and power optimization programs according to different grid-connected control.

  12. Public service obligations for air transport in the United States and Europe: Connectivity effects and value for money

    OpenAIRE

    Wittman, Michael; Allroggen, Florian; Malina, Robert

    2016-01-01

    Public service obligations (PSOs) are used by governments in many countries, including the United States and 11 countries in Europe, to mandate a minimum level of commercial air transportation service, especially for small or rural communities. This paper analyzes PSOs in these 12 countries for the year 2010 using the recently proposed Global Connectivity Index to measure direct and indirect market access and a novel subsidy database covering 90% of PSO movements in these countries to assess ...

  13. Promoting sustainable research partnerships: a mixed-method evaluation of a United Kingdom-Africa capacity strengthening award scheme.

    Science.gov (United States)

    Dean, Laura; Njelesani, Janet; Smith, Helen; Bates, Imelda

    2015-12-23

    Research partnerships between high-income countries (HICs) and low- or middle-income countries (LMICs) are a leading model in research capacity strengthening activities. Although numerous frameworks and guiding principles for effective research partnerships exist, few include the perspective of the LMIC partner. This paper draws out lessons for establishing and maintaining successful research collaborations, based on partnership dynamics, from the perspectives of both HIC and LMIC stakeholders through the evaluation of a research capacity strengthening partnership award scheme. A mixed-method retrospective evaluation approach was used. Initially, a cross-sectional survey was administered to all award holders, which focused on partnership outputs and continuation. Fifty individuals were purposively selected to participate in interviews or focus group discussions from 12 different institutions in HICs and LMICs; the sample included the research investigators, research assistants, laboratory scientists and post-doctoral students. The evaluation collected data on critical elements of research partnership dynamics such as research outputs, nature of the partnership, future plans and research capacity. Quantitative data were analysed descriptively and qualitative data were analysed using an iterative framework approach. The majority of United Kingdom and African award holders stated they would like to pursue future collaborations together. Key aspects within partnerships that appeared to influence this were; the perceived benefits of the partnership at the individual and institutional level such as publication of papers or collaborative grants; ability to influence 'research culture' and instigate critical thinking among mid-career researchers; previous working relationships, for example supervisor-student relationships; and equity within partnerships linked to partnership formation and experience of United Kingdom partners within LMICs. Factors which may hinder

  14. Optimal interpolation schemes to constrain pmPM2.5 in regional modeling over the United States

    Science.gov (United States)

    Sousan, Sinan Dhia Jameel

    This thesis presents the use of data assimilation with optimal interpolation (OI) to develop atmospheric aerosol concentration estimates for the United States at high spatial and temporal resolutions. Concentration estimates are highly desirable for a wide range of applications, including visibility, climate, and human health. OI is a viable data assimilation method that can be used to improve Community Multiscale Air Quality (CMAQ) model fine particulate matter (PM2.5) estimates. PM2.5 is the mass of solid and liquid particles with diameters less than or equal to 2.5 µm suspended in the gas phase. OI was employed by combining model estimates with satellite and surface measurements. The satellite data assimilation combined 36 x 36 km aerosol concentrations from CMAQ with aerosol optical depth (AOD) measured by MODIS and AERONET over the continental United States for 2002. Posterior model concentrations generated by the OI algorithm were compared with surface PM2.5 measurements to evaluate a number of possible data assimilation parameters, including model error, observation error, and temporal averaging assumptions. Evaluation was conducted separately for six geographic U.S. regions in 2002. Variability in model error and MODIS biases limited the effectiveness of a single data assimilation system for the entire continental domain. The best combinations of four settings and three averaging schemes led to a domain-averaged improvement in fractional error from 1.2 to 0.97 and from 0.99 to 0.89 at respective IMPROVE and STN monitoring sites. For 38% of OI results, MODIS OI degraded the forward model skill due to biases and outliers in MODIS AOD. Surface data assimilation combined 36 × 36 km aerosol concentrations from the CMAQ model with surface PM2.5 measurements over the continental United States for 2002. The model error covariance matrix was constructed by using the observational method. The observation error covariance matrix included site representation that

  15. Patterns and drivers for wetland connections in the Prairie Pothole Region, United States

    Science.gov (United States)

    Vanderhoof, Melanie; Christensen, Jay R.; Alexander, Laurie C.

    2017-01-01

    Ecosystem function in rivers, lakes and coastal waters depends on the functioning of upstream aquatic ecosystems, necessitating an improved understanding of watershed-scale interactions including variable surface-water flows between wetlands and streams. As surface water in the Prairie Pothole Region expands in wet years, surface-water connections occur between many depressional wetlands and streams. Minimal research has explored the spatial patterns and drivers for the abundance of these connections, despite their potential to inform resource management and regulatory programs including the U.S. Clean Water Act. In this study, wetlands were identified that did not intersect the stream network, but were shown with Landsat images (1990–2011) to become merged with the stream network as surface water expanded. Wetlands were found to spill into or consolidate with other wetlands within both small (2–10 wetlands) and large (>100 wetlands) wetland clusters, eventually intersecting a stream channel, most often via a riparian wetland. These surface-water connections occurred over a wide range of wetland distances from streams (averaging 90–1400 m in different ecoregions). Differences in the spatial abundance of wetlands that show a variable surface-water connection to a stream were best explained by smaller wetland-to-wetland distances, greater wetland abundance, and maximum surface-water extent. This analysis demonstrated that wetland arrangement and surface water expansion are important mechanisms for depressional wetlands to connect to streams and provides a first step to understanding the frequency and abundance of these surface-water connections across the Prairie Pothole Region.

  16. 78 FR 28633 - TE Connectivity, a Subsidiary of Tyco Electronics Corporation, Relay Products Business Unit...

    Science.gov (United States)

    2013-05-15

    ... Products Business Unit Including On-Site Leased Workers From Kelly Services, Diversco and Hagemeyer North... Corporation, Relay Products Business Unit, including on-site leased workers from Kelly Services, Winston-Salem, North Carolina. The workers are engaged in activities related to the production of...

  17. Connecting College Learners with Rural Entrepreneurship Opportunities: The Rural Entrepreneurship Teaching Unit

    Science.gov (United States)

    Frazier, Barbara J.; Niehm, Linda S.; Stoel, Leslie

    2012-01-01

    The Rural Entrepreneurship Teaching Unit (RETU) is designed to acquaint university retailing and hospitality majors with rural entrepreneurship opportunities. The unit is an outcome of a federal grant focused on the contribution of the local retail sector to rural community resilience. The RETU integrates knowledge regarding rural development,…

  18. Multiscale Free Energy Simulations: An Efficient Method for Connecting Classical MD Simulations to QM or QM/MM Free Energies Using Non-Boltzmann Bennett Reweighting Schemes

    Science.gov (United States)

    2015-01-01

    The reliability of free energy simulations (FES) is limited by two factors: (a) the need for correct sampling and (b) the accuracy of the computational method employed. Classical methods (e.g., force fields) are typically used for FES and present a myriad of challenges, with parametrization being a principle one. On the other hand, parameter-free quantum mechanical (QM) methods tend to be too computationally expensive for adequate sampling. One widely used approach is a combination of methods, where the free energy difference between the two end states is computed by, e.g., molecular mechanics (MM), and the end states are corrected by more accurate methods, such as QM or hybrid QM/MM techniques. Here we report two new approaches that significantly improve the aforementioned scheme; with a focus on how to compute corrections between, e.g., the MM and the more accurate QM calculations. First, a molecular dynamics trajectory that properly samples relevant conformational degrees of freedom is generated. Next, potential energies of each trajectory frame are generated with a QM or QM/MM Hamiltonian. Free energy differences are then calculated based on the QM or QM/MM energies using either a non-Boltzmann Bennett approach (QM-NBB) or non-Boltzmann free energy perturbation (NB-FEP). Both approaches are applied to calculate relative and absolute solvation free energies in explicit and implicit solvent environments. Solvation free energy differences (relative and absolute) between ethane and methanol in explicit solvent are used as the initial test case for QM-NBB. Next, implicit solvent methods are employed in conjunction with both QM-NBB and NB-FEP to compute absolute solvation free energies for 21 compounds. These compounds range from small molecules such as ethane and methanol to fairly large, flexible solutes, such as triacetyl glycerol. Several technical aspects were investigated. Ultimately some best practices are suggested for improving methods that seek to connect

  19. Multiscale Free Energy Simulations: An Efficient Method for Connecting Classical MD Simulations to QM or QM/MM Free Energies Using Non-Boltzmann Bennett Reweighting Schemes.

    Science.gov (United States)

    König, Gerhard; Hudson, Phillip S; Boresch, Stefan; Woodcock, H Lee

    2014-04-08

    THE RELIABILITY OF FREE ENERGY SIMULATIONS (FES) IS LIMITED BY TWO FACTORS: (a) the need for correct sampling and (b) the accuracy of the computational method employed. Classical methods (e.g., force fields) are typically used for FES and present a myriad of challenges, with parametrization being a principle one. On the other hand, parameter-free quantum mechanical (QM) methods tend to be too computationally expensive for adequate sampling. One widely used approach is a combination of methods, where the free energy difference between the two end states is computed by, e.g., molecular mechanics (MM), and the end states are corrected by more accurate methods, such as QM or hybrid QM/MM techniques. Here we report two new approaches that significantly improve the aforementioned scheme; with a focus on how to compute corrections between, e.g., the MM and the more accurate QM calculations. First, a molecular dynamics trajectory that properly samples relevant conformational degrees of freedom is generated. Next, potential energies of each trajectory frame are generated with a QM or QM/MM Hamiltonian. Free energy differences are then calculated based on the QM or QM/MM energies using either a non-Boltzmann Bennett approach (QM-NBB) or non-Boltzmann free energy perturbation (NB-FEP). Both approaches are applied to calculate relative and absolute solvation free energies in explicit and implicit solvent environments. Solvation free energy differences (relative and absolute) between ethane and methanol in explicit solvent are used as the initial test case for QM-NBB. Next, implicit solvent methods are employed in conjunction with both QM-NBB and NB-FEP to compute absolute solvation free energies for 21 compounds. These compounds range from small molecules such as ethane and methanol to fairly large, flexible solutes, such as triacetyl glycerol. Several technical aspects were investigated. Ultimately some best practices are suggested for improving methods that seek to connect

  20. Linear Protection Schemes Analysis in Scattered Placement Fiber-To-The Home-Passive Optical Network Using Customer Access Protection Unit Solution

    Directory of Open Access Journals (Sweden)

    Siti A.C. Aziz

    2012-01-01

    Full Text Available Problem statement: This study highlights on restoration scheme proposed against failure in working line at the drop region for Fiber-To-The Home (FTTH with a Passive Optical Network (PON. Whereas PON is a system that brings optical fiber cable and signals all or most of the way to the end user. Approach: Survivability scheme against failure is focused on scattered residence architectures and it is applied in the ring and tree topology respectively by means of Customer Access Protection Unit (CAPU. CAPU will be installed before the ONU and ensure the signal will find the alternative path when failure occurs at the specific line. Our proposal scheme is low cost and applicable to any residence architecture. The advantage of this scheme is the failure at fiber line can be recovered until three levels to make sure the optic signal flow continuously to avoid any application disturbance. Two type of restoration scheme is proposed by means of linear protection (tree and migrated protection (ring. FTTH based network design is simulated by using Opti System 7.0 in order to investigate the power output and BER performance at each node in the tree and ring protection scheme in scattered placement. This study we perform an analysis on linear protection scheme that consisting of two model a Line to Line (L2L protection and CAPU to CAPU (C2C or Shared protection. However the migration of tree to ring topology to enable the signal flow continuously in the case of failure occurs specifically in random or scattered placement topology has been highlighted in our previous publication. Results: The signal will be divided into section; drop and pass through and the ratio is significant to determine the number of user allowed and achievable distance. Output power for optical nodes could be slightly improved by varying the pass through and drop signal ratio. Conclusion: Our proposal is the first reported up to this time in which the upstream signal flows in

  1. Coffee Connections. A Precollegiate Curriculum Unit. Grades Nine through Twelve. Revised.

    Science.gov (United States)

    Stanford Univ., CA. Stanford Program on International and Cross Cultural Education.

    This unit, designed for grades 9-12, introduces students to economic concepts of international trade through the case of the international coffee industry in California and Brazil. The following concepts are among those examined: commodities, factors of production (human resources, capital resources, and environmental resources), imports and…

  2. Coffee Connections. A Precollegiate Curriculum Unit. Grades Nine through Twelve. Revised.

    Science.gov (United States)

    Stanford Univ., CA. Stanford Program on International and Cross Cultural Education.

    This unit, designed for grades 9-12, introduces students to economic concepts of international trade through the case of the international coffee industry in California and Brazil. The following concepts are among those examined: commodities, factors of production (human resources, capital resources, and environmental resources), imports and…

  3. Connecting Girls and Science: A Feminist Teacher Research Study of a High School Prenatal Testing Unit.

    Science.gov (United States)

    Howes, Elaine Virginia

    1998-01-01

    Explores how a dozen high school girls express their relationship to and understanding of prenatal testing and its possible place in their lives and the lives of others in the context of a short unit on prenatal testing in a semester-long genetics course. Contains 57 references. (DDR)

  4. Excitonic connectivity between photosystem II units: what is it, and how to measure it?

    Science.gov (United States)

    Stirbet, Alexandrina

    2013-10-01

    In photosynthetic organisms, light energy is absorbed by a complex network of chromophores embedded in light-harvesting antenna complexes. In photosystem II (PSII), the excitation energy from the antenna is transferred very efficiently to an active reaction center (RC) (i.e., with oxidized primary quinone acceptor Q(A)), where the photochemistry begins, leading to O2 evolution, and reduction of plastoquinones. A very small part of the excitation energy is dissipated as fluorescence and heat. Measurements on chlorophyll (Chl) fluorescence and oxygen have shown that a nonlinear (hyperbolic) relationship exists between the fluorescence yield (Φ(F)) (or the oxygen emission yield, (Φ(O2)) and the fraction of closed PSII RCs (i.e., with reduced Q(A)). This nonlinearity is assumed to be related to the transfer of the excitation energy from a closed PSII RC to an open (active) PSII RC, a process called PSII excitonic connectivity by Joliot and Joliot (CR Acad Sci Paris 258: 4622-4625, 1964). Different theoretical approaches of the PSII excitonic connectivity, and experimental methods used to measure it, are discussed in this review. In addition, we present alternative explanations of the observed sigmoidicity of the fluorescence induction and oxygen evolution curves.

  5. A Novel Method for Designing and Selecting Connection Scheme Between Suburban Line and Urban Rail Transit Network%市郊线与市区轨道网络衔接的设计比选方法

    Institute of Scientific and Technical Information of China (English)

    吴放; 顾保南

    2013-01-01

    A two-stage approach was proposed to solve the problem of connecting suburban rail line to urban rail network based on the current model' s impracticability. Focusing on the first stage, the paper articulates how the set of connection design schemes is generated. A greedy search based heuristic algorithm was designed to solve the optimization problem of connecting suburban lines and urban rail network. And optimum connection scheme set was sorted out from the perspectives respectively regarding optimization searching process and different transfer coefficients that reveal the dominance of transfer in path length. High quality of connection design schemes can be ensured by these optional designs, which can also cover various connection modes of different station spacing, providing solid basis for evaluation and selection in the second stage. Finally, the aforementioned method was implemented in an example, generating an optimized connection design set, which proves the applicability of this novel design method in large scale rail network connection problem.%分析了现有数学模型对市郊线与市区轨道网络衔接设计问题的不适用性,在此基础上提出两阶段设计方法,并着重对第一阶段——衔接方案集的生成方法进行了阐述.设计了一个以贪婪搜索思想为基础的启发式算法,求解市郊线与市区轨道网络衔接的优化方案.从寻优过程和换乘主导性两个角度分别生成了较优的可选设计方案集合.这些备选方案保证了较高的方案设计质量,并能覆盖不同站间距的郊区线衔接模式,为下一阶段的方案评价比选提供基础.最后通过一个算例实现了所提出的备选衔接方案集合生成方法,证明了这一方法在大规模轨道网络中的适用性.

  6. Summary for Ammonia Compressor Control Scheme in Ammonia Unit%合成氨装置氨气压缩机控制方案总结

    Institute of Scientific and Technical Information of China (English)

    杨德林

    2013-01-01

      从大型合成氨装置氨气压缩机机组试车阶段实际经验出发,总结了机组所运用的防喘振控制系统、油系统、油雾风扇、油加热器等控制方案的特点,给国内大型机组的试车运行提供借鉴。%  Based on the actual experience of test stage for ammonia compressor unit in the large ammonia plant , sum up the control scheme characteristics of these machine units , such as anti-surge control system , oil control system ,oil mist fan and oil heater etc . , and provide a reference to the large machine unit test in domestic factories .

  7. Genetic Algorithm Supported by Graphical Processing Unit Improves the Exploration of Effective Connectivity in Functional Brain Imaging

    Directory of Open Access Journals (Sweden)

    Lawrence Wing Chi Chan

    2015-05-01

    Full Text Available Brain regions of human subjects exhibit certain levels of associated activation upon specific environmental stimuli. Functional Magnetic Resonance Imaging (fMRI detects regional signals, based on which we could infer the direct or indirect neuronal connectivity between the regions. Structural Equation Modeling (SEM is an appropriate mathematical approach for analyzing the effective connectivity using fMRI data. A maximum likelihood (ML discrepancy function is minimized against some constrained coefficients of a path model. The minimization is an iterative process. The computing time is very long as the number of iterations increases geometrically with the number of path coefficients. Using regular Quad-Core Central Processing Unit (CPU platform, duration up to three months is required for the iterations from 0 to 30 path coefficients. This study demonstrates the application of Graphical Processing Unit (GPU with the parallel Genetic Algorithm (GA that replaces the Powell minimization in the standard program code of the analysis software package. It was found in the same example that GA under GPU reduced the duration to 20 hours and provided more accurate solution when compared with standard program code under CPU.

  8. Research on unit commitment with large-scale wind power connected power system

    Science.gov (United States)

    Jiao, Ran; Zhang, Baoqun; Chi, Zhongjun; Gong, Cheng; Ma, Longfei; Yang, Bing

    2017-01-01

    Large-scale integration of wind power generators into power grid brings severe challenges to power system economic dispatch due to its stochastic volatility. Unit commitment including wind farm is analyzed from the two parts of modeling and solving methods. The structures and characteristics can be summarized after classification has been done according to different objective function and constraints. Finally, the issues to be solved and possible directions of research and development in the future are discussed, which can adapt to the requirements of the electricity market, energy-saving power generation dispatching and smart grid, even providing reference for research and practice of researchers and workers in this field.

  9. Storage dynamics in hydropedological units control hillslope connectivity, runoff generation, and the evolution of catchment transit time distributions.

    Science.gov (United States)

    Tetzlaff, D; Birkel, C; Dick, J; Geris, J; Soulsby, C

    2014-02-01

    We examined the storage dynamics and isotopic composition of soil water over 12 months in three hydropedological units in order to understand runoff generation in a montane catchment. The units form classic catena sequences from freely draining podzols on steep upper hillslopes through peaty gleys in shallower lower slopes to deeper peats in the riparian zone. The peaty gleys and peats remained saturated throughout the year, while the podzols showed distinct wetting and drying cycles. In this region, most precipitation events are 80% of flow, even in large events, reflecting the displacement of water from the riparian soils that has been stored in the catchment for >2 years. These riparian areas are the key zone where different source waters mix. Our study is novel in showing that they act as "isostats," not only regulating the isotopic composition of stream water, but also integrating the transit time distribution for the catchment. Hillslope connectivity is controlled by small storage changes in soil unitsDifferent catchment source waters mix in large riparian wetland storageIsotopes show riparian wetlands set the catchment transit time distribution.

  10. The 2012 Fungal Meningitis Outbreak in the United States: Connections Between Soils and Human Health

    Science.gov (United States)

    Burgess, Lynn; Brevik, Eric

    2013-04-01

    In September of 2012 the United States found itself facing a fungal meningitis outbreak that was traced back to contaminated steroid injections. The fungus Exserohilium rostratum, which is found in soil, among other locations in the environment, was identified as the main cause of the health issues created by the contaminated steroids. As of November 7, 2012 419 cases of fungal meningitis, stroke due to presumed fungal meningitis, or other central nervous system-related infections, 10 cases of peripheral joint infections, and 31 deaths linked to the contaminated steroids had been documented. However, the life cycle and soil ecology of E. rostratum is not well understood, and such knowledge would aid human health professionals in understanding the pathogenic potential of E. rostratum. Therefore, soil scientists have a role to play in developing the most effective ways to combat human health challenges such as the 2012 fungal meningitis outbreak.

  11. Design for grid-connected power optimization control scheme of micro PV system%微型光伏发电系统并网电能优化控制方案

    Institute of Scientific and Technical Information of China (English)

    冯旭阳; 杨育刚; 武彬

    2014-01-01

    To study micro-grid-connected PV systems,a grid-connected power forecasting model has been established based on the least square support vector machine.On this basis,a power optimization control scheme is proposed for demand-side load electricity management to improve the utilization of photovoltaic electricity and reduce usage of electricity gotten from the grid.Calculation and analysis of the scheme show that the scheme can reduce user's power consumption from distribution networks up to 10.36%,and daily average reduction of carbon emissions is 618.8 kg.The scheme ensures utilization of solar energy effectively,and improves energy saving capabilities of the system.%以微型光伏并网发电系统为研究对象,基于最小二乘支持向量机建立了光伏并网发电系统电能预测LS-SVM模型.在此基础上,以减少用户从电网获取电能,提高光伏电能利用率为目标,针对需求侧负荷用电管理,提出一种电能优化控制方案.通过实例计算分析显示,该方案可使用户从配电网获取电能减少10.36%,平均日减少碳排放量约618.8 kg,在保证光伏电能就地有效利用的同时,有效地提高了系统节能减排能力.

  12. A Technical Evaluation of Wireless Connectivity from Patient Monitors to an Anesthesia Information Management System During Intensive Care Unit Surgery.

    Science.gov (United States)

    Simpao, Allan F; Galvez, Jorge A; England, W Randall; Wartman, Elicia C; Scott, James H; Hamid, Michael M; Rehman, Mohamed A; Epstein, Richard H

    2016-02-01

    Surgical procedures performed at the bedside in the neonatal intensive care unit (NICU) at The Children's Hospital of Philadelphia were documented using paper anesthesia records in contrast to the operating rooms, where an anesthesia information management system (AIMS) was used for all cases. This was largely because of logistical problems related to connecting cables between the bedside monitors and our portable AIMS workstations. We implemented an AIMS for documentation in the NICU using wireless adapters to transmit data from bedside monitoring equipment to a portable AIMS workstation. Testing of the wireless AIMS during simulation in the presence of an electrosurgical generator showed no evidence of interference with data transmission. Thirty NICU surgical procedures were documented via the wireless AIMS. Two wireless cases exhibited brief periods of data loss; one case had an extended data gap because of adapter power failure. In comparison, in a control group of 30 surgical cases in which wired connections were used, there were no data gaps. The wireless AIMS provided a simple, unobtrusive, portable alternative to paper records for documenting anesthesia records during NICU bedside procedures.

  13. Design and Implementation of Non-dissipative Equalization Management Scheme for Series Connected Li-ion Battery Pack%串联锂电池组无损均衡管理方案设计与实现

    Institute of Scientific and Technical Information of China (English)

    黄勤; 严贺彪; 凌睿

    2011-01-01

    针对串联锂电池组充放电过程中的多电池均衡问题,设计一种实现锂电池组能量无损均衡智能快速充放电的新方案.论述充放电管理方法的总体思路,介绍无损均衡电路及电压、电流、温度的采样,给出充放电控制电路及MOSFET驱动电路等模块的设计a实验结果表明,该方案能够更快速有效地实现串联锂电池组的充放电能量无损均衡.%According to multi-cell equalization problem in the charging and discharging process of series connected li-ion battery pack, this paper designs an intelligent fast charging and discharging research scheme for li-ion battery pack that can realize energy's non-dissipative equalization. The premise and background are introduced. It proposes the overall structure and non-dissipative equalization circuit of charging and discharging management method study. Some design modules are expatiated clearly, including the sample circuits of the scheme's voltage, current and temperature, charging and discharging control and MOSFET driver circuits. Experimental results show that this scheme meets the expected requirements.

  14. [Provision of continuous health care by a unit connected to primary care centres coordinated by specialist physicians].

    Science.gov (United States)

    Esteban Giner, M J; Giner Galvañ, V; Prats Hernández, J L; Llopis Martínez, F; Cortés i Pérez, P J; Castejón Esteban, J

    2013-10-01

    To evaluate the efficacy and efficiency of a system set up to overcome the current disparity between primary and specialist health care and with the capacity to detect patients with significant diseases. To describe the activity of the Unit for Connection with Primary Care Centres (UCPCC) in the Alcoy Health Area (Alicante) during its first year. A total of 450 visits were made, with 6.5 (95% CI 5.7-7.3) first visits, and 3.9 (95% CI 3.1-4.8) successive ones per day. There were more than 50 reasons for consultation, and more than 60 final diagnoses (65.6% non-significant, 14% undefined and 12.4% significant). Digestive (31%) and functional (14.4%) diseases were the most frequently defined diagnoses, with neoplasic and autoimmune diseases among those defined as significant ones. The great majority (86.9%) of patients required 1-2 visits, with 40% diagnosed by just reviewing the hospital files. More than 20 different complementary examinations were performed, with 38.8%, 34.4%, 21.6%, and 5.2% of patients requiring 0, 1, 2, or ≥ 3, respectively. Patients with a significant pathology were diagnosed more quickly (12.4 ± 19.4 vs. 45.3 ± 52.8 days; P = .001), with less complementary examinations (0,5 ± 0,7 vs. 0,9 ± 0,9 per patient; P = .032. 58.6% vs. 39.6% patients without complementary examinations; P = .052), and were more frequently referred to specialised medicine (58.6% vs. 18.3%, P < .0001). The demonstrated differential management of patients with potentially significant pathology using existing resources, make the UCPCC with internists an efficient model for the connection between health care levels. Copyright © 2012 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España. All rights reserved.

  15. A Location-Based Duplex Scheme for Cost Effective Rural Broadband Connectivity Using IEEE 802.22 Cognitive Radio Based Wireless Regional Area Networks

    Science.gov (United States)

    Kalidoss, R.; Bhagyaveni, M. A.; Vishvaksenan, K. S.

    2014-08-01

    The search for a method of utilizing the scarce spectrum in an efficient manner is an active area of research in both academic and industrial communities. IEEE 802.22 is a standard for wireless regional area network (WRAN) based on cognitive radio (CR) that operates over underutilized portions of TV bands (54-862 MHz). Time division duplex (TDD)-based WRAN cells have such advantages as dynamic traffic allocation, traffic asymmetry to users and ease of spectrum allocation. However, these cells suffer from severe cross time slot (CTS) interference when the frames of the cells are not synchronized with adjacent WRAN cells. In this paper, we evaluate the location-based duplex (LBD) scheme for eliminating the CTS interference. The proposed LBD system is much more flexible and efficient in providing asymmetric data service and eliminating CTS interference by exploiting the advantages of both TDD and frequency division duplex (FDD) schemes. We also compare the performance of LBD systems with virtual cell concepts. Furthermore, our simulation results reveal that LBD-based systems outperform the virtual cell approach in terms of the low signal-to-interference (SIR) ratio requirement by mitigating the effects of CTS.

  16. MODELING OF THREE-PHASE THREE LEG TRANSFORMER DEVICES FOR ENGINEERING CALCULATIONS OF ASYMMETRICAL MODES FOR DIFFERENT SCHEMES OF WINDING CONNECTIONS

    OpenAIRE

    Bosneaga V.A; Suslov V.M.

    2013-01-01

    The model is proposed for the calculation and research of steady state asymmetric modes and transients in three-phase three legs transformer devices with arbitrary diagram of windings connection, taking into account the electromagnetic coupling of the windings, located on different legs. Using as an example distribution transformer of 10/0.4 kV calculations and analysis were performed of the most characteristic steady asymmetrical modes, that occur during short circuit, phase failure, unbalan...

  17. A wireless swing angle measurement scheme using attitude heading reference system sensing units based on microelectromechanical devices.

    Science.gov (United States)

    Gao, Bingtuan; Zhu, Zhenyu; Zhao, Jianguo; Huang, Boran

    2014-11-27

    Feasible real-time swing angle measurement is significant to improve the efficiency and safety of industrial crane systems. This paper presents a wireless microelectromechanical system (MEMS)-based swing angle measurement system. The system consists of two attitude heading reference system (AHRS) sensing units with a wireless communication function, which are mounted on the hook (or payload) and the jib (or base) of the crane, respectively. With a combination of a three-axis accelerometer, a three-axis gyroscope and a three-axis magnetometer, the standard extended Kalman filter (EKF) is used to estimate the desired orientation of the payload and the base. Wireless ZigBee communication is employed to transmit the orientation of the payload to the sensing unit mounted on the base, which measures the orientation of the base. Because several physical parameters from the payload to the base can be acquired from the original crane control system, the swing angles of the payload can be calculated based on the two measured orientation parameters together with the known physical parameters. Experiments were performed to show the feasibility and effectiveness of the proposed swing angle measurement system.

  18. A Wireless Swing Angle Measurement Scheme Using Attitude Heading Reference System Sensing Units Based on Microelectromechanical Devices

    Directory of Open Access Journals (Sweden)

    Bingtuan Gao

    2014-11-01

    Full Text Available Feasible real-time swing angle measurement is significant to improve the efficiency and safety of industrial crane systems. This paper presents a wireless microelectromechanical system (MEMS-based swing angle measurement system. The system consists of two attitude heading reference system (AHRS sensing units with a wireless communication function, which are mounted on the hook (or payload and the jib (or base of the crane, respectively. With a combination of a three-axis accelerometer, a three-axis gyroscope and a three-axis magnetometer, the standard extended Kalman filter (EKF is used to estimate the desired orientation of the payload and the base. Wireless ZigBee communication is employed to transmit the orientation of the payload to the sensing unit mounted on the base, which measures the orientation of the base. Because several physical parameters from the payload to the base can be acquired from the original crane control system, the swing angles of the payload can be calculated based on the two measured orientation parameters together with the known physical parameters. Experiments were performed to show the feasibility and effectiveness of the proposed swing angle measurement system.

  19. Active harmonic filtering using current-controlled, grid-connected DG units with closed-loop power control

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Blaabjerg, Frede

    2014-01-01

    voltage detection are not necessary for the proposed harmonic compensation method. Moreover, a closed-loop power control scheme is employed to directly derive the fundamental current reference without using any phase-locked loops (PLL). The proposed power control scheme effectively eliminates the impacts...

  20. Effect of Correlations of Component Failures and Cross-Connections of EDGs on Seismically Induced Core Damages of a Multi-Unit Site

    Science.gov (United States)

    Muramatsu, Ken; Liu, Qiao; Uchiyama, Tomoaki

    Aiming at proposing effective applications of seismic probabilistic safety assessment (PSA) for design and risk management of nuclear facilities, we conducted a preliminary seismic PSA study for a multi-unit site to examine core damage frequency (CDF) and core damage sequences with consideration of the effect of correlations of component failures. In addition, we also examined the effectiveness of an accident management measure, namely, cross-connections of emergency diesel generators (EDGs) between adjacent units in this study. Twin BWR-5 units of the same design were hypothesized to be located at the same site in this study and the CDF as well as the accident sequences of this two-unit site were analyzed by using SECOM2, a system reliability analysis code for seismic PSA. The results showed that the calculated CDF was dependent on the assumptions on the correlations of component failures. When the rules for assigning correlation coefficients of component responses defined in the NUREG-1150 program were adopted, the CDF of a single unit, the CDF of this two-unit site (the frequency of core damages of at least one unit at this site) and the frequency of simultaneous core damages of both units increased by factors of about 1.3, 1.2 and 2.3, respectively. In addition, it might be possible that the simultaneous core damages of both units are caused by different accident sequence pairs as well as the same sequence pairs. When cross-connections of EDGs between two units were available, the CDF of a single unit, the CDF of this two-unit site as well as the frequency of simultaneous core damages of both units decreased. In addition, the CDF of this two-unit site was smaller than the CDF of a single unit site. These results show that cross-connections of EDGs might be beneficial for a multi-unit site if the rules for assigning correlation coefficients defined in NUREG-1150 program are reasonable.

  1. An in situ hand calibration method using a pseudo-observation scheme for low-end inertial measurement units

    Science.gov (United States)

    Li, You; Niu, Xiaoji; Zhang, Quan; Zhang, Hongping; Shi, Chuang

    2012-10-01

    MEMS chips have become ideal candidates for various applications since they are small sized, light weight, have low power consumption and are extremely low cost and reliable. However, the performance of MEMS sensors, especially their biases and scale factors, is highly dependent on environmental conditions such as temperature. Thus a quick and convenient calibration is needed to be conducted by users in field without any external equipment or any expert knowledge of calibration. A novel and efficient in situ hand calibration method is presented to meet these demands in this paper. The algorithm of the proposed calibration method makes use of the navigation algorithm of the loosely-coupled GPS/INS integrated systems, but replaces the GPS observations with a kind of pseudo-observations, which can be stated as follows: if an inertial measurement unit (IMU) was rotating approximately around its measurement center, the range of its position and its linear velocity both would be within a limited scope. Using a Kalman filtering algorithm, the biases and scale factors of both accelerometer triad and gyroscope triad can be calibrated together within a short period (about 30 s), requiring only motions by hands. Real test results show that the proposed method is suitable for most consumer grade MEMS IMUs due to its zero cost, easy operation and sufficient accuracy.

  2. Shearer' s Haulage Unit Electric Motor Cylinder Repair Scheme%采煤机牵引部电动机筒返修的措施

    Institute of Scientific and Technical Information of China (English)

    陈克华; 赵晓辉; 薛强

    2012-01-01

    Briefly introduces a large volume black skin that is led by biasing of cylinder and too large diameter after shear' s haulage unit casting, which affect the electric motor installing and use at underground coal mine. Three repair schemes are proposed including welding batten plates along the circumference of electric motor cylinder, overlaying batten plates along the circumference and bush fitting at the back of cylinder' s internal boring. According the feasibility analysis of welding technique control and cylinder structure, the third repair scheme that bush fitting at the back of cylinder' s internal boring is settled down, which successfully solves the deficiency of cast electric motor cylinder and saves repair cost.%简要介绍了某滚筒采煤机牵引部壳体铸造后电动机筒部位因简体偏置及简体直径过大导致机加工后仍有大面积黑皮,影响电动机在矿井下安装和使用的问题。提出了沿筒体圆周方向均布焊接板条、筒体圆周面整体堆焊焊材、筒体镗孔后镶套三种返修方案。根据焊接工艺控制及筒体结构等的可行性分析,最终确定了筒体镗孔后镶套的返修方案,顺利地解决了铸造后电动机筒的缺陷,并节约了返修成本。

  3. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  4. Special Protection Scheme at BTPS Power Station

    Science.gov (United States)

    Ballal, Makarand Sudhakar; Suryawanshi, Hiralal Murlidhar; Ballal, Deepali Makarand; Mishra, Mahesh Kumar

    2016-03-01

    After 2003 free licensees' act in power sector, it is observed that many power plants from public sector as well as from private sectors are going to be commissioned. The load growth in India is about more than 10% pa. As these plants are going to connect to the power grid, therefore the grid is going to become more complicated. Also the problems related to grid stability are enhanced. There shall be possibilities regarding failure of grid system and under such circumstance it is always desirable to island minimum single generating unit in power plant of specified geographical area. After islanding the generating unit, this unit has to survive not only for the restoration of grid but also for power supply to important consumers. For the grid stability and effective survival of islanded generating unit, it is mandatory to maintain the power balance equation. This paper focuses on the lacunae's observed in implementation of special protection scheme to carry out islanding operation at Bhusawal Thermal Power Station (BTPS) by considering the case studies. The concepts of islanding, load shedding, generator tripping and along with importance of power balance equation is discussed. Efforts are made to provide the solution for the survival of islanding scheme.

  5. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...

  6. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...

  7. Temporal and spatial patterns of wetland extent influence variability of surface water connectivity in the Prairie Pothole Region, United States

    Science.gov (United States)

    Vanderhoof, Melanie; Alexander, Laurie C.; Todd, Jason

    2016-01-01

    Context. Quantifying variability in landscape-scale surface water connectivity can help improve our understanding of the multiple effects of wetlands on downstream waterways. Objectives. We examined how wetland merging and the coalescence of wetlands with streams varied both spatially (among ecoregions) and interannually (from drought to deluge) across parts of the Prairie Pothole Region. Methods. Wetland extent was derived over a time series (1990-2011) using Landsat imagery. Changes in landscape-scale connectivity, generated by the physical coalescence of wetlands with other surface water features, were quantified by fusing static wetland and stream datasets with Landsat-derived wetland extent maps, and related to multiple wetness indices. The usage of Landsat allows for decadal-scale analysis, but limits the types of surface water connections that can be detected. Results. Wetland extent correlated positively with the merging of wetlands and wetlands with streams. Wetness conditions, as defined by drought indices and runoff, were positively correlated with wetland extent, but less consistently correlated with measures of surface water connectivity. The degree of wetland-wetland merging was found to depend less on total wetland area or density, and more on climate conditions, as well as the threshold for how wetland/upland was defined. In contrast, the merging of wetlands with streams was positively correlated with stream density, and inversely related to wetland density. Conclusions. Characterizing the degree of surface water connectivity within the Prairie Pothole Region in North America requires consideration of 1) climate-driven variation in wetness conditions and 2) within-region variation in wetland and stream spatial arrangements.

  8. Development of the scheme of stepwise combustion of coal in the inverter firebox of a power unit of 1000 MW power

    Science.gov (United States)

    Prokhorov, V. B.; Chernov, S. L.; Kirichkov, V. S.

    2017-09-01

    The desire to increase the efficiency of using the heat of burned solid fuel leads to the significant growth of the initial steam parameter at steam-turbine plants. At the maximum temperatures of fresh and secondary steam of 700-720°C, the price of connecting of steam pipelines between the boiler and turbine is up to 20% of the price of a power plant unit, which dictates the necessity to decrease their length. One of the methods to achieve this is the application of an inverter firebox. An M-shaped profile of boiler, allowing one to decrease the length of heat-resistant steam pipelines, was developed at NRU MPEI. A distinctive feature of the profile is two inclined connecting gas flues between the firebox and convective shaft, starting from the gas windows located in the lower third of the firebox height. The boiler was designed for the steam production of 2493 t/h with the parameters of fresh steam of 35 MPa and 710°C. Thermal and aerodynamic calculations made it possible to get the sizes of boiler and dimensions of heating surfaces, and they also allow one to get the values of temperatures in the characteristic points along the gas path. On the basis of the results of calculations, the coefficient of efficiency of the boiler was 93.07% and the fuel consumption was 91.13 kg/s. For this boiler, the technology of effective stepwise burning of coal in a direct-flow-vortex torch (DFVT) in a system of vertical and horizontal tangential torches in the mode of solid slag removal, previously successively used in boilers with a traditional profile and upgraded to an inverter firebox, is proposed. The layouts of the direct-flow burners and nozzles for even and odd vertical sections of the firebox and also in a horizontal section were proposed. Organization of staged air supply in the vertical direction with a high fraction of in-firebox recycle of hot gases leads to low concentration of nitrogen oxides.

  9. A Metal-Organic Framework Containing Unusual Eight-Connected Zr–-Oxo Secondary Building Units and Orthogonal Carboxylic Acids for Ultra-sensitive Metal Detection

    Energy Technology Data Exchange (ETDEWEB)

    Carboni, Michaël; Lin, Zekai; Abney, Carter W.; Zhang, Teng; Lin, Wenbin (UC)

    2015-08-21

    Two metal-organic frameworks (MOFs) with Zr-oxo secondary building units (SBUs) were prepared by using p,p'-terphenyldicarboxylate (TPDC) bridging ligands pre-functionalized with orthogonal succinic acid (MOF-1) and maleic acid groups (MOF-2). Single-crystal X-ray structure analysis of MOF-1 provides the first direct evidence for eight-connected SBUs in UiO-type MOFs. In contrast, MOF-2 contains twelve-connected SBUs as seen in the traditional UiO MOF topology. These structural assignments were confirmed by extended X-ray absorption fine structure (EXAFS) analysis. The highly porous MOF-1 is an excellent fluorescence sensor for metal ions with the detection limit of <0.5 ppb for Mn2+ and three to four orders of magnitude greater sensitivity for metal ions than previously reported luminescent MOFs.

  10. Historical potentiometric surface of the Edwards-Trinity aquifer system and contiguous hydraulically connected units, west-central Texas

    Science.gov (United States)

    Bush, Peter W.; Ardis, Ann F.; Wynn, Kirby H.

    1993-01-01

    The Edwards-Trinity aquifer system is a sequence of near-surface, hydraulically connected, Cretaceous carbonate and quartzose clastic rocks that underlie about 42,000 mi2 of west-central Texas (fig. 1). The aquifer system is currently (1991) being studied as a part of the U.S. Geological Survey's Regional Aquifer-System Analysis (RASA) program, which is intended to describe the regional hydrogeology of important aquifer systems nationwide.

  11. Analysis of the Maximum Efficiency Operating Scheme for an Solid Oxide Fuel Cell Distributed Generator in a Grid-connected System%固体氧化物燃料电池分布式电源最大效率并网运行方式分析

    Institute of Scientific and Technical Information of China (English)

    李勇汇; 冉兵; 朱海昱

    2012-01-01

    The maximum efficiency control scheme for a solid oxide fuel cell (SOFC) distributed generator (DG) in the grid-connected condition was proposed. By introducing the steady-state equations which govern the complex electrochemistry, thennodynamic and electrical processes of the SOFC DG, the relationship between the AC and DC sides of the SOFC DG was established. Analyses indicate that the control variables of the power conditioning unit are dependant of the control variables of the cell stack if the constant unity power factor operating scheme for the SOFC DG is chosen. However, the operating states of the SOFC DG under this control scheme must be subjected to the operating constraints denoted as feasible operating space (FOS). The non-linear programming method was then used to determine the maximum efficiency and the optimal control variables. Simulation results show that the SOFC DG under the maximum efficiency should maintain three DC-side operating variables constant simultaneously, namely, fuel utilization factor, excess oxygen ratio and stack operating temperature.%提出了一种固体氧化物燃料电池(solid oxide fuel cell,SOFC)分布式电源(distributed generator,DG)以最大效率并网发电的控制策略.通过引入反映内部复杂电化学、热力学和电气过程的稳态方程,建立了SOFC分布式电源交、直流两侧的联系.分析表明,SOFC分布式电源在采用恒功率因素运行方式时其功率调节单元的2个控制变量取决于电池堆的2个变量.然而,这种运行方式必须满足SOFC分布式电源的运行状态限制在被定义为合理运行空间(feasible operating space,FOS)的范围内.非线性规划方法用来计算SOFC分布式电源的最大效率和最优控制变量.仿真表明,SOFC分布式电源以最大效率发电时其直流侧氢气利用系数、过量氧气比例和电池堆温度这3个运行变量必须保持恒定.

  12. Development of energy efficient small power motors with integrated electronic unit for 230V mains connection; Entwicklung von energieeffizienten Kleinmotoren mit integrierter Betriebselektronik fuer direkte Netzeinspeisung

    Energy Technology Data Exchange (ETDEWEB)

    Lelkes, Andras [GEFEG-NECKAR Antriebssysteme GmbH, Gosheim (Germany)

    2011-07-01

    This paper describes the development and the optimization of a drives family with integrated electronic control unit. This integration makes elegant and compact drive solutions for numerous industrial applications possible. The wiring effort and the space required in the electronic cabinet are reduced considerably. All these drives are based virtually on the same control hardware and firmware. Therefore, all family members can be controlled by customers on the same way. Especially interesting are the new members of the drives family for direct 230V 50Hz mains connection. (orig.)

  13. The Connections among Immigration, Nation Building, and Adult Education English as a Second Language Instruction in the United States

    Science.gov (United States)

    Ullman, Char

    2010-01-01

    Since its inception at the turn of the last century, adult education English as a Second Language (ESL) instruction in the United States has been entwined with immigration processes and ideas of the nation. In spite of current uncertainty about the overhauling of federal immigration policy, increasingly anti-immigrant laws in states such as…

  14. Contact and Connection: A Cross-Cultural Look at Parenting Styles in Bali and the United States

    Science.gov (United States)

    Kestenberg-Amighi, Janet

    2004-01-01

    This article argues that a culturally approved style of nonverbal parent-infant interaction influences the unfolding parent-child relationship and the child's social development. The author, an anthropologist, compares parenting styles in the "low-contact" culture of the United States with parenting in the "high-contact"…

  15. Key Predistribution Schemes for Distributed Sensor Networks

    CERN Document Server

    Bose, Mausumi; Mukerjee, Rahul

    2011-01-01

    Key predistribution schemes for distributed sensor networks have received significant attention in the recent literature. In this paper we propose a new construction method for these schemes based on combinations of duals of standard block designs. Our method is a broad spectrum one which works for any intersection threshold. By varying the initial designs, we can generate various schemes and this makes the method quite flexible. We also obtain explicit algebraic expressions for the metrics for local connectivity and resiliency. These schemes are quite efficient with regard to connectivity and resiliency and at the same time they allow a straightforward shared-key discovery.

  16. Performance of Two Cloud-Radiation Parameterization Schemes in the Finite Volume General Circulation Model for Anomalously Wet May and June 2003 Over the Continental United States and Amazonia

    Science.gov (United States)

    Sud, Y. C.; Mocko, David M.; Lin, S. J.

    2006-01-01

    An objective assessment of the impact of a new cloud scheme, called Microphysics of Clouds with Relaxed Arakawa-Schubert Scheme (McRAS) (together with its radiation modules), on the finite volume general circulation model (fvGCM) was made with a set of ensemble forecasts that invoke performance evaluation over both weather and climate timescales. The performance of McRAS (and its radiation modules) was compared with that of the National Center for Atmospheric Research Community Climate Model (NCAR CCM3) cloud scheme (with its NCAR physics radiation). We specifically chose the boreal summer months of May and June 2003, which were characterized by an anomalously wet eastern half of the continental United States as well as northern regions of Amazonia. The evaluation employed an ensemble of 70 daily 10-day forecasts covering the 61 days of the study period. Each forecast was started from the analyzed initial state of the atmosphere and spun-up soil moisture from the first-day forecasts with the model. Monthly statistics of these forecasts with up to 10-day lead time provided a robust estimate of the behavior of the simulated monthly rainfall anomalies. Patterns of simulated versus observed rainfall, 500-hPa heights, and top-of-the-atmosphere net radiation were recast into regional anomaly correlations. The correlations were compared among the simulations with each of the schemes. The results show that fvGCM with McRAS and its radiation package performed discernibly better than the original fvGCM with CCM3 cloud physics plus its radiation package. The McRAS cloud scheme also showed a reasonably positive response to the observed sea surface temperature on mean monthly rainfall fields at different time leads. This analysis represents a method for helpful systematic evaluation prior to selection of a new scheme in a global model.

  17. Third Order of Automatic Restoration Scheme Offered in Fiber ToThe Home-Passive Optical Network through Customer Access Protection Unit

    Directory of Open Access Journals (Sweden)

    Siti A.C. Aziz

    2012-01-01

    Full Text Available Problem statement: This study highlight on restoration scheme proposed against failure in working line at the drop region for Fiber To The Home (FTTH with a Passive Optical Network (PON. Whereas PON is a system that brings optical fiber cable and signals all or most of the way to the end user. In this study we highlighted the issue on survivability scheme against failure which is focused scattered residence architectures. Approach: Two type of restoration scheme is proposed by means of linear protection (tree and migrate protection (ring. Our proposal scheme is inexpensive and applicable to any residence architecture (ordered placement and scattered placement. The advantage of this scheme is the failure at fiber line can be recovered until two levels to make sure the optic signal flow continuously. FTTH based network design is simulated by using opti system 7.0 in order to investigate the power output and BER performance at each node in the tree and ring protection scheme in scattered placement to prove the system feasibility. Results: Computation of Channel Dissipation on Each Breakdown Condition has give the insertion for 16.4 dB (normal condition, 18.8 dB (failure order 1, 21.2 dB (failure order 2 and 23.6 dB (failure order 3. Simulation was carried out to study the maximum distance that can be achieved for signaling path in two situations which are; in normal and breakdown condition with the restoration scheme. The sensitivity that used in analysis to study the maximum fiber length is -25, -30 and -35 dBm. The result shows output power that linearly decrease as the fiber length is increased; for four breakdown condition in this protection network. The highest output power achieved by normal condition at each increase in distance compared to the output power at level 3 breakdown. In addition, the accessibility of maximum distance is dependent on the sensitivity used. In order to achieve a high fiber length of more than 20 km-1 at third level

  18. An FCB Unit Placement Scheme Considering Investment Cost and Economic Benefit%综合考虑投资成本和经济收益的快速切回机组布点方案

    Institute of Scientific and Technical Information of China (English)

    刘崇茹; 熊岑; 吴旻昊; 龙霏; 劲宇

    2015-01-01

    With the maturity of fast cut back(FCB)technology of large-scale thermal power units,it is now possible to use the FCB unit as the black-start power supply after a blackout.Planning the location of FCB units should take the engineering practice into account.The properties of the optimized placement scheme of FCB units are derived with the graph theory method.The successive property of the optimal placement scheme with known active point numbers is proved.Then the recursive method is presented for optimizing the placement scheme of FCB units.An economic index is then developed.Based on the calculating results of the recursive method,a placement scheme of FCB units meeting both safety and economic requirements can be obtained according to the economic index.Example analysis results show that the recursive method is more efficient and has a higher robustness than the conventional method.Meanwhile,with reference to the economic index,it can be seen that the calculation results can be used as a basis for black-start power supply planning.%随着大型火电机组快速切回(FCB)技术的成熟,将 FCB 机组作为大停电后黑启动电源的设想成为可能。规划 FCB 机组的布点位置,应兼顾工程实际。文中首先采用图论方法推导了最优布点方案的性质,证明已知活跃顶点个数的最优布点方案具有继承性。继而提出采用递推法对 FCB机组布点方案进行寻优。然后,建立了 FCB 机组布点方案的经济效益指标,基于递推法计算结果,依据该指标筛选出同时满足安全性和经济性要求的 FCB 机组最优布点方案。算例分析结果表明,递推法较常规方法计算效率高、鲁棒性强。并且,结合经济性指标,得到的结果方案可作为实际系统黑启动电源规划的决策依据。

  19. A control approach for the operation of DG units under variations of interfacing impedance in grid-connected mode

    DEFF Research Database (Denmark)

    Hoseini, S. Kazem; Pouresmaeil, E.; Hosseinnia, S. H.

    2016-01-01

    converter is highly sensitive to the impacts of this impedance changes; then, DG unit cannot inject appropriate currents. To deal with the instability problem, a control method based on fractional order active sliding mode is proposed in this paper, which is less sensitive to variations of interfacing...... impedance. A fractional sliding surface, which demonstrates the desired dynamics of system is developed and then, the controller is designed in two phases as sliding and reaching phases to keep the control loop stable. Stability issues of the control method are discussed in details and the conditions...... in which the proposed model works in a stable operating mode is defined. The proposed control method takes a role to provide high quality power injection and ensures precise references tracking and fast response despite such uncertainties. Theoretical analyses and simulation results are established...

  20. The financial crisis and recent family policy reforms in Finland, Germany and the United Kingdom : Is there a connection?

    Directory of Open Access Journals (Sweden)

    Mikael Nygård

    2015-03-01

    Full Text Available The turmoil created by the financial crisis and economic recession in Europe has served as an impetus for austerity measures in many countries. In this article, we ask whether these crises have also triggered reforms in family policy, and we focus on three European welfare states – Finland, Germany and the United Kingdom – countries that are often considered members of different family policy regimes. The article addresses two main research questions. The first one relates to the number, direction and magnitude of family policy reforms in these three countries since the beginning of the financial crisis in 2008/2009, while in the second we discuss whether the reforms observed during this period can be seen as being related to the financial crisis and its later repercussions on the Euro-zone area, or if there are other explanations.

  1. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related......With ever increasing size of graphs, many distributed graph systems emerged to store, preprocess and analyze them. While such systems ease up congestion on servers, they incur certain penalties compared to centralized data structure. First, the total storage required to store a graph...... in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...

  2. Building and critiquing qualitative research websites: a cyberspace project to connect undergraduate nursing students in Canada and the United States.

    Science.gov (United States)

    Teel, Cynthia S; Shaw, Judith A

    2005-01-01

    This project had a dual purpose: 1) to facilitate student learning about qualitative research methods, and 2) to promote collegiality and professional development among senior nursing students in Canada and the United States through the use of distance technology. In each of three project years, students at St. Francis Xavier University (STFX) in Nova Scotia initiated the experience by working in small groups to develop websites about different methodological approaches in qualitative research. Site information included an overview of the selected approach, discussion of trustworthiness issues, citation of journal articles in which authors used the approach, additional references, and some personal information about the student developers. Also working in small groups, University of Kansas students identified and read related research articles, reviewed website information, and responded to the STFX groups about the usefulness of site information in increasing understanding of qualitative methods and using the information for evaluation of research. The experience promoted active use of qualitative research concepts and facilitated the development of skills in evaluating research article content and website content. Participation in the activity fostered positive perceptions about the value and use of research and helped students appreciate the similarities in courses, programs, and professional requirements and values among international peers.

  3. Maintaining connections: some thoughts on the value of intensive care unit rounding for general medicine ward teams.

    Science.gov (United States)

    Howell, Joel D

    2011-09-06

    When established ward patients are unexpectedly transferred to an intensive care unit (ICU), the ward team should continue to follow them. Although there may be reasons not to do so, the advantages outweigh the obstacles. Great pedagogic value can be gained from following patients after acute decompensation, but a more important reason is that by following patients into the ICU, the ward team can enact for both patients and their families the twin virtues of caring and continuity. Doing so also demonstrates the highest ideals of medicine-that we are focused not on defined areas of turf, but on our patient's well-being. It shows that we are not merely doing narrowly defined "shift work," but that we truly care about our patients. Rounding on established patients who have been transferred into the ICU is the sort of behavior that undergirds the fundamental bases of professionalism. It takes a few minutes from a busy day, but it can be incredibly beneficial for families, patients, and the ideals of medicine.

  4. 1000MW直接空冷机组凝结水泵配置方案探讨%Discussion on Configuration Scheme of Condensate Pump of a 1 000 MW Direct Air-cooling Unit

    Institute of Scientific and Technical Information of China (English)

    胡训栋; 曲宁; 高振宝

    2012-01-01

    针对1000MW直接空冷机组的凝绪水泵配置方案进行论述,对提出的多个方案进行技术经济比较分析.给出凝结水泵的配置建议。%This paper is intended to discuss condensate pump configuration scheme of a 1 000 MW direct air-cooling unit, proposes a number of options for the analysis of technical and economic comparison, and recommends configuration of condensate pump.

  5. An Ordinal Optimization Based Locating Scheme of Fast Cut Back Thermal Power Units%应用序优化理论的快速切负荷机组布点方案

    Institute of Scientific and Technical Information of China (English)

    卢恩; 宁健; 刘皓明; 刘明波; 侯云鹤

    2014-01-01

    具备快速切负荷(fast cut back,FCB)功能的火电机组能在外部电网发生故障时带厂用电运行,在故障消除之后迅速对外供电,是一种性能优异的黑启动电源。分析了 FCB机组对电网恢复的影响,以电网机组恢复时间最短为目标,考虑机组启动时间、启动功率、线路充电时间等约束条件,建立了FCB机组优化布点方案模型。在满足工程需要的前提下提高计算效率,引入序优化理论,确保以足够高的概率得到足够好的FCB机组的布点方案。通过经典IEEE-118节点算例和某实际系统算例验证了模型和算法的有效性。算例结果表明,合理的 FCB 机组布点方案能够减少系统恢复时间。%The thermal power generation units possessing the function of fast cut back (FCB) that they can serve for auxiliary power consumption during external faults in power grid and fast supply power after external faults cleared, so they are excellent power source for black start. The influences of FCB units on power grid restoration are analyzed, and taking the shortest restoration time of grid units as the objective and the startup time, starting power, energizing time of transmission lines as constraints, a model of optimal locating scheme for FCB units is established. To improve the computing efficiency, the ordinal optimization is led in to ensure obtaining good enough locating scheme for FCB units with as high as enough probability. The effectiveness of the proposed model and algorithm is validated by simulation results of IEEE 118-bus system and a certain actual power grid. Simulation results show that reasonable locating scheme of FCB units can speed up the restoration of power grid.

  6. Generating Units

    Data.gov (United States)

    Department of Homeland Security — Generating Units are any combination of physically connected generators, reactors, boilers, combustion turbines, and other prime movers operated together to produce...

  7. Design and testing of a centralized protection scheme for micro-grids

    Institute of Scientific and Technical Information of China (English)

    Sohrab Mirsaeidi; Dalila Mat Said; Mohammad Wazir Mustafa; Mohammad Hafiz Habibuddin; Kimia Ghaffari

    2015-01-01

    Micro-grids comprise low voltage distribution systems with distributed energy resources (DERs) and controllable loads which can operate connected to the medium voltage grid or islanded in a controlled coordinated way. This concept aims to move from “connect and forget” philosophy towards a full integration of DERs. Micro-grids can provide numerous economic and environmental benefits for end-customers, utilities and society. However, their implementation poses great technical challenges, such as a new philosophy in design of protection systems. In this work, a micro-grid protection scheme is presented based on positive-sequence component using phasor measurement units (PMUs) and a central protection unit (CPU). The salient feature of the proposed scheme in comparison with the previous works is that it has the ability to protect both radial and looped micro-grids against different types of faults with the capability of single-phase tripping. Furthermore, since the CPU is capable of updating its pickup values (upstream and downstream equivalent positive-sequence impedances of each line) after the first change in the micro-grid configuration (such as transferring from grid-connected to islanded mode and or disconnection of a line, bus, or DER either in grid-connected mode or in islanded mode), it can protect micro-grid against subsequent faults. Finally, in order to verify the effectiveness of the suggested scheme and the CPU, several simulations have been undertaken by using DIgSILENT PowerFactory and MATLAB software packages.

  8. Biodiesel Fuel Company Owner Pleads Guilty to Fraud and Clean Air Act Crimes Connected to Renewable Fuels Scheme / Philip J. Rivkin faces more than 10 years imprisonment and $51 million in restitution

    Science.gov (United States)

    WASHINGTON - Philip Joseph Rivkin, a.k.a. Felipe Poitan Arriaga, 50, today pleaded guilty to a Clean Air Act false statement and mail fraud as part of his role in a scheme to defraud EPA by falsely representing that he was producing millions of gall

  9. The connection between children's knowledge and use of grapho-phonic and morphemic units in written text and their learning at school.

    Science.gov (United States)

    Bryant, Peter; Nunes, Terezinha; Barros, Rossana

    2014-06-01

    Most psychologists who study children's reading assume that their hypotheses are relevant to children's success at school. This assumption is rarely tested. The study's aims were to see whether two successful measures of the processes underlying children's learning to read and write are related to their success in English, science, and mathematics as measured by school assessments. Data from the Avon Longitudinal Study of Parents and Children were available for between 2,500 and 5,900 children (in different analyses) on their use of graphophonic and morphemic units in reading and writing and on their achievement in Key Stage 2 and Key Stage 3 assessments. Hierarchical multiple regressions assessed the relationship between children's use of grapho-phonic and morphemic units at 8- and 9-years and their performance in the Key Stage 2 (11-years) and Key Stage 3 (14-years) assessments in English, mathematics, and science. The children's grapho-phonic and morphemic skills predicted their achievement in all three subjects at Key Stage 2, 3 years later, and at Key Stage 3, 5 years later, even after stringent controls for differences in age and IQ. The connection between the two types of orthographic skills and the children's educational success was largely mediated by their reading ability as measured by standardised tests. Children's knowledge and use of grapho-phonic and morphemic rules has a lasting effect on the progress that they make at school. This knowledge has an impact on their reading ability which in turn affects their success in learning about English, mathematics and science. © 2013 The British Psychological Society.

  10. Facilitate generation connections on Orkney by automatic distribution network management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report summarises the results of a study assessing the capability and limitations of the Orkney Network under a variety of conditions of demand, generation connections, network configuration, and reactive compensation). A conceptual active management scheme (AMS) suitable for the conditions on Orkney is developed and evaluated. Details are given of a proposed framework for the design and evaluation of future active management schemes, logic control sequences for managed generation units, and a proposed evaluation method for the active management scheme. Implications of introducing the proposed AMS are examined, and the commercial aspects of an AMS and system security are considered. The existing Orkney network is described; and an overview of the SHEPDL (Scottish Hydro Electric Power Distribution Ltd.) SCADA system is presented with a discussion of AMS identification, selection, and development.

  11. Facilitate generation connections on Orkney by automatic distribution network management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report summarises the results of a study assessing the capability and limitations of the Orkney Network under a variety of conditions of demand, generation connections, network configuration, and reactive compensation). A conceptual active management scheme (AMS) suitable for the conditions on Orkney is developed and evaluated. Details are given of a proposed framework for the design and evaluation of future active management schemes, logic control sequences for managed generation units, and a proposed evaluation method for the active management scheme. Implications of introducing the proposed AMS are examined, and the commercial aspects of an AMS and system security are considered. The existing Orkney network is described; and an overview of the SHEPDL (Scottish Hydro Electric Power Distribution Ltd.) SCADA system is presented with a discussion of AMS identification, selection, and development.

  12. Delimiting Evolutionarily Significant Units of the Fish, Piaractus brachypomus (Characiformes: Serrasalmidae), from the Orinoco and Amazon River Basins with Insight on Routes of Historical Connectivity.

    Science.gov (United States)

    Escobar, Maria Doris; Andrade-López, Juana; Farias, Izeni P; Hrbek, Tomas

    2015-01-01

    The freshwater fish Piaractus brachypomus is an economically important for human consumption both in commercial fisheries and aquaculture in all South American countries where it occurs. In recent years the species has decreased in abundance due to heavy fishing pressure. The species occurs in the Amazon and Orinoco basins, but lack of meristic differences between fishes from the 2 basins, and extensive migration associated with reproduction, have resulted in P. brachypomus being considered a single panmictic species. Analysis of 7 nuclear microsatellites, mitochondrial DNA sequences (D-loop and COI), and body shape variables demonstrated that each river basin is populated by a distinct evolutionarily significant unit (ESU); the 2 groups had an average COI divergence of 3.5% and differed in body depth and relative head length. Historical connection between the 2 basins most probably occurred via the Rupununi portal rather than via the Casiquiare canal. The 2 ESUs will require independent fishery management, and translocation of fisheries stocks between basins should be avoided to prevent loss of local adaptations or extinction associated with outbreeding depression. Introductions of fishes from the Orinoco basin into the Putumayo River basin, an Amazon basin drainage, and evidence of hybridization between the 2 ESUs have already been detected.

  13. 智能变电站合并单元智能终端整改方案的探讨%Discussion on Unit Merging and Intelligent Terminal Modification Scheme of Smart Substation

    Institute of Scientific and Technical Information of China (English)

    韩卫恒; 郝伟; 孙瑞浩

    2015-01-01

    According to the requirements from State Grid about intelligent substation's unit merging and intelligent terminal's modification, the difficulties for modification are summarized and several modification schemes, such as full outage rectification, portion outage rectification, intervals outage rectification and A/B sub-net rectification, are proposed in this article. Based upon analysis about characteristics and application conditions of the schemes, some recommendations and conclusions are presented.%根据国家电力调度通信中心对智能变电站合并单元、智能终端整改的要求,总结山西省智能变电站合并单元、智能终端整改难点,提出全站全部停运、部分停运、按间隔停运、双套分网等整改技术方案,通过分析各技术方案的优缺点及使用条件,提出了相应的建议。

  14. Energy partitioning schemes: a dilemma.

    Science.gov (United States)

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.

  15. 裂解汽油加氢装置的节能改造方案%Energy-Saving Revamping Scheme for Pyrolysis Gasoline Hydrogenation Units

    Institute of Scientific and Technical Information of China (English)

    张炜

    2013-01-01

    Based on a typical pyrolysis gasoline hydrogenation unit,process simulation and pinch analysis were applied to study the potential of its energy efficiency improvement.Combined with the actual operation data,some problems in the unit were found,including a lot of heat transferred across the pinch,low heat efficiency of the feed furnace of the second reactor,high exergy loss of the second reactor outlet water cooler and low temperature of the depentanizer feed.A series of measures should be taken to solve the problems,including using efficient heat exchanger to decrease the temperature difference of the heat transfer,adding a thermal separation unit to separate the circulating hydrogen and reduce the cooling water requirement,and redesigning the heat exchanger network.Computer simulation,feasibility study,and estimate of investment and income show that the measures can reduce the energy consumption significantly and achieve better economic benefit.%采用Aspen Plus流程模拟软件对一种典型裂解汽油加氢装置工艺流程进行了模拟计算,并对换热网络进行了夹点分析,结合实际生产运行情况,对装置进行了用能分析.模拟结果表明,裂解汽油加氢装置存在换热网络跨夹点传热量大、二段加氢反应器进料加热炉热效率低、二段加氢反应器出料水冷却器有效能损失大、脱C5塔进料温度低造成塔的加热蒸汽消耗量大等问题.提出了包括二段加氢反应器进出料换热采用高效换热器、二段加氢反应器出料循环氢气采用热分离流程和优化换热网络等内容的改造方案;分析了改造方案的可行性,估算了改造的投资和收益情况,通过改造可显著降低裂解汽油加氢装置的能耗.

  16. Connected Traveler

    Energy Technology Data Exchange (ETDEWEB)

    Schroeder, Alex

    2015-11-01

    The Connected Traveler project is a multi-disciplinary undertaking that seeks to validate potential for transformative transportation system energy savings by incentivizing efficient traveler behavior. This poster outlines various aspects of the Connected Traveler project, including market opportunity, understanding traveler behavior and decision-making, automation and connectivity, and a projected timeline for Connected Traveler's key milestones.

  17. 二甲双胍联合 TC 方案治疗晚期卵巢癌的临床观察%Clinical Observations on Metformin United TC Scheme in Advanced Ovarian Cancer

    Institute of Scientific and Technical Information of China (English)

    慈晓华; 庄静; 冯福斌; 孙月; 马家栋; 孙长岗

    2015-01-01

    目的:分析比较二甲双胍联合TC方案和单纯TC方案在伴有糖尿病的中老年晚期卵巢癌患者术后辅助化疗中的临床疗效。方法60例伴有糖尿病的中老年晚期卵巢癌患者,均用胰岛素控制血糖良好,随机分为治疗组和对照组,每组30例,治疗组采用二甲双胍联合TC方案治疗,对照组采用TC方案治疗。两组患者治疗均以21 d为1个周期。至少完成2周期化疗的患者进行疗效、毒副反应评价。结果治疗组的临床疗效优于对照组,治疗组有效28例(93.3%);对照组有效19例(63.3%)。两组比较,差异具有统计学意义( P<0.05)。两组的副反应相比,差异无统计学意义( P>0.05)。结论采用二甲双胍联合TC方案治疗伴糖尿病的中老年人晚期卵巢癌的临床疗效确切,不良反应并未明显增加,值得在临床推广应用。%[ ABSTRACT ] Objective To compare the clinical effect in assistant chemotherapy of metformin united TC scheme and alone TC scheme in elderly patients suffering from advanced ovarian cancer and diabetes.Methods Sixty elderly patients suffering from advanced ovarian cancer and diabetes,all with insulin to control blood sugar well,random-ly were divided into treatment group and control group.The treatment group were treated with metformin united TC scheme,the control group with TC scheme only.Twenty-one days as a treatment cycle.the efficacy and side effects in pa-tients at least two cycles of chemotherapy were evaluated.Results The clinical efficacy of the treatment group is better than the control group.There are twenty-eight cases of effective in the treatment group and the effective rate is 93.3%. There are nineteen cases of effective in the control group and the effective rate is 63 .3%,the effective rate were statisti-cally significant(P0.05).Conclusion The clinical effi-cacy of treatment with metformin united TC program in elderly patients suffering

  18. Guangzhou Nansha Area Abandoned Quarries Connected into Lake Construction Scheme%广州南沙地区废弃采石坑连通成湖建设方案初探

    Institute of Scientific and Technical Information of China (English)

    翟丽嫦; 杜冬阳

    2015-01-01

    According to the 9 abandoned quarries in Nansha new area, the transformation of water injection into the lake to take communicated using scheme has been put forward, and from the perspective of water quantity, water power, the feasibility of flood storage etc.The transformation using the scheme for the abandoned quarries in tidal regions of ecology, landscape restoration provide certain reference value.%针对南沙新区大山山脚下的9个废弃采石坑,因地制宜,提出采取连通注水成湖的改造利用方案,并从水量、水动力、蓄涝等角度论述其可行性。该改造利用方案可为感潮地区废弃采石坑的生态、景观修复提供一定的参考价值。

  19. Connecting Grammaticalisation

    DEFF Research Database (Denmark)

    Nørgård-Sørensen, Jens; Heltoft, Lars; Schøsler, Lene

    morphological, topological and constructional paradigms often connect to form complex paradigms. The book introduces the concept of connecting grammaticalisation to describe the formation, restructuring and dismantling of such complex paradigms. Drawing primarily on data from Germanic, Romance and Slavic...

  20. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  1. A DRM Scheme Using File Physical Information

    Directory of Open Access Journals (Sweden)

    Cheng Qu

    2015-05-01

    Full Text Available A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM systems. In our scheme, compared to commonly used schemes, we remove the dependency on continuous online connection from the client-side to the server-side or the usage of tamper-proof hardware, such as Trusted Platform Module (TPM. The scheme is appropriate for offline digital content usage. Primary experiments demonstrate that our scheme is secure enough to be put into practice use.

  2. 智能电网——大规模风、光电并网瓶颈问题的解决方案%The smart grid─ the best of all scheme to solve the bottleneck problems of wind power and photoelectric power generation connected with power network on a large scale

    Institute of Scientific and Technical Information of China (English)

    徐娟; 孙大伟

    2012-01-01

    Aiming at the problems of the security and stability of power network caused by load undulation or power quality not good when wind power and photoelectric power generation connected with power network on a large scale.Through analyzing and comparing to find out: the smart grid with powerful capacity,facility and compatibility,con fit multiform power supply to connect with and contain it.The result of research shows that developing the smart grid maybe is the best of all scheme to solve the bottleneck problems of wind power and photoelectric power generation connected with power network on a large scale.%针对大规模风、光发电集中接入电网后产生的负荷波动性及电能质量较差,给电网带来的安全性和稳定性问题,通过分析对比发现,智能电网具有很好的智能性、灵活性和兼容性,不但成功地解决了上述问题还可以适应多种形式的电源接入并能将其成功消纳。研究表明:发展智能电网是解决大规模风、光发电并网瓶颈问题的最佳方案。

  3. Generalized Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The concept of generalized group signature scheme will bepresent. Based on the generalized secret sharing scheme proposed by Lin and Ha rn, a non-interactive approach is designed for realizing such generalized group signature scheme. Using the new scheme, the authorized subsets of the group in w hich the group member can cooperate to produce the valid signature for any messa ge can be randomly specified

  4. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  5. MIDI Programming in Scheme

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2010-01-01

    A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...

  6. MIDI Programming in Scheme

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2010-01-01

    A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...

  7. On codes, matroids and secure computation from linear secret sharing schemes

    NARCIS (Netherlands)

    Cramer, R.J.F.; Daza, V.; Gracia, J.L.; Jimenez Urroz, J.; Leander, G.; Marti-Farre, J.; Padro, C.

    2008-01-01

    Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special class of secret sharing schemes, namely, multiplicative linear secret sharing schemes (LSSSs), are studied. Such schemes ar

  8. Investigation of Asymetric Modes of Three-phase Three - legs Phase-shifting Transformer with “Inverse Double Zigzag” Scheme of Windings Connections and Commutation in Neutral Point

    Directory of Open Access Journals (Sweden)

    Bosneaga V.A

    2015-04-01

    Full Text Available The model for power three-phase three limbs phase-shifting transformer with “inverse double zig-zag connection” was investigated. Calculations and research of steady state asymmetric modes of transformer with such windings connection were fulfilled, taking into account the electromagnetic coupling of the windings, located on different legs. The analysis was made for the most specific steady state asymmetric modes, that occur during different short circuits and asymmetric no load regimes, associated with the appearance of zero sequence magnetic flux. Vector diagrams for windings currents and voltages were constructed, as well as for the relative values of magnetic fluxes in legs, which in ensemble give a clear idea about their particularities.

  9. A Scheme of Complying the Safe Standard for Axis of Motor in Air-Conditioner Outdoor Unit%空调室外电机轴的标准符合性研究

    Institute of Scientific and Technical Information of China (English)

    臧松彦; 马洁丹

    2014-01-01

    Aiming at the safety problem of grounding continuity of axis of the air-conditioner outdoor unit motor, this paper performs the analyses for the question, by means of the analysis of relevant safety standards for air conditioner and the judgment of the grounding reliability for ball bearing in CTL decision. Finally, it proposes a scheme that electromotor in air-conditioner uses ball-bearing to comply with its grounding reliability of standard, with the structure of air-conditioner and electromotor.%本文针对本文针对空调室外机轴接地连续性的安全问题展开分析通过剖析空调相关安全标中准针对空调器具对应条款的具体要求以及CTL决议针对电机球型轴承对可靠性接地的判定,结合空调外机结构、电机结构,提出空调电机轴采用球型轴承的方案,解决其接地的标准符合性。

  10. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...

  11. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  12. Convertible Proxy Signcryption Scheme

    Institute of Scientific and Technical Information of China (English)

    李继国; 李建中; 曹珍富; 张亦辰

    2004-01-01

    In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature.However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes.To protect the receiver' s benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which carn enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim' s scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.

  13. Perceptions of the Religion--Health Connection among African Americans in the Southeastern United States: Sex, Age, and Urban/Rural Differences

    Science.gov (United States)

    Holt, Cheryl L.; Schulz, Emily; Wynn, Theresa A.

    2009-01-01

    Extensive literature reviews suggest that religiousness is positively associated with health. Much less understood is the particular nature of the religion-health connection. Religion and the church play a central role in the lives of many African Americans. This study used a mixed-methods approach to examine perceptions of the religion-health…

  14. Semantic Units Based Event Detection in Soccer Videos

    Institute of Scientific and Technical Information of China (English)

    TONGXiao-Feng; LIUQing-Shan; LUHan-Qing; JINHong-Liang

    2005-01-01

    A semantic unit based event detection scheme in soccer videos is proposed in this paper.The scheme can be characterized as a three-layer framework. At the lowest layer, low-level features including color, texture, edge, shape, and motion are extracted. High-level semantic events are defined at the highest layer. In order to connect low-level features and high-level semantics, we design and define some semantic units at the intermediate layer. A semantic unit is composed of a sequence of consecutives frames with the same cue that is deduced from low-level features. Based on semantic units, a Bayesian network is used to reason the probabilities of events. The experiments for shoot and card event detection in soccer videos show that the proposed method has an encouraging performance.

  15. 可不停电拼拆柜的环网柜的研究开发%Research and Development of Ring Main Unit with Connecting and Separating Function without Power-Off

    Institute of Scientific and Technical Information of China (English)

    黄冬喜

    2014-01-01

    Increase main busbar’ extended port at the main busbar chamber of ring main unit. In a charged state without load, through pushing or leaving the connection cart of connecting switchgear,connect or separate the ring main unit without power-off,to reduce the probability of planned power cut,improve the reliability of power supply,guarantee the usage of people’s production and living power. It has great significance in the field of power supply and distribution.%在环网柜的主母线室上增加主母线连接扩展口,在带电不带负荷的情况下,通过拼柜连接小车的推进或移开,可不停电进行环网柜的拼拆柜操作,减少了计划性停电的机率,提高了供电可靠性,保证人们的生产、生活用电,在供配电领域具有重要意义。

  16. 萨拉齐电厂300 MW循环流化床锅炉机组耦合空气透平系统试验方案研究%Feasibility Study on Test Schemes for Coupling Air Turbine System of Salaqi 300 MW CFB Boiler Unit

    Institute of Scientific and Technical Information of China (English)

    王玉召; 李建锋

    2013-01-01

    To reduce the service power rate of thermal power unit via coupling air turbine system,3 test schemes were proposed for Salaqi 300 MW circulating fluidized bed (CFB) boiler unit,among which schemes 1 and 3 don't need to retrofit the air heater,but scheme 2 does.Based on the survey to performance parameters and price of relevant test facilities,the calculation of heat flux distribution in each scheme was carried out and a comparison was made among the schemes.Results show that by comprehensively considering the energy-saving effect,test cost and impact on normal operation of the unit,scheme 3 is regarded as the best option among all the 3 schemes,of which the energy-saving effect is better than scheme 1 due to its lower exhaust gas temperature,and its test risk is lower than scheme 2 since it is not necessary to retrofit the air heater.%为了验证火力发电机组耦合空气透平系统降低厂用电率的可行性,制定了萨拉齐电厂300MW循环流化床锅炉机组耦合空气透平系统的3个试验方案,其中方案1、方案3不需要改造锅炉空气预热器,而方案2则需要改造锅炉空气预热器.对试验所用设备性能参数及价格进行调研,并对试验方案的热流分布进行了计算和对比.结果表明:在综合考虑3个试验方案的节能效果、试验成本以及对机组正常运行所可能带来的影响后,确定方案3为最佳方案,其与方案1相比,由于排烟温度较低,所以节能效果较好,与方案2相比,由于不改动空气预热器,所以对锅炉部分的改动较小,试验的风险较小.

  17. Difference Schemes and Applications

    Science.gov (United States)

    2015-02-06

    of the shallow water equations that is well suited for complex geometries and moving boundaries. Another (similar) regularization of...the solid wall extrapolation followed by the interpolation in the phase space (by solving the Riemann problem between the internal cell averages and...scheme. This Godunov-type scheme enjoys all major advantages of Riemann -problem-solver-free, non-oscillatory central schemes and, at the same time, have

  18. Efficient Threshold Signature Scheme

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2012-01-01

    Full Text Available In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.

  19. Stateless Transitive Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    MA Chun-guang; CAI Man-chun; YANG Yi-xian

    2004-01-01

    A new practical method is introduced to transform the stateful transitive signature scheme to stateless one without the loss of security. According to the approach, two concrete stateless transitive signature schemes based on Factoring and RSA are presented respectively. Under the assumption of the hardness of factoring and one-more- RSA-inversion problem, both two schemes are secure under the adaptive chosen-message attacks in random oracle model.

  20. About Connections

    Directory of Open Access Journals (Sweden)

    Kathleen S Rockland

    2015-05-01

    Full Text Available Despite the attention attracted by connectomics, one can lose sight of the very real questions concerning What are connections? In the neuroimaging community, structural connectivity is ground truth and underlying constraint on functional or effective connectivity. It is referenced to underlying anatomy; but, as increasingly remarked, there is a large gap between the wealth of human brain mapping and the relatively scant data on actual anatomical connectivity. Moreover, connections have typically been discussed as pairwise, point x projecting to point y (or: to points y and z, or more recently, in graph theoretical terms, as nodes or regions and the interconnecting edges. This is a convenient shorthand, but tends not to capture the richness and nuance of basic anatomical properties as identified in the classic tradition of tracer studies. The present short review accordingly revisits connectional weights, heterogeneity, reciprocity, topography, and hierarchical organization, drawing on concrete examples. The emphasis is on presynaptic long-distance connections, motivated by the intention to probe current assumptions and promote discussions about further progress and synthesis.

  1. Gendered Connections

    DEFF Research Database (Denmark)

    Jensen, Steffen Bo

    2009-01-01

    This article explores the gendered nature of urban politics in Cape Town by focusing on a group of female, township politicians. Employing the Deleuzian concept of `wild connectivity', it argues that these politically entrepreneurial women were able to negotiate a highly volatile urban landscape...... space also drew on quite traditional notions of female respectability. Furthermore, the article argues, the form of wild connectivity to an extent was a function of the political transition, which destabilized formal structures of gendered authority. It remains a question whether this form...... of connectivity might endure, as Capetonian politics assumes a post-apartheid structure....

  2. HR Connect

    Data.gov (United States)

    US Agency for International Development — HR Connect is the USAID HR personnel system which allows HR professionals to process HR actions related to employee's personal and position information. This system...

  3. Reconfiguration of a smart surface using heteroclinic connections.

    Science.gov (United States)

    Zhang, Jiaying; McInnes, Colin R; Xu, Ming

    2017-01-01

    A reconfigurable smart surface with multiple equilibria is presented, modelled using discrete point masses and linear springs with geometric nonlinearity. An energy-efficient reconfiguration scheme is then investigated to connect equal-energy unstable (but actively controlled) equilibria. In principle, zero net energy input is required to transition the surface between these unstable states, compared to transitions between stable equilibria across a potential barrier. These transitions between equal-energy unstable states, therefore, form heteroclinic connections in the phase space of the problem. Moreover, the smart surface model developed can be considered as a unit module for a range of applications, including modules which can aggregate together to form larger distributed smart surface systems.

  4. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  5. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    Goutsias, J.; Heijmans, H.J.A.M.

    1998-01-01

    [PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis and synthes

  6. Modified Grid-Connected CSI for Hybrid PV/Wind Power Generation System

    Directory of Open Access Journals (Sweden)

    D. Amorndechaphon

    2012-01-01

    Full Text Available The principle of a power conditioning unit for hybrid PV/wind power generation system is proposed. The proposed power conditioner is based on the current source inverter (CSI topology. All energy sources are connected in parallel with a DC-bus through the modified wave-shaping circuits. To achieve the unity power factor at the utility grid, the DC-link current can be controlled via the wave-shaping circuits with the sinusoidal PWM scheme. In this work, the carrier-based PWM scheme is also proposed to minimize the utility current THD. The power rating of the proposed system can be increased by connecting more PV/wind modules through their wave-shaping circuits in parallel with the other modules. The details of the operating principles, the system configurations, and the design considerations are described. The effectiveness of the proposed CSI is demonstrated by simulation results.

  7. Effects of Early Adolescent Alcohol Use on Mid-Adolescent School Performance and Connection: A Longitudinal Study of Students in Victoria, Australia and Washington State, United States

    Science.gov (United States)

    Hemphill, Sheryl A.; Heerde, Jessica A.; Scholes-Balog, Kirsty E.; Herrenkohl, Todd I.; Toumbourou, John W.; Catalano, Richard F., Jr.

    2014-01-01

    Background: This article examines the effect of early adolescent alcohol use on mid-adolescent school suspension, truancy, commitment, and academic failure in Washington State, United States, and Victoria, Australia. Also of interest was whether associations remain after statistically controlling for other factors known to predict school outcomes.…

  8. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  9. A Fuzzy Commitment Scheme

    CERN Document Server

    Al-saggaf, Alawi A

    2008-01-01

    This paper attempt has been made to explain a fuzzy commitment scheme. In the conventional Commitment schemes, both committed string m and valid opening key are required to enable the sender to prove the commitment. However there could be many instances where the transmission involves noise or minor errors arising purely because of the factors over which neither the sender nor the receiver have any control. The fuzzy commitment scheme presented in this paper is to accept the opening key that is close to the original one in suitable distance metric, but not necessarily identical. The concept itself is illustrated with the help of simple situation.

  10. Connected Traveler

    Energy Technology Data Exchange (ETDEWEB)

    2016-06-01

    The Connected Traveler framework seeks to boost the energy efficiency of personal travel and the overall transportation system by maximizing the accuracy of predicted traveler behavior in response to real-time feedback and incentives. It is anticipated that this approach will establish a feedback loop that 'learns' traveler preferences and customizes incentives to meet or exceed energy efficiency targets by empowering individual travelers with information needed to make energy-efficient choices and reducing the complexity required to validate transportation system energy savings. This handout provides an overview of NREL's Connected Traveler project, including graphics, milestones, and contact information.

  11. Additive Difference Schemes for Filtration Problems in Multilayer Systems

    CERN Document Server

    Ayrjan, E A; Pavlush, M; Fedorov, A V

    2000-01-01

    In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.

  12. Flocking of Second-Order Multiagent Systems With Connectivity Preservation Based on Algebraic Connectivity Estimation.

    Science.gov (United States)

    Fang, Hao; Wei, Yue; Chen, Jie; Xin, Bin

    2017-04-01

    The problem of flocking of second-order multiagent systems with connectivity preservation is investigated in this paper. First, for estimating the algebraic connectivity as well as the corresponding eigenvector, a new decentralized inverse power iteration scheme is formulated. Then, based on the estimation of the algebraic connectivity, a set of distributed gradient-based flocking control protocols is built with a new class of generalized hybrid potential fields which could guarantee collision avoidance, desired distance stabilization, and the connectivity of the underlying communication network simultaneously. What is important is that the proposed control scheme allows the existing edges to be broken without violation of connectivity constraints, and thus yields more flexibility of motions and reduces the communication cost for the multiagent system. In the end, nontrivial comparative simulations and experimental results are performed to demonstrate the effectiveness of the theoretical results and highlight the advantages of the proposed estimation scheme and control algorithm.

  13. A Possible Connection between the 1878 Yellow Fever Epidemic in the Southern United States and the 1877-78 El Niño Episode.

    Science.gov (United States)

    Diaz, Henry F.; McCabe, Gregory J.

    1999-01-01

    One of the most severe outbreaks of yellow fever, a viral disease transmitted by the Aedes aegypti mosquito, affected the southern United States in the summer of 1878. The economic and human toll was enormous, and the city of Memphis, Tennessee, was one of the most affected. The authors suggest that as a consequence of one of the strongest El Niño episodes on record-that which occurred in 1877-78-exceptional climate anomalies occurred in the United States (as well as in many other parts of the world), which may have been partly responsible for the widespread nature and severity of the 1878 yellow fever outbreak.This study documents some of the extreme climate anomalies that were recorded in 1877 and 1878 in parts of the eastern United States, with particular emphasis on highlighting the evolution of these anomalies, as they might have contributed to the epidemic. Other years with major outbreaks of yellow fever in the eighteenth and nineteenth centuries also occurred during the course of El Niño episodes, a fact that appears not to have been noted before in the literature.

  14. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  15. Places Connected:

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    individuals throughout the world. Development assistance , where there are two or three links only between a Bangladeshi farmer, a street child in Sao Paolo and the President of the United States, the Queen of Denmark, or a suburban house wife in Japan, who has never left the Osaka area, but mothered a United...

  16. Order-theoretical connectivity

    Directory of Open Access Journals (Sweden)

    T. A. Richmond

    1990-01-01

    Full Text Available Order-theoretically connected posets are introduced and applied to create the notion of T-connectivity in ordered topological spaces. As special cases T-connectivity contains classical connectivity, order-connectivity, and link-connectivity.

  17. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...... of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...

  18. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  19. Getting Connected

    Science.gov (United States)

    Larkin, Patrick

    2011-01-01

    That the world outside schools is changing faster than ever is old news. Unfortunately, that the world "inside" schools is changing at a glacial pace is even older news. As school leaders, principals have an important choice to make as they move into the second decade of the 21st century. School leaders have a moral obligation to connect and…

  20. Connecting dots

    DEFF Research Database (Denmark)

    Murakami, Kyoko; Jacobs, Rachel L.

    2017-01-01

    of connecting the dots of recalled moments of individual family members lives and is geared towards building a family’s shared future for posterity. Lastly, we consider a wider implication of family reminiscence in terms of human development. http://www.infoagepub.com/products/Memory-Practices-and-Learning...

  1. Learning Connections

    Science.gov (United States)

    Royer, Regina D.; Richards, Patricia O.

    2005-01-01

    In this edition of Learning Connections, the authors show how technology can enhance study of weather patterns, reading comprehension, real-world training, critical thinking, health education, and art criticism. The following sections are included: (1) Social Studies; (2) Language Arts; (3) Computer Science and ICT; (4) Art; and (5) Health.…

  2. Integrated Protection Scheme for Power Line

    Institute of Scientific and Technical Information of China (English)

    BO Zhiqian; SHI Shenxing; DONG Xinzhou

    2008-01-01

    This paper presents an integrated relay and its associated protection scheme for power transmission lines. The concept of integrated protection is firstly introduced, in which a centralized protection system or relay provides the protection for multiple power plants or a substation. A novel integrated protection relay based on the combination of a number of protection principles is de- scribed. In the proposed scheme, the specially designed protection relays are installed at each substation of a network and are responsible for the protection of every line section connected to the substation busbar.The combined algorithms with multiple settings are implemented into the relay to cover all the protected line sections.Simulation studies show that the proposed protection scheme is able to produce desirable performance and may offer many advantages over the exist- ing one and great potential for future applications.

  3. XTR-Kurosawa-Desmedt Scheme

    Institute of Scientific and Technical Information of China (English)

    DING XIU-HUAN; FU ZHI-GUO; ZHANG SHU-GONG

    2009-01-01

    This paper proposes an XTR version of the Kurosawa-Desmedt scheme. Our scheme is secure against adaptive choeen-ciphertext attack under the XTR version of the Decisional Diffie-Hellman assumption in the standard model. Comparing efficiency between the Kurosawa-Desmedt scheme and the proposed XTR-Kurosawa-Desmedt scheme, we find that the proposed scheme is more efficient than the Kurosawa-Desmedt scheme both in communication and computation without compromising security.

  4. Towards an improved land surface scheme for prairie landscapes

    Science.gov (United States)

    Mekonnen, M. A.; Wheater, H. S.; Ireson, A. M.; Spence, C.; Davison, B.; Pietroniro, A.

    2014-04-01

    The prairie region of Canada and the United States is characterized by millions of small depressions of glacial origin called prairie potholes. The transfer of surface runoff in this landscape is mainly through a “fill and spill” mechanism among neighboring potholes. While non-contributing areas, that is small internally drained basins, are common on this landscape, during wet periods these areas can become hydrologically connected to larger regional drainage systems. Accurate prediction of prairie surface runoff generation and streamflow thus requires realistic representation of the dynamic threshold-mediated nature of these contributing areas. This paper presents a new prairie surface runoff generation algorithm for land surface schemes and large scale hydrological models that conceptualizes a hydrologic unit as a combination of variable and interacting storage elements. The proposed surface runoff generation algorithm uses a probability density function to represent the spatial variation of pothole storages and assumes a unique relationship between storage and the fractional contributing area for runoff (and hence amount of direct runoff generated) within a grid cell. In this paper the parameters that define this relationship are obtained by calibration against streamflow. The model was compared to an existing hydrology-land surface scheme (HLSS) applied to a typical Canadian prairie catchment, the Assiniboine River. The existing configuration is based on the Canadian Land Surface Scheme (CLASS) and WATROF (a physically-based overland and interflow scheme). The new configuration consists of CLASS coupled with the new PDMROF model. Results showed that the proposed surface runoff generation algorithm performed better at simulating streamflow, and appears to capture the dynamic nature of contributing areas in an effective and parsimonious manner. A pilot evaluation based on 1 m LiDAR data from a small (10 km2) experimental area suggests that the shape of the

  5. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme...... considers the generation costs of DGs and dynamically tunes their droop gradients to produce more power from less costly DGs and vice versa. The proposed scheme is fully autonomous, simple to implement in dispatchable and non-dispatchable sources coupled with storage, support islanded and grid......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions....

  6. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not. In the ......It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  7. Comparative evaluation of remote maintenance schemes for fusion DEMO reactor

    Energy Technology Data Exchange (ETDEWEB)

    Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto

    2015-10-15

    Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.

  8. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  9. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  10. The evolution of the School Food and Farm to School Movement in the United States: connecting childhood health, farms, and communities.

    Science.gov (United States)

    Feenstra, Gail; Ohmart, Jeri

    2012-08-01

    This article provides an historical review of the evolution of the Farm to School movement within the larger context of school food in the United States. The Farm to School movement emerged amidst the growing public concern about childhood health and obesity, as well as increasing awareness about environmental and economic challenges in our food and agricultural system. It offered America’s small and midsized farmers an alternative market while potentially improving student health and public awareness of healthy eating. We discuss the role of key stakeholders in contributing to innovative strategies, programs, and policies related to School Food and Farm to School. The growing involvement of larger school districts has helped focus attention and efforts on the persistent challenges related to procurement and distribution. As the Farm to School movement has matured and moved onto the national arena, policy, research, and evaluation have helped define and shape new directions. Finally, we reflect on what it will take to strengthen Farm to School so that it can better contribute to human and community health.

  11. Labeling Schemes with Queries

    OpenAIRE

    2006-01-01

    We study the question of ``how robust are the known lower bounds of labeling schemes when one increases the number of consulted labels''. Let $f$ be a function on pairs of vertices. An $f$-labeling scheme for a family of graphs $\\cF$ labels the vertices of all graphs in $\\cF$ such that for every graph $G\\in\\cF$ and every two vertices $u,v\\in G$, the value $f(u,v)$ can be inferred by merely inspecting the labels of $u$ and $v$. This paper introduces a natural generalization: the notion of $f$-...

  12. Water Treatment Technology - Cross-Connections.

    Science.gov (United States)

    Ross-Harrington, Melinda; Kincaid, G. David

    One of twelve water treatment technology units, this student manual on cross connections provides instructional materials for two competencies. (The twelve units are designed for a continuing education training course for public water supply operators.) The competencies focus on cross connections terminology and control devices. For each…

  13. Making Connections.

    Science.gov (United States)

    Hornung, Gertrude S.

    1987-01-01

    Discusses the role of education in a museum setting. Reviews the direction of thinking in museum education and the history of the museum movement in the United States. Highlights the preparation of viewers, the professional status of museum educators, and marketing museum programs as some problems in museum education. (CW)

  14. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  15. Control Scheme for Distributed Generator Providing Network Voltage Support

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The distributed generator over the last 30 years has posed several challenges when they are connected to a distributed network. The most immediate problem is to change the voltage at the connection point depending on the power supplied to the network and may cause it to exceed statutory limits. This paper describes a new control scheme for a distributed generator for supporting the voltage control in the network, thus ensuring the distributed generator to contribute to network voltage management. The scheme performance is demonstrated by a model for a distributed generator connected to a distribution network. The result shows that using the new control scheme, the distribution network voltage constraints are maintained while maximizing the active power delivered by distributed generators.

  16. A Class of Key Predistribution Schemes Based on Orthogonal Arrays

    Institute of Scientific and Technical Information of China (English)

    Jun-Wu Dong; Ding-Yi Pei; Xue-Li Wang

    2008-01-01

    Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes.

  17. Adaptive Voltage Stability Protection Based on Load Identification Using Phasor Measurement Units

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2011-01-01

    collapse. In this paper, the online load identification using measurement-based approach based on Phasor Measurement Units (PMU) was proposed to evaluate the proximity to voltage instability in order to prevent voltage collapse. In the scenarios of disturbances, the proximity to voltage collapse...... with respect to load characteristics was evaluated. Based on different load characteristics, different control and protection schemes were implemented, i.e. shunt capacitor connection, on-load tap changer blocking and load shedding. The results showed that load-based adaptive voltage control and protection...... scheme based on PMUs is promising, as it prevented the voltage collapse and minimized the load shedding area....

  18. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  19. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  20. Connectivity-Based Watermarking Robust to Geometrical Attacks

    Institute of Scientific and Technical Information of China (English)

    Wang Hongxia; Luo Jian

    2006-01-01

    A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions.

  1. Cluster-based Multihop Synchronization Scheme for Femtocell Network

    Directory of Open Access Journals (Sweden)

    Aisha H. Abdalla

    2012-10-01

    Full Text Available ABSTRACT: Femtocell technology has been drawing considerable attention as a cost-effective means of improving cellular coverage and capacity. It is connected to the core network through an IP backhaul and can only use timing protocols such as IEEE1588 or Network Time Protocol (NTP. Furthermore, the femtocell is installed indoor, and cannot use a GPS antenna for time synchronization.  High-precision crystal oscillators can solve the timing problem, but they are often too expensive for consumer grade devices. Therefore, femtocell Base Station (fBS synchronization is one of the principle technical trends in femtocell deployment. Since fBSand macrocell Base Station (mBS network operates on the same frequency under a licensed spectrum, fBS network can interfere with the macrocell network. In addition, fBSs can also interfere with each other if multiple units are in close proximity. Furthermore, in a flat fBS structured network using IEEE 1588 synchronization algorithm and fBS-fBS synchronization scheme creates offset and frequency error which results inaccurate synchronization. In order to reduce offset and frequency error (skew, this paper proposed a cluster-based multihop synchronization scheme to achieve precise in fBS neighbor nodes. The proposed scheme is able to reduce the offset and skew significantly.ABSTRAK: Teknologi Femtocell telah menjadi tumpuan sebagai alat yang kos-efektif dalam memperbaiki liputan mudahalih dan kapasiti. Ia menghubungkan jaringan teras melalui IP backhaul dan hanya boleh menggunakan protokol masa seperti IEEE1588 atau Protokol Jaringan Masa (NTP. Seterusnya, femtocell dipasang di dalam, dan tidak boleh menggunakan antena GPS untuk sinkronisasi masa. Osilator Kristal yang tinggi kejituannya boleh menyelesaikan masalah masa, tetapi ianya mahal bagi gred peranti consumer. Oleh itu, sinkronisasi Stesen Asas femtocell (fBS adalah salah satu tren teknikal prinsip dalam deployment femtocell. Memandangkan fBS dan jaringan

  2. Design of Power Generating Unit in 30 MW Peak Value Grid-connected Photovoltaic Power Plant%峰值30MW并网光伏电站发电单元设计

    Institute of Scientific and Technical Information of China (English)

    智腾飞; 王金梅; 台流臣; 朱菊; 肖龙

    2012-01-01

    A power generating unit design including the choices of photovoltaic(PV) module and inverter based on the technical parameters of 30 MW peak value grid-connected PV power plant was proposed. Statistics analysis was conducted on solar radiation data of chosing engineering area in the typical year with the assistance of RETScreen, Based on the above analysis, the curve chart was done, which can be concluded that the average daily solar radiation get most in a year when the tilt angle of PV modules is 36? Designed the technical parameters of the LCL filter. The output current and its harmonics through LCL filter were simulated via Mat-lab/Simulink. The result indicates that current waveform has been significantly improved due to the above experiment. Moreover, the harmonics content fulfill the index requirements for current harmonic technique of grid-connected system.%针对峰值30 MW并网光伏电站的技术参数要求,提出发电单元设计方案,包括太阳能电池组件与逆变器选型等,并利用RETScreen软件对所选工程代表年的太阳辐射资料进行数据分析,做出曲线图,得到结论:当太阳能电池组件的倾角为36°时,全年日平均太阳总辐射量最大.设计了LCL滤波器的参数,通过Matlab/Simulink对滤波器输出电流进行仿真并检测谐波含量,电流波形改善明显,输出电流谐波含量符合并网发电系统入网电流的谐波技术指标要求.

  3. Harmonizing influenza primary-care surveillance in the United Kingdom: piloting two methods to assess the timing and intensity of the seasonal epidemic across several general practice-based surveillance schemes.

    Science.gov (United States)

    Green, H K; Charlett, A; Moran-Gilad, J; Fleming, D; Durnall, H; Thomas, D Rh; Cottrell, S; Smyth, B; Kearns, C; Reynolds, A J; Smith, G E; Elliot, A J; Ellis, J; Zambon, M; Watson, J M; McMenamin, J; Pebody, R G

    2015-01-01

    General Practitioner consultation rates for influenza-like illness (ILI) are monitored through several geographically distinct schemes in the UK, providing early warning to government and health services of community circulation and intensity of activity each winter. Following on from the 2009 pandemic, there has been a harmonization initiative to allow comparison across the distinct existing surveillance schemes each season. The moving epidemic method (MEM), proposed by the European Centre for Disease Prevention and Control for standardizing reporting of ILI rates, was piloted in 2011/12 and 2012/13 along with the previously proposed UK method of empirical percentiles. The MEM resulted in thresholds that were lower than traditional thresholds but more appropriate as indicators of the start of influenza virus circulation. The intensity of the influenza season assessed with the MEM was similar to that reported through the percentile approach. The MEM pre-epidemic threshold has now been adopted for reporting by each country of the UK. Further work will continue to assess intensity of activity and apply standardized methods to other influenza-related data sources.

  4. A New Deferred Sentencing Scheme

    Directory of Open Access Journals (Sweden)

    N. K. Chakravarti

    1968-10-01

    Full Text Available A new deferred sentencing scheme resembling double sampling scheme has been suggested from viewpoint of operational and administrative. It is recommended particularly when the inspection is destructive. The O.C. curves of the scheme for two sample sizes of 5 and 10 have been given.

  5. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  6. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  7. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  8. Two Improved Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In this paper, two improved digital signature schemes are presented based on the design of directed signaturescheme [3]. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated.Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security ofdigital signature system are increased.

  9. CONSIDERATIONS CONCERNING GUARANTEE SCHEMES

    Directory of Open Access Journals (Sweden)

    EMILIA CLIPICI

    2013-05-01

    Full Text Available When a large withdrawal from banks occurs, customers withdraw their deposits, so banks are likely to go bankrupt because of liquidity problems. There are several mechanisms that allow the banking system to avoid the phenomenon of massive withdrawals from banks. The most effective one is the deposit insurance. The deposit insurance is seen primarily as a means of protecting depositors of credit institutions, and secondly as a means of ensuring the stability of the banking system. This article described deposit guarantee scheme in Romania and other country.

  10. 催化重整装置提高安稳运行方案探讨%Discussion on improving safe and stable operation scheme of catalytic reforming Unit

    Institute of Scientific and Technical Information of China (English)

    贾振柱

    2015-01-01

    A catalytic reforming unit has been running for 50 years,the aging phenomenon of some equipment in this unit was severe. Many problems exited during equipment management,maintenance and operation. In this paper,problems existed in operation was analyzed,strategy and method for solving equipment problem were put forward,which ensured safe and stable operation of equipment in the Unit.%某催化重整装置已经运行了50 a,装置中的部分设备老化现象严重。在设备管理、维护、运行过程中出现了诸多问题,文中提出了解决设备问题的策略及方法,确保了装置设备安稳运行。

  11. A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Nai-Wei Lo

    2014-01-01

    Full Text Available As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organizations. Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. In 2010, Lin et al. had proposed an efficient signcryption scheme using bilinear pairings. However, we found that the proxy signcryption scheme of Lin et al. is vulnerable to the chosen warrant attack. A provably secure proxy signcryption scheme using bilinear pairings is introduced accordingly. In terms of performance efficiency, the proposed scheme is superior to other existing schemes. In addition, a new security model is proposed to describe proxy signcryption scheme; based on the security model we show that the proposed scheme is provably secure in terms of indistinguishability under adaptive chosen ciphertext attack (IND-CCA2, unforgeability under adaptive chosen message attack (EF-CMA, and unforgeability under adaptive chosen warrant attack (EF-CWA.

  12. Secure mediated certificateless signature scheme

    Institute of Scientific and Technical Information of China (English)

    YANG Chen; MA Wen-ping; WANG Xin-mei

    2007-01-01

    Ju et al proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.

  13. Connectivity of communication networks

    CERN Document Server

    Mao, Guoqiang

    2017-01-01

    This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.

  14. Quantitative Analysis and Comparisons of EPON Protection Schemes

    Institute of Scientific and Technical Information of China (English)

    CHENHong; JINDepeng; ZENGLieguang; SULi

    2005-01-01

    This paper presents the relationship between the intensity of network damage and the network survivability. Then a method for quantitatively analyzing the survivability of tree network is studied. Based on the analysis, the survivability of Ethernet passive optical network (EPON) with three kinds of protection schemes (i.e., Trunk-fiber protection scheme, Node-fiber protection scheme, and Bus-fiber protection) is discussed. Following this, the comparisons of the survivability among these three kinds of protection schemes of F.PON are put forward. The simulation results show that, when the coverage area is the same, the survivability of EPON with Node-fiber protection scheme is better than that of EPON with Trunk-fiber protection scheme, and when the number and distribution of Optical network unit (ONU) are the same, the survivability of EPON with Bus-fiber protection scheme is better than that of EPON with Nodefiber protection scheme. Under the same constraints, the needed fiber of EPON with Bus-fiber protection scheme is the least when there are more than 12 ONU nodes. These results are useful not only for forecasting and evaluating the survivability of EPON access network, but also for its topology design.

  15. Unitals in Projective Planes

    CERN Document Server

    Barwick, Susan

    2008-01-01

    Unitals are key structures in projective planes, and have connections with other structures in algebra. This book presents a monograph on unitals embedded in finite projective planes. It offers a survey of the research literature on embedded unitals. It is suitable for graduate students and researchers who want to learn about this topic

  16. Pretzel scheme for CEPC

    Science.gov (United States)

    Geng, Huiping

    2016-11-01

    CEPC was proposed as an electron and positron collider ring with a circumference of 50-100 km to study the Higgs boson. Since the proposal was made, the lattice design for CEPC has been carried out and a preliminary conceptual design report has been written at the end of 2014. In this paper, we will describe the principles of pretzel scheme design, which is one of most important issues in CEPC lattice design. Then, we will show the modification of the lattice based on the lattice design shown in the Pre-CDR. The latest pretzel orbit design result will also be shown. The issues remained to be solved in the present design will be discussed and a brief summary will be given at the end.

  17. Connection Strings Property on ADO Connection Object

    Institute of Scientific and Technical Information of China (English)

    Girigi Deogratias; Wu Min; Cao Weihua

    2002-01-01

    The connection string property on ADO connection object contains the information used to establish a connection to the data source. The syntax, the keyword of that information must be in specific format. Depending on the type of data you are connecting to, you need either specify an OLEDB provider or use on ODBC driver. The biggest problem, the industries face is the proliferation of data access interfaces, and the complexity of creating,maintaining and programming against them, and the network problem when communicating over the Intranet or the Internet. This paper first provides an in-depth look of the standard arguments supported by ADO connection string; then gives the easier way for understanding the meaning, the utility and the syntax of the connection strings property on ADO connection object, and finally proposes solution to work around the problems due to the connection strings errors.

  18. A method for connecting electrodes in a storage battery

    Energy Technology Data Exchange (ETDEWEB)

    Toda, K.; Karasava, S.

    1983-07-14

    The electrode units, placed into the body of a storage battery (AB), are electrically connected by welding connecting elements which pass through the partitions in the body. The processing is conducted with heating and pressure simultaneously.

  19. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    In the present paper we consider the allocation of cost in connection networks. Agents have connection demands in form of pairs of locations they want to be connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection demands...

  20. An Energy-Work Relationship Integration Scheme for Nonconservative Hamiltonian Systems

    Directory of Open Access Journals (Sweden)

    Fu Jingli

    2008-01-01

    Full Text Available This letter focuses on studying a new energy-work relationship numerical integration scheme of nonconservative Hamiltonian systems. The signal-stage, multistage, and parallel composition numerical integration schemes are presented for this system. The high-order energy-work relation scheme of the system is constructed by a parallel connection of n multistage scheme of order 2 which its order of accuracy is 2n. The connection, which is discrete analog of usual case, between the change of energy and work of nonconservative force is obtained for nonconservative Hamiltonian systems.This letter also shows that the more the stages of the schemes are, the less the error rate of the scheme is for nonconservative Hamiltonian systems. Finally, an applied example is discussed to illustrate these results.

  1. Attribute-space connectivity and connected filters

    NARCIS (Netherlands)

    Wilkinson, Michael H.F.

    2007-01-01

    In this paper connected operators from mathematical morphology are extended to a wider class of operators, which are based on connectivities in higher dimensional spaces, similar to scale spaces, which will be called attribute-spaces. Though some properties of connected filters are lost, granulometr

  2. Unified Framework Towards Flexible Multiple Access Schemes for 5G

    Institute of Scientific and Technical Information of China (English)

    SUN Qi; WANG Sen; HAN Shuangfeng; Chih Lin I

    2016-01-01

    Non⁃orthogonal multiple access (NOMA) schemes have achieved great attention recently and been considered as a crucial compo⁃nent for 5G wireless networks since they can efficiently enhance the spectrum efficiency, support massive connections and poten⁃tially reduce access latency via grant free access. In this paper, we introduce the candidate NOMA solutions in 5G networks, com⁃paring the principles, key features, application scenarios, transmitters and receivers, etc. In addition, a unified framework of these multiple access schemes are proposed to improve resource utilization, reduce the cost and support the flexible adaptation of multi⁃ple access schemes. Further, flexible multiple access schemes in 5G systems are discussed. They can support diverse deployment scenarios and traffic requirements in 5G. Challenges and future research directions are also highlighted to shed some lights for the standardization in 5G.

  3. Relationship of Occlusal Schemes with the Occurrence of Temporomandibular Disorders

    OpenAIRE

    Dina H. Sugiaman; Laura S. Himawan; Sitti Fardaniah

    2013-01-01

    Masticatory system is a complex functional unit of the body responsible for mastication, speech, and deglutition process. Temporomandibular disorders (TMD) is used to describe all functional disturbances of the masticatory system. The etiology of TMD is multifactorial, such as occlusal disharmony and emotional stress. The relationship between occlusion and TMD has been highly debated in dentistry, one of the occlusal factors is the occlusal scheme. Occlusal schemes are defined as bilateral ca...

  4. Assembly design system based on engineering connection

    Science.gov (United States)

    Yin, Wensheng

    2016-12-01

    An assembly design system is an important part of computer-aided design systems, which are important tools for realizing product concept design. The traditional assembly design system does not record the connection information of production on the engineering layer; consequently, the upstream design idea cannot be fully used in the downstream design. An assembly design model based on the relationship of engineering connection is presented. In this model, all nodes are divided into two categories: The component and the connection. Moreover, the product is constructed on the basis of the connection relationship of the components. The model is an And/Or graph and has the ability to record all assembly schemes. This model records only the connection information that has engineering application value in the product design. In addition, this model can significantly reduce the number of combinations, and is very favorable for the assembly sequence planning in the downstream. The system contains a connection knowledge system that can be mapped to the connection node, and the connection knowledge obtained in practice can be returned to the knowledge system. Finally, VC++ 6.0 is used to develop a prototype system called Connect-based Assembly Planning (CAP). The relationship between the CAP system and the commercial assembly design system is also established.

  5. Undifferentiated Connective Tissue Disease

    Science.gov (United States)

    ... Home Conditions Undifferentiated Connective Tissue Disease (UCTD) Undifferentiated Connective Tissue Disease (UCTD) Make an Appointment Find a Doctor ... L. Goldstein, MD, MMSc (February 01, 2016) Undifferentiated connective tissue disease (UCTD) is a systemic autoimmune disease. This ...

  6. Connective Tissue Disorders

    Science.gov (United States)

    Connective tissue is the material inside your body that supports many of its parts. It is the "cellular ... their work. Cartilage and fat are examples of connective tissue. There are over 200 disorders that impact connective ...

  7. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  8. Improved Ternary Subdivision Interpolation Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Huawei; QIN Kaihuai

    2005-01-01

    An improved ternary subdivision interpolation scheme was developed for computer graphics applications that can manipulate open control polygons unlike the previous ternary scheme, with the resulting curve proved to be still C2-continuous. Parameterizations of the limit curve near the two endpoints are given with expressions for the boundary derivatives. The split joint problem is handled with the interpolating ternary subdivision scheme. The improved scheme can be used for modeling interpolation curves in computer aided geometric design systems, and provides a method for joining two limit curves of interpolating ternary subdivisions.

  9. Formal Verification of NTRUEncrypt Scheme

    Directory of Open Access Journals (Sweden)

    Gholam Reza Moghissi

    2016-04-01

    Full Text Available In this paper we explore a mechanized verification of the NTRUEncrypt scheme, with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm, in its reduced form, is formally verified with computer support. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic encryption scheme. Besides, we present a convenient and application specific formalization of the NTRUEncrypt scheme in the Isabelle/HOL system that can be used in further study around the functional and security analysis of NTRUEncrypt family.

  10. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    . We use three axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well as all...... connection costs; and, (3) the central planner selects a cost minimizing network satisfying reported connection demands based on estimated connection costs and allocates true connection costs of the selected network....

  11. AUTISTIC CHILDREN PROTECTION SCHEME

    Directory of Open Access Journals (Sweden)

    Dragan LUKIC

    1998-09-01

    Full Text Available The present article sets forth the theoretical grounds which make the basis for the organizational scheme of the autistic persons social protection. This protection consists of the below listed forms of work:· Health service with the role of an early detection and participation in the creation of rehabilitation programs;· Social protection with its programs of work from the diagnostics where the defectologist makes a team together with the physician and the psychologists to the systems of rehabilitation institutions where the defectologist’s is the main responsibility.The present article underlines two facts, namely:· that an autistic person requires to be followed and every spare moment used to promote and advance the activities the doer commenced himself instead of having him carry out the programs which are beyond his internal motivations and which he finds emotionally inaccessible;· that and form of work organization with autistic persons must subordinate its administrative part to the basic professional requirements this kind of disorder (handicap sets in front of each professional.

  12. Scheme of Testing Unit for Earth-Point Searching Device in Small-Current Electric Power System%“小电流接地选检装置”的试验装置的设想

    Institute of Scientific and Technical Information of China (English)

    董建民

    2000-01-01

    In the light of elctric power system model,this paper introduces a set of simple available testing unit for searching earthpoint in small-current electric opwwer system and check its operating reliability and accuracy,gives out a basic viewpoint for choosing a a set of earth-point searching device.%从模拟电力系统的角度出发,提出建立一套简单易行的小电流接地选线装置的测试装置,以对选线装置动作的准确性进行校验,为选线装置的选型奠定基础

  13. Chaotic communication scheme with multiplication

    Science.gov (United States)

    Bobreshov, A. M.; Karavaev, A. A.

    2007-05-01

    A new scheme of data transmission with nonlinear admixing is described, in which the two mutually inverse operations (multiplication and division) ensure multiplicative mixing of the informative and chaotic signals that provides a potentially higher degree of security. A special feature of the proposed scheme is the absence of limitations (related to the division by zero) imposed on the types of informative signals.

  14. Homographic scheme for Riccati equation

    CERN Document Server

    Dubois, François

    2011-01-01

    In this paper we present a numerical scheme for the resolution of matrix Riccati equation, usualy used in control problems. The scheme is unconditionnaly stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.

  15. Differential operators and automorphism schemes

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The ring of global differential operators of a variety is in closed and deep relation with its automorphism scheme.This relation can be applied to the study of homogeneous schemes,giving some criteria of homogeneity,a generalization of Serre-Lang theorem,and some consequences about abelian varieties.

  16. Toeplitz operators on connected domains

    Institute of Scientific and Technical Information of China (English)

    CAO; Guangfu

    2006-01-01

    The proof of the index formula of the Toeplitz operator with a continuous symbol on the Hardy space for the unit circle in the complex plane depends on the Hopftheorem. However,the analogue result of the Hopf theorem does not hold on a general connected domain. Hence,the extension of the index formula of the Toeplitz operator on a general domain needs a method which is different from that for the case of the unit circle. In the present paper, the index formula of the Toeplitz operator with a continuous symbol on the finite complex connected domain in the complex plane is obtained, and the cohomology groups of Toeplitz algebras on general domains are discussed. In addition, the Toeplitz operators with symbols in QC are also discussed.

  17. The Occupational Pension Schemes Survey 2006

    OpenAIRE

    Sarah Levy; David Miller

    2008-01-01

    Presents findings on the number of schemes, their membership and contributions to schemes by employers and employeesThis article presents findings on the number of occupational pension schemes in 2006, their membership and contributions to schemes by employers and employees. It is based on the Occupational Pension Schemes Annual Report (2006 edition). The findings distinguish between public and private sector schemes and include breakdowns by scheme status (open, closed, frozen or winding up)...

  18. Semantic Units Based Event Detection in Soccer Videos%基于语义单元的足球视频事件检测

    Institute of Scientific and Technical Information of China (English)

    童晓峰; 刘青山; 卢汉清; 金洪亮

    2005-01-01

    A semantic unit based event detection scheme in soccer videos is proposed in this paper.The scheme can be characterized as a three-layer framework. At the lowest layer, low-level features including color, texture, edge, shape, and motion are extracted. High-level semantic events are defined at the highest layer. In order to connect low-level features and high-level semantics, we design and define some semantic units at the intermediate layer. A semantic unit is composed of a sequence of consecutives frames with the same cue that is deduced from low-level features. Based on semantic units, a Bayesian network is used to reason the probabilities of events. The experiments for shoot and card event detection in soccer videos show that the proposed method has an encouraging performance.

  19. Computer tool of the local and remote acquisition of data and the evaluation of grid-connected photovoltaic systems for Control Units of the family Sunny Boy; Programa de monitorizacion remota de instalaciones fotovoltaicas conectadas a red: desarrollo de una plicacion informatica para el control de los sistemas de adquisicion de datos suny data control y suny data control plus

    Energy Technology Data Exchange (ETDEWEB)

    Sidrach-de-Cardona, M.; Carretero, J.; Roman, F.; Garcia, J. D.; Mora-Lopez, L.; Garcia Caballero, J. C.

    2004-07-01

    We present a computer tool that allows the local and remote acquisition of data and the evaluation of grid-connected photovoltaic systems that have inverters and Control Units of the family Sunny Boy. The system is developed in Delphi. This application represents a new point of view in the systems of data acquisition and supposes a substantial improvement regarding the existent ones. It allows the control of the photovoltaic facilities reducing the time of evaluation of the data. (Author)

  20. Schemes for Deterministic Polynomial Factoring

    CERN Document Server

    Ivanyos, Gábor; Saxena, Nitin

    2008-01-01

    In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects we call m-schemes. We extend the known conditional deterministic subexponential time polynomial factoring algorithm for finite fields to get an underlying m-scheme. We demonstrate how the properties of m-schemes relate to improvements in the deterministic complexity of factoring polynomials over finite fields assuming the generalized Riemann Hypothesis (GRH). In particular, we give the first deterministic polynomial time algorithm (assuming GRH) to find a nontrivial factor of a polynomial of prime degree n where (n-1) is a smooth number.

  1. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  2. The Existence Condition of γ-Acyclic Database Schemes with MVDs Constraints

    Institute of Scientific and Technical Information of China (English)

    郝忠孝; 姚春龙

    2002-01-01

    It is very important to use database technology for a large-scale system such as ERP and MIS. A good database design may improve the performance of the system. Some researches show that a γ-acyclic database scheme has many good properties, e.g., each connected join expression is monotonous, which helps to improve query performance of the database system. Thus what conditions are needed to generate a γ-acyclic database scheme for a given relational scheme? In this paper, the sufficient and necessary condition of the existence of γ-acyclic, join-lossless and dependencies-preserved database schemes meeting 4NF is given.

  3. Provable Secure Identity Based Generalized Signcryption Scheme

    CERN Document Server

    Yu, Gang; Shen, Yong; Han, Wenbao

    2010-01-01

    According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes.

  4. A Novel Classification of Concentration Units.

    Science.gov (United States)

    MacCarthy, Patrick

    1983-01-01

    Presents a classification scheme that organizes concentration units (such as molarity) into four logical classes. These classes clearly illustrate relationships and differences between the various units. The scheme is operationally simple to apply and removes the apparent arbitrariness of definitions as normally presented. (Author/JN)

  5. Automatic Virtual Entity Simulation of Conceptual Design Results-Part II:Symbolic Scheme Simulation

    Institute of Scientific and Technical Information of China (English)

    LI Yu-tong; WANG Yu-xin

    2014-01-01

    The development of new products of high quality, low unit cost, and short lead time to market are the key elements required for any enterprise to obtain a competitive advantage. This part of the paper presents a methodology to automatically simulate the conceptual design results in the virtual entity form. To the identified basic mechanisms, their kinematic analysis is carried out by matching basic Barranov trusses, and their virtual entities are modeled based on feature-based technique and encapsulated as one design object. Based on the structures of the basic mechanisms and their connections, a space layout to the mechanical system corresponding to the symbolic scheme is then fulfilled. With the preset-assembly approach, all parts in the mechanical system are put onto proper positions where the constraint equations are met according to the space layout results. In this way, the virtual entity assembly model of the mechanical system relative to the symbolic scheme is set up. The approach presented in this paper can not only obtain innovative conceptual conceptual design results, but also can evaluate their performances under 3-D enviroment efficently.

  6. Automatic Virtual Entity Simulation of Conceptual Design Results-Part I:Symbolic Scheme Generation and Identification

    Institute of Scientific and Technical Information of China (English)

    WANG Yu-xin; LI Yu-tong

    2014-01-01

    The development of new products of high quality, low unit cost, and short lead time to market are the key elements required for any enterprise to obtain a competitive advantage. For shorting the lead time to market and improving the creativity and performances of the product, a rule-based conceptual design approach and a methodology to simulate the conceptual design results generated in conceptual design process in automatical virtual entity form are presented in this paper. This part of paper presents a rule-based conceptual design method for generating creative conceptual design schemes of mechanisms based on Yan’s kinematic chain regeneration creative design method. The design rules are adopted to describe the design requirements of the functional characteristics, the connection relationships and topological characteristics among mechanisms. Through the graphs-based reasoning process, the conceptual design space is expanded extremely, and the potential creative conceptual design results are then dug out. By refining the design rules, the solution exploration problem is avioded, and the tendentious conceptual design schemes are generated. Since mechanical, electrical and hydraulic subsystems can be transformed into general mechansims, the conceptual design method presented in this paper can also be applied in the conceptual design problem of complex mechatronic systems. And then the method to identify conceptual design schemes is given.

  7. Grid connection rules for wind farms in Spain, Germany, Portugal, UK, and Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Thomas [energynautics GmbH, Langen (Germany); Centeno Lopez, Eva [Swedish Energy Agency, Eskilstuna (Sweden); Soeder, Lennart [Royal Institute of Technology (KTH), Stockholm (Sweden)

    2008-07-01

    This paper compares the grid connection rules for wind farms in 5 European countries. Issues considered are the general regulatory scheme, network connection procedure, network connection costs, network concessions, network tariffs, curtailment policy and future regulatory policies. The comparison shows that significant differences exist between the different countries. (orig.)

  8. Minimal coupling schemes in N-body reaction theory

    Science.gov (United States)

    Picklesimer, A.; Tandy, P. C.; Thaler, R. M.

    1982-08-01

    A new derivation of the N-body equations of Bencze, Redish, and Sloan is obtained through the use of Watson-type multiple scattering techniques. The derivation establishes an intimate connection between these partition-labeled N-body equations and the particle-labeled Rosenberg equations. This result yields new insight into the implicit role of channel coupling in, and the minimal dimensionality of, the partition-labeled equations. NUCLEAR REACTIONS Scattering theory, multiple scattering, connected kernel reaction theory, minimal coupling, coupling schemes.

  9. Zeons, Permanents, the Johnson Scheme, and Generalized Derangements

    Directory of Open Access Journals (Sweden)

    Philip Feinsilver

    2011-01-01

    Full Text Available Starting with the zero-square “zeon algebra,” the connection with permanents is shown. Permanents of submatrices of a linear combination of the identity matrix and all-ones matrix lead to moment polynomials with respect to the exponential distribution. A permanent trace formula analogous to MacMahon's master theorem is presented and applied. Connections with permutation groups acting on sets and the Johnson association scheme arise. The families of numbers appearing as matrix entries turn out to be related to interesting variations on derangements. These generalized derangements are considered in detail as an illustration of the theory.

  10. Underground hydro scheme for Ullapool

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Scoltish and Southern Energy has awarded a contract for a new hydropower plant Scotland, the company's first hydro project since the 1960s. The S6 million scheme will be built by Miller Civil Engineering Services Ltd.

  11. Capacity-achieving CPM schemes

    CERN Document Server

    Perotti, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The so obtained schemes are cascaded with an outer serially-concatenated convolutional code to form a pragmatic coded-modulation system. The resulting schemes exhibit performance very close to the CPM capacity without requiring iterations between the outer decoder and the CPM demodulator. As a result, the receiver exhibits reduced complexity and increased flexibility due to the separation of the demodulation and decoding functions.

  12. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  13. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  14. Mapping hydrologic connectivity of geographically isolated wetlands

    Science.gov (United States)

    Ameli, Ali; Creed, Irena

    2016-04-01

    Geographically isolated wetlands (GIWs) are characterized as depressional landscape features completely surrounded by uplands. These small and typically circular landscape features represent a vast majority of wetlands in various landscapes in North America (98% of all wetlands in the Prairie Pothole Region). Geographical isolation, however, does not imply the hydrological isolation. Although geospatial data (e.g., aerial photos) suggested that GIWs lack a persistent surface water connection, the groundwater connection between GIWs and navigable downstream waters can be substantial with large fluxes at the regional scales. The surface/subsurface connections among GIWs and between GIWs and navigable waters are difficult to map and quantify. This is intimately tied to the fact that an efficient incorporation of these small geometric features and characterization of the mechanisms behind these connectivities are challenging within grid-based simulators. We used a physically-based grid-free groundwater-surface water interaction and surface flow routing schemes to map and assess the watershed-scale GIWs connectivity within an extensively studied watershed at the Canadian prairie pothole region with high density of GIWs. The results showed that there is a persistent subsurface connectivity among GIWs and between GIWs and navigable waters. Surface connection was rare and only occurred during extreme events. The results of this paper have significant implications for developing scientifically grounded environmental policy for protection of GIWs within North American Prairie.

  15. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  16. A Hybrid Data Compression Scheme for Improved VNC

    Directory of Open Access Journals (Sweden)

    Xiaozheng (Jane Zhang

    2007-04-01

    Full Text Available Virtual Network Computing (VNC has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. The algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. The improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.

  17. The Generalized Scheme-Independent Crewther Relation in QCD

    CERN Document Server

    Shen, Jian-Ming; Ma, Yang; Brodsky, Stanley J

    2016-01-01

    The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD process. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived for conformal theory, provides a remarkable connection between two observables when the $\\beta$ function vanishes. The "Generalized Crewther Relation" relates these two observables for physical QCD with nonzero $\\beta$ function; specifically, it connects the non-singlet Adler function ($D^{\\rm ns}$) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering ($C_{\\rm Bjp}$) at leading twist. A scheme-dependent $\\Delta_{\\rm CSB}$-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renorma...

  18. An arbitrated quantum signature scheme

    CERN Document Server

    Zeng, G; Zeng, Guihua; Keitel, Christoph H.

    2002-01-01

    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.

  19. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  20. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Le The Dung

    2017-03-01

    Full Text Available This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs. Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA and uniform circular array (UCA antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs.

  1. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  2. Demand power with EV charging schemes considering actual data

    Directory of Open Access Journals (Sweden)

    Jun-Hyeok Kim

    2016-01-01

    Full Text Available Eco-friendly energies have recently become a popular topic. Given this trend, we predict that a large number of electric vehicles (EVs will be widely used. However, EVs need to be connected to a power system for charging, thereby causing severe risks, such as rapid increase of demand power. Therefore, in this study, we analyze the effects of EV charging on demand power, which depend on different charging schemes, namely, dumb charging, off-peak charging, time-of-use (ToU price-based charging. For practical analysis, we conduct simulations by considering the actual power system and driving patterns in South Korea. Simulation results show that the ToU price-based charging scheme exhibits better performance in terms of demand power over the other charging schemes.

  3. Reassessment and proposal of synchronization scheme for grid connected static converters under disturbed utility; Nueva evaluación y propuesta de un esquema de sincronización para la conexión a la red de convertidores estáticos de potencia en presencia de

    Directory of Open Access Journals (Sweden)

    Giuseppe Buja

    2015-04-01

    Full Text Available The paper starts by casting new light to the existing Phase Lock Loop (PLL schemes used to synchronize the static converters with the grid under utility disturbances. Two approaches are pursued to detect the fundamental harmonic of the positive-sequence component of the grid voltages in presence of the disturbances. Arithmetical approaches improve the operation of the basic PLL circuit by making robust the PLL algorithm. Structural approaches improve the operation of the basic PLL circuit by adding a block intended to cope with the disturbances. This paper considers the structural approach and shows that it works by either post processing the detected grid quantities or preprocessing the grid voltages. Afterwards, the paper proposes an improved PLL scheme termed as double processing (DP PLL scheme since it includes preprocessing and post processing functionalities. By properly designing the scheme parameters, it is proved that the proposed scheme exhibits superior robustness against the utility disturbances. El artículo realiza una descripción de los principales esquemas de lazos de enganche de fases (PLL según sus siglas en inglés usados para sincronizar convertidores estáticos de potencia en una red eléctrica en presencia de perturbaciones eléctricas. Se profundiza en dos esquemas principales para la detección de la componente de secuencia positiva del armónico fundamental. Un enfoque aritmético mejora la operación del esquema PLL básico haciéndolo más  robusto. Un enfoque estructural mejora la operación del esquema PLL básico por la acción de un bloque auxiliar que elimina el efecto perturbador presente en la red eléctrica. Este artículo considera el enfoque estructural y muestra cómo funciona  tanto la detención de las variables eléctricas post procesadas o el preprocesamiento de la tensión de la red. Posteriormente se propone un esquema de PLL mejorado llamado lazo de enganche de fase con doble procesamiento. Se

  4. Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.

  5. A scheme for a topological insulator field effect transistor

    Science.gov (United States)

    Vali, Mehran; Dideban, Daryoosh; Moezi, Negin

    2015-05-01

    We propose a scheme for a topological insulator field effect transistor. The idea is based on the gate voltage control of the Dirac fermions in a ferromagnetic topological insulator channel with perpendicular magnetization connecting to two metallic topological insulator leads. Our theoretical analysis shows that the proposed device displays a switching effect with high on/off current ratio and a negative differential conductance with a good peak to valley ratio.

  6. Fluorescence decay time measurement - a new optical sensing scheme

    Science.gov (United States)

    Draxler, Sonja; Lippitsch, Max E.

    1994-02-01

    Optical sensors often suffer from poor long-term stability. This drawback can be overcome by using fluorescence decay-time measurement as the sensing principle. In this way calibration- free chemical sensors can be developed. The sensing scheme has been used so far mainly in connection with dynamic quenching, for example in oxygen sensors. We have succeeded in extending it to ground-state indicator-analyte reactions, thus obtaining stable optical sensors for decay-time sensing of various analytes.

  7. Provable Secure Identity Based Generalized Signcryption Scheme

    OpenAIRE

    Yu, Gang; Ma, Xiaoxiao; Shen, Yong; Han, Wenbao

    2010-01-01

    According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption...

  8. Research on wind and solar energy transmission economic of Asia and Europe under Northern-hemisphere energy connection

    Science.gov (United States)

    Wei, Xiaoxia; Ding, Jian; Liu, Jie; Wei, Tiezhong

    2017-01-01

    Relying on the northern-hemisphere energy connection, considering the energy implementation of Asia and Europe, carrying out clean energy alternative is mainly to use the clean energy to take place of fossil energy. Under the green development scenario, this research gives the northern-hemisphere energy interconnection development model, makes the Artic as the connection points, gives the Northern hemisphere interconnection model unite the whole world energy. This research also identifies the factors effecting the transmission changes cost, including generation cost, transmission cost and landing cost. And estimate these two continents cost benefit, its economic and variable power-jointed scheme cost competitiveness. It showed that the trans-continent mode had better benefit, and can solve the pollution and energy restriction.

  9. A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets

    Directory of Open Access Journals (Sweden)

    M. A. Alia

    2007-01-01

    Full Text Available This paper describes a new cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Having fractal based digital signature scheme is possible due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two fractal sets used for the conversion of the private key to the public key. Mandelbrot fractal function takes the chosen private key as the input parameter and generates the corresponding public-key. Julia fractal function then used to sign the message with receiver's public key and verify the received message based on the receiver's private key. The propose scheme was resistant against attacks, utilizes small key size and performs comparatively faster than the existing DSA, RSA digital signature scheme. Fractal digital signature scheme was an attractive alternative to the traditional number theory digital signature scheme.

  10. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  11. Optimal probabilistic dense coding schemes

    Science.gov (United States)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  12. Asymptotically hyperbolic connections

    CERN Document Server

    Fine, Joel; Krasnov, Kirill; Scarinci, Carlos

    2015-01-01

    General Relativity in 4 dimensions can be equivalently described as a dynamical theory of SO(3)-connections rather than metrics. We introduce the notion of asymptotically hyperbolic connections, and work out an analog of the Fefferman-Graham expansion in the language of connections. As in the metric setup, one can solve the arising "evolution" equations order by order in the expansion in powers of the radial coordinate. The solution in the connection setting is arguably simpler, and very straightforward algebraic manipulations allow one to see how the obstruction appears at third order in the expansion. Another interesting feature of the connection formulation is that the "counter terms" required in the computation of the renormalised volume all combine into the Chern-Simons functional of the restriction of the connection to the boundary. As the Chern-Simons invariant is only defined modulo large gauge transformations, the requirement that the path integral over asymptotically hyperbolic connections is well-d...

  13. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta......(log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  14. Social Impacts of the Marking Scheme in Public Housing in Hong Kong

    Science.gov (United States)

    Yau, Yung

    2012-01-01

    To improve environmental hygiene in public housing estates in Hong Kong, the Housing Department launched the Marking Scheme for Tenancy Enforcement in Public Housing Estates in 2003. The marking scheme operates as a penalty-point system where sitting tenants will be expelled from their public housing units if they receive penalty points up to a…

  15. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  16. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    . While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources....

  17. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  18. Dynamic droop scheme considering effect of intermittent renewable energy source

    DEFF Research Database (Denmark)

    Wang, Yanbo; Chen, Zhe; Deng, Fujin

    2016-01-01

    generator are calculated in different wind speed and insolation ranges. Then, piecewise droop relationships between distributed generators are built. Finally, the dynamic droop control is proposed to perform power sharing according to wind speed and sunlight information from local sensors. The dynamic droop...... controller of each DG unit is activated through local logic variable inferred by wind speed and solar insolation information. Simulation results are given for validating the droop control scheme. The proposed dynamic droop scheme preserves the advantage of conventional droop control method, and provides...

  19. Modeling the galaxy/light-mass connection with cosmological simulations

    CERN Document Server

    Tasitsiomi, A

    2006-01-01

    I review some results on the galaxy/light-mass connection obtained by dissipationless simulations in combination with a simple, non-parametric model to connect halo circular velocity to the luminosity of the galaxy they would host. I focus on the galaxy-mass correlation and mass-to-light ratios obtained from galaxy up to cluster scales. The predictions of this simple scheme are shown to be in very good agreement with SDSS observations.

  20. Connectivity graphs of uncertainty regions

    CERN Document Server

    Chambers, Erin; Lenchner, Jonathan; Sember, Jeff; Srinivasan, Venkatesh; Stege, Ulrike; Stolpner, Svetlana; Weibel, Christophe; Whitesides, Sue

    2010-01-01

    We study a generalization of the well known bottleneck spanning tree problem called "Best Case Connectivity with Uncertainty": Given a family of geometric regions, choose one point per region, such that the length of the longest edge in a spanning tree of a disc intersection graph is minimized. We show that this problem is NP-hard even for very simple scenarios such as line segments and squares. We also give exact and approximation algorithms for the case of line segments and unit discs respectively.

  1. Snakes: An Integrated Unit Plan.

    Science.gov (United States)

    Lawrence, Lisa

    This document presents an integrated unit plan on snakes targeting second grade students. Objectives of the unit include developing concepts of living things, understanding the contribution and importance of snakes to the environment, and making connections between different disciplines. The unit integrates the topic of snakes into the areas of…

  2. Eccentric connectivity index

    CERN Document Server

    Ilić, Aleksandar

    2011-01-01

    The eccentric connectivity index $\\xi^c$ is a novel distance--based molecular structure descriptor that was recently used for mathematical modeling of biological activities of diverse nature. It is defined as $\\xi^c (G) = \\sum_{v \\in V (G)} deg (v) \\cdot \\epsilon (v)$\\,, where $deg (v)$ and $\\epsilon (v)$ denote the vertex degree and eccentricity of $v$\\,, respectively. We survey some mathematical properties of this index and furthermore support the use of eccentric connectivity index as topological structure descriptor. We present the extremal trees and unicyclic graphs with maximum and minimum eccentric connectivity index subject to the certain graph constraints. Sharp lower and asymptotic upper bound for all graphs are given and various connections with other important graph invariants are established. In addition, we present explicit formulae for the values of eccentric connectivity index for several families of composite graphs and designed a linear algorithm for calculating the eccentric connectivity in...

  3. On eccentric connectivity index

    CERN Document Server

    Zhou, Bo

    2010-01-01

    The eccentric connectivity index, proposed by Sharma, Goswami and Madan, has been employed successfully for the development of numerous mathematical models for the prediction of biological activities of diverse nature. We now report mathematical properties of the eccentric connectivity index. We establish various lower and upper bounds for the eccentric connectivity index in terms of other graph invariants including the number of vertices, the number of edges, the degree distance and the first Zagreb index. We determine the n-vertex trees of diameter with the minimum eccentric connectivity index, and the n-vertex trees of pendent vertices, with the maximum eccentric connectivity index. We also determine the n-vertex trees with respectively the minimum, second-minimum and third-minimum, and the maximum, second-maximum and third-maximum eccentric connectivity indices for

  4. On the gradual deployment of random pairwise key distribution schemes (Extended Version)

    CERN Document Server

    Yagan, Osman

    2011-01-01

    In the context of wireless sensor networks, the pairwise key distribution scheme of Chan et al. has several advantages over other key distribution schemes including the original scheme of Eschenauer and Gligor. However, this offline pairwise key distribution mechanism requires that the network size be set in advance, and involves all sensor nodes simultaneously. Here, we address this issue by describing an implementation of the pairwise scheme that supports the gradual deployment of sensor nodes in several consecutive phases. We discuss the key ring size needed to maintain the secure connectivity throughout all the deployment phases. In particular we show that the number of keys at each sensor node can be taken to be $O(\\log n)$ in order to achieve secure connectivity (with high probability).

  5. Efficient adaptive fuzzy control scheme

    NARCIS (Netherlands)

    Papp, Z.; Driessen, B.J.F.

    1995-01-01

    The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy

  6. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben;

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  7. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  8. Institutions for Asian Connectivity

    OpenAIRE

    Bhattacharyay, Biswa

    2010-01-01

    To make Asia more economically sustainable and resilient against external shocks, regional economies need to be rebalanced toward regional demand- and trade-driven growth through increased regional connectivity. The effectiveness of connectivity depends on the quality of hard and soft infrastructure. Of particular importance in terms of soft infrastructure which makes hard infrastructure work are the facilitating institutions that support connectivity through appropriate policies, reforms, sy...

  9. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  10. Quantum group blind signature scheme without entanglement

    Science.gov (United States)

    Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao

    2011-07-01

    In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.

  11. Fair Electronic Payment Scheme Based on DSA

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; HONG Fan; ZHU Xian

    2005-01-01

    We present a multi-signature scheme based on DSA and describes a fair electronic payment scheme based on improved DSA signatures. The scheme makes both sides in equal positions during the course of electronic transaction. A Trusted Third Party (TTP) is involved in the scheme to guarantee the fairness of the scheme for both sides. However, only during the course of registration and dispute resolution will TTP be needed. TTP is not needed during the normal payment stage.

  12. Inverse Degree and Connectivity

    Institute of Scientific and Technical Information of China (English)

    MA Xiao-ling; TIAN Ying-zhi

    2013-01-01

    Let G be a connected graph with vertex set V(G),order n =丨V(G)丨,minimum degree δ(G) and connectivity κ(G).The graph G is called maximally connected if κ(G) =δ(G).Define the inverse degree of G with no isolated vertices as R(G) =Σv∈V(G)1/d(v),where d(v) denotes the degree of the vertex v.We show that G is maximally connected if R(G) < 1 + 2/δ + n-2δ+1/(n-1)(n-3).

  13. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    2015-01-01

    demands. We use a few axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well...... as all connection costs; (3) the central planner selects a cost minimizing network satisfying reported connection demands based on the estimated costs; and, (4) the planner allocates the true costs of the selected network. It turns out that an allocation rule satisfies the axioms if and only if relative...

  14. Asymptotically hyperbolic connections

    Science.gov (United States)

    Fine, Joel; Herfray, Yannick; Krasnov, Kirill; Scarinci, Carlos

    2016-09-01

    General relativity in four-dimensions can be equivalently described as a dynamical theory of {SO}(3)˜ {SU}(2)-connections rather than metrics. We introduce the notion of asymptotically hyperbolic connections, and work out an analogue of the Fefferman-Graham expansion in the language of connections. As in the metric setup, one can solve the arising ‘evolution’ equations order by order in the expansion in powers of the radial coordinate. The solution in the connection setting is arguably simpler, and very straightforward algebraic manipulations allow one to see how the unconstrained by Einstein equations ‘stress-energy tensor’ appears at third order in the expansion. Another interesting feature of the connection formulation is that the ‘counter terms’ required in the computation of the renormalised volume all combine into the Chern-Simons functional of the restriction of the connection to the boundary. As the Chern-Simons invariant is only defined modulo large gauge transformations, the requirement that the path integral over asymptotically hyperbolic connections is well-defined requires the cosmological constant to be quantised. Finally, in the connection setting one can deform the 4D Einstein condition in an interesting way, and we show that asymptotically hyperbolic connection expansion is universal and valid for any of the deformed theories.

  15. The Connected Traveler

    Energy Technology Data Exchange (ETDEWEB)

    Young, Stanley

    2017-04-24

    The Connected Traveler project is a multi-disciplinary undertaking that seeks to validate potential for transformative transportation system energy savings by incentivizing energy efficient travel behavior.

  16. 78 FR 55684 - ConnectED Workshop

    Science.gov (United States)

    2013-09-11

    ... content into the curriculum; and as classroom management software tools move everything from homework... consider promising strategies for achieving the President's goal of connecting virtually all K-12 students... policies and consider the most promising strategies for equipping K-12 schools for digital learning....

  17. Modeling and Control of Low Voltage Flexible Units for Enhanced Operation of Distribution Feeders

    DEFF Research Database (Denmark)

    Raboni, Pietro; Hu, Weihao; Chaudhary, Sanjay

    2013-01-01

    Battery (EVB) is proposed for providing primary regulation in grid connected mode and for hierarchically manage an islanded LV distribution feeder. The unit models are described and a novel EVB model directly based on manufacturer’s data is proposed and evaluated comparing its performances with Sim......PowerSystems library block. Moreover a voltage dependant power term is applied to the Voltage-Source Converter (VSC) control scheme of the EVB for improving the performances of the islanded feeder. The control is tested in case of under frequency and consequent load shedding occurring at the residential feeder...

  18. Improved short adjacent repeat identification using three evolutionary Monte Carlo schemes.

    Science.gov (United States)

    Xu, Jin; Li, Qiwei; Li, Victor O K; Li, Shuo-Yen Robert; Fan, Xiaodan

    2013-01-01

    This paper employs three Evolutionary Monte Carlo (EMC) schemes to solve the Short Adjacent Repeat Identification Problem (SARIP), which aims to identify the common repeat units shared by multiple sequences. The three EMC schemes, i.e., Random Exchange (RE), Best Exchange (BE), and crossover are implemented on a parallel platform. The simulation results show that compared with the conventional Markov Chain Monte Carlo (MCMC) algorithm, all three EMC schemes can not only shorten the computation time via speeding up the convergence but also improve the solution quality in difficult cases. Moreover, we observe that the performances of different EMC schemes depend on the degeneracy degree of the motif pattern.

  19. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  20. Termination unit

    Energy Technology Data Exchange (ETDEWEB)

    Traeholt, Chresten; Willen, Dag; Roden, Mark; Tolbert, Jerry C.; Lindsay, David; Fisher, Paul W.; Nielsen, Carsten Thidemann

    2016-05-03

    Cable end section comprises end-parts of N electrical phases/neutral, and a thermally-insulation envelope comprising cooling fluid. The end-parts each comprises a conductor and are arranged with phase 1 innermost, N outermost surrounded by the neutral, electrical insulation being between phases and N and neutral. The end-parts comprise contacting surfaces located sequentially along the longitudinal extension of the end-section. A termination unit has an insulating envelope connected to a cryostat, special parts at both ends comprising an adapter piece at the cable interface and a closing end-piece terminating the envelope in the end-section. The special parts houses an inlet and/or outlet for cooling fluid. The space between an inner wall of the envelope and a central opening of the cable is filled with cooling fluid. The special part at the end connecting to the cryostat houses an inlet or outlet, splitting cooling flow into cable annular flow and termination annular flow.

  1. Power system services provided by inverter connected distributed energy resources

    DEFF Research Database (Denmark)

    For the last few years there has been a significant increase of DER units in Denmark, of those units more and more are connected to the power system using inverters. These inverter connected units have the potential to support the electrical power system with various power system services. One of...... of the services that can be provided is local voltage support. This brings up the question of how the voltage support function is implemented to control multiple DER units as well as how the response of the units can be estimated and evaluated....

  2. k-Connectivity of Random Key Graphs

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \\geq 2$ and $X_n = o(\\sqrt{\\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the a...

  3. Coordinated Voltage Control in Offshore HVDC Connected Cluster of Wind Power Plants

    DEFF Research Database (Denmark)

    Sakamuri, Jayachandra N.; Rather, Zakir Hussain; Rimez, Johan;

    2016-01-01

    This paper presents a coordinated voltage control scheme (CVCS) for a cluster of offshore wind power plants (OWPPs) connected to a VSC HVDC system. The primary control point of the proposed voltage control scheme is the introduced Pilot bus, which is having the highest short circuit capacity...

  4. Autonomous economic operation of grid connected DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    with the centralized management approach. In this paper, the same concept has been extended to grid-connected DC microgrid. The proposed economic droop scheme takes into consideration the power generation cost of Distributed Generators (DGs) and utility grid tariff and adaptively tunes their respective droop curves...

  5. An ensemble training scheme for machine-learning classification of Hyperion satellite imagery with independent hyperspectral libraries

    Science.gov (United States)

    Friedel, Michael; Buscema, Massimo

    2016-04-01

    A training scheme is proposed for the real-time classification of soil and vegetation (landscape) components in EO-1 Hyperion hyperspectral images. First, an auto-contractive map is used to compute connectivity of reflectance values for spectral bands (N=200) from independent laboratory spectral library components. Second, a minimum spanning tree is used to identify optimal grouping of training components from connectivity values. Third, the reflectance values for optimal landscape component signatures are sorted. Fourth, empirical distribution functions (EDF) are computed for each landscape component. Fifth, the Monte-Carlo technique is used to generate realizations (N=30) for each landscape EDF. The correspondence of component realizations to original signatures validates the stochastic procedure. Presentation of the realizations to the self-organizing map (SOM) is done using three different map sizes: 14x10, 28x20, and 40 x 30. In each case, the SOM training proceeds first with a rough phase (20 iterations using a Gaussian neighborhood with an initial and final radius of 11 units and 3 units) and then fine phase (400 iterations using a Gaussian neighborhood with an initial and final radius of 3 units and 1 unit). The initial and final learning rates of 0.5 and 0.05 decay linearly down to 10-5, and the Gaussian neighborhood function decreases exponentially (decay rate of 10-3 iteration-1) providing reasonable convergence. Following training of the three networks, each corresponding SOM is used to independently classify the original spectral library signatures. In comparing the different SOM networks, the 28x20 map size is chosen for independent reproducibility and processing speed. The corresponding universal distance matrix reveals separation of the seven component classes for this map size thereby supporting it use as a Hyperion classifier.

  6. Connecting Arithmetic to Algebra

    Science.gov (United States)

    Darley, Joy W.; Leapard, Barbara B.

    2010-01-01

    Algebraic thinking is a top priority in mathematics classrooms today. Because elementary school teachers lay the groundwork to develop students' capacity to think algebraically, it is crucial for teachers to have a conceptual understanding of the connections between arithmetic and algebra and be confident in communicating these connections. Many…

  7. Making Connections with Estimation.

    Science.gov (United States)

    Lobato, Joanne E.

    1993-01-01

    Describes four methods to structure estimation activities that enable students to make connections between their understanding of numbers and extensions of those concepts to estimating. Presents activities that connect estimation with other curricular areas, other mathematical topics, and real-world applications. (MDH)

  8. Tokens of Connection

    Science.gov (United States)

    Crowley, Theresa

    2016-01-01

    When teachers make the effort to build a solid relationship with each student, built on trust, they often engender a life-long connection, one that's life-changing for the student. But how can teachers grow such long-lasting relationships with all students, especially disenfranchised learners and those who make it hard to connect? Crowley, a…

  9. WEIGHTED COMPACT SCHEME FOR SHOCK CAPTURING

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new class of finite difference schemes--the weighted compact schemes are proposed. According to the idea of the WENO schemes, the weighted compact scheme is constructed by a combination of the approximations of derivatives on candidate stencils with properly assigned weights so that the non-oscillatory property is achieved when discontinuities appear. The primitive function reconstruction method of ENO schemes is applied to obtain the conservative form of the weighted compact scheme. This new scheme not only preserves the characteristic of standard compact schemes and achieves high order accuracy and high resolution using a compact stencil,but also can accurately capture shock waves and discontinuities without oscillation, Numerical examples show that the new scheme is very promising and successful.``

  10. Generalized connectivity of graphs

    CERN Document Server

    Li, Xueliang

    2016-01-01

    Noteworthy results, proof techniques, open problems and conjectures in generalized (edge-) connectivity are discussed in this book. Both theoretical and practical analyses for generalized (edge-) connectivity of graphs are provided. Topics covered in this book include: generalized (edge-) connectivity of graph classes, algorithms, computational complexity, sharp bounds, Nordhaus-Gaddum-type results, maximum generalized local connectivity, extremal problems, random graphs, multigraphs, relations with the Steiner tree packing problem and generalizations of connectivity. This book enables graduate students to understand and master a segment of graph theory and combinatorial optimization. Researchers in graph theory, combinatorics, combinatorial optimization, probability, computer science, discrete algorithms, complexity analysis, network design, and the information transferring models will find this book useful in their studies.

  11. Handbook of Brain Connectivity

    CERN Document Server

    Jirsa, Viktor K

    2007-01-01

    Our contemporary understanding of brain function is deeply rooted in the ideas of the nonlinear dynamics of distributed networks. Cognition and motor coordination seem to arise from the interactions of local neuronal networks, which themselves are connected in large scales across the entire brain. The spatial architectures between various scales inevitably influence the dynamics of the brain and thereby its function. But how can we integrate brain connectivity amongst these structural and functional domains? Our Handbook provides an account of the current knowledge on the measurement, analysis and theory of the anatomical and functional connectivity of the brain. All contributors are leading experts in various fields concerning structural and functional brain connectivity. In the first part of the Handbook, the chapters focus on an introduction and discussion of the principles underlying connected neural systems. The second part introduces the currently available non-invasive technologies for measuring struct...

  12. Dual Watermarking Scheme with Encryption

    CERN Document Server

    Dhanalakshmi, R

    2010-01-01

    Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. DWT and SVD have been used as a mathematical tool to embed watermark in the image. Two watermarks are embedded in the host image. The secondary is embedded into primary watermark and the resultant watermarked image is encrypted using chaos based logistic map. This provides an efficient and secure way for image encryption and transmission. The watermarked image is decrypted and a reliable watermark extraction scheme is developed for the extraction of the primary as well as secondary watermark from the distorted image.

  13. Ion Polarization Scheme for MEIC

    CERN Document Server

    Kondratenko, A M; Filatov, Yu N; Derbenev, Ya S; Lin, F; Morozov, V S; Zhang, Y

    2016-01-01

    The choice of a figure 8 shape for the booster and collider rings of MEIC opens wide possibilities for preservation of the ion polarization during beam acceleration as well as for control of the polarization at the collider's interaction points. As in the case of accelerators with Siberian snakes, the spin tune is energy independent but is equal to zero instead of one half. The figure-8 topology eliminates the effect of arcs on the spin motion. There appears a unique opportunity to control the polarization of any particle species including deuterons, using longitudinal fields of small integrated strength (weak solenoids). Contrary to existing schemes, using weak solenoids in figure-8 colliders, one can control the polarization at the interaction points without essentially any effect on the beam's orbital characteristics. A universal scheme for control of the polarization using weak solenoids provides an elegant solution to the problem of ion acceleration completely eliminating resonant beam depolarization. It...

  14. Wrong way recollement for schemes

    OpenAIRE

    Jorgensen, Peter

    2005-01-01

    A recollement of triangulated categories makes it possible to view one such category as being glued together from two others. The prototypical example is that D(X), a suitable derived category of sheaves on the topological space X, has a recollement in terms of D(Z) and D(U) when Z is a closed subset of X and U is the open complement. This note gives a different, "wrong way" recollement in the scheme case.

  15. Parabolic sheaves on logarithmic schemes

    OpenAIRE

    Borne, Niels; Vistoli, Angelo

    2010-01-01

    We show how the natural context for the definition of parabolic sheaves on a scheme is that of logarithmic geometry. The key point is a reformulation of the concept of logarithmic structure in the language of symmetric monoidal categories, which might be of independent interest. Our main result states that parabolic sheaves can be interpreted as quasi-coherent sheaves on certain stacks of roots.

  16. Relationship of Occlusal Schemes with the Occurrence of Temporomandibular Disorders

    Directory of Open Access Journals (Sweden)

    Dina H. Sugiaman

    2013-07-01

    Full Text Available Masticatory system is a complex functional unit of the body responsible for mastication, speech, and deglutition process. Temporomandibular disorders (TMD is used to describe all functional disturbances of the masticatory system. The etiology of TMD is multifactorial, such as occlusal disharmony and emotional stress. The relationship between occlusion and TMD has been highly debated in dentistry, one of the occlusal factors is the occlusal scheme. Occlusal schemes are defined as bilateral canine guidance, unilateral canine guidance, group function and balanced occlusion. However, studies about the relationship of occlusal schemes and the occurrence of the TMD are still limited and remained controversial. Objective: To investigate the relationship of occlusal schemes witht he occurrence of TMD. Methods: A cross-sectional study was conducted at the Faculty of Dentistry, Uniiversitas Indonesia. A total of 127 students were included in this study. Subjects were examined based on Clinical Helkimo Index and divided into TMD and non-TMD groups. Subjects were categorized as non-TMD groups if the value of the clinical Helkimo index was 0 and as TMD group when the value ranged between 1-25. Results: Balanced occlusion schemes has a greater risk of TMD occurrence with odds ratio value 5.6 and 95% confidence interval 1.188 to 26.331 (p=0.021. Conclusion: Balanced occlusion has a significant relationship with the occurrence of TMD.

  17. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  18. Practical E-Payment Scheme

    Directory of Open Access Journals (Sweden)

    Mohammad Al-Fayoumi

    2010-05-01

    Full Text Available E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. Customers are generally passive in e-commerce transaction. Relied on a blind signature, this paper introduces an e-payment protocol, in which customers have more initiative, and can terminate the transaction before possible cheats, its security is enhanced. Moreover, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. As there is no trusted authority in the proposed scheme, network overcrowding and conspiracy problems can be avoided. Furthermore, the protocol satisfies fairness and non-repudiation. This helps merchant and bank to speed up the financial transaction process and to give user instant services at any time. Also, in this paper, we will discuss an important e-payment protocol namely pay-word scheme and examine its advantages and limitations, which encourages the authors to improve the scheme that keeps all characteristics intact without compromise of the security robustness. The suggested protocol employs the idea of blind signature with the thought of hash chain. We will compare the proposed protocol with pay-word protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.

  19. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  20. Vertical Handover decision schemes using SAW and WPM for Network selection in Heterogeneous Wireless Networks

    CERN Document Server

    Savitha, K

    2011-01-01

    Seamless continuity is the main goal and challenge in fourth generation Wireless networks (FGWNs), to achieve seamless connectivity "HANDOVER" technique is used,Handover mechanism are mainly used when a mobile terminal(MT) is in overlapping area for service continuity. In Heterogeneous wireless networks main challenge is continual connection among the different networks like WiFi, WiMax, WLAN, WPAN etc. In this paper, Vertical handover decision schemes are compared, Simple Additive Weighting method (SAW) and Weighted product model (WPM) are used to choose the best network from the available Visitor networks(VTs) for the continuous connection by the mobile terminal. In our work we mainly concentrated to the handover decision phase and to reduce the processing delay in the period of handover. In this paper both SAW and WPM methods are compared with the Qos parameters of the mobile terminal (MT) to connect with the best network. Keywords: Handover, Vertical handover decision schemes, Simple additive weighting, W...

  1. Study of connected system of automatic control of load and operation efficiency of a steam boiler with extremal controller on a simulation model

    Science.gov (United States)

    Sabanin, V. R.; Starostin, A. A.; Repin, A. I.; Popov, A. I.

    2017-02-01

    The problems of operation effectiveness increase of steam boilers are considered. To maintain the optimum fuel combustion modes, it is proposed to use an extremal controller (EC) determining the value of airflow rate, at which the boiler generating the desired amount of heat will consume a minimum amount of fuel. EC sets the determined value of airflow rate to airflow rate controller (ARC). The test results of numerical simulation dynamic nonlinear model of steam boiler with the connected system of automatic control of load and combustion efficiency using EC are presented. The model is created in the Simulink modeling package of MATLAB software and can be used to optimize the combustion modes. Based on the modeling results, the conclusion was drawn about the possibility in principle of simultaneously boiler load control and optimizing by EC the combustion modes when changing the fuel combustion heat and the boiler characteristics and its operating mode. It is shown that it is possible to automatically control the operation efficiency of steam boilers when using EC without applying the standard flue gas analyzers. The article considers the numerical simulation dynamic model of steam boiler with the schemes of control of fuel consumption and airflow rate, the steam pressure and EC; the purpose of using EC in the scheme with linear controllers and the requirements to the quality of its operation; the results of operation of boiler control schemes without EC with estimation of influence of roughness of thermal mode maps on the nature of static and dynamic connection of the control units of fuel consumption and airflow rate; the phase trajectories and the diagrams of transient processes occurring in the control scheme with EC with stepped changing the fuel quality and boiler characteristics; analysis of modeling results and prospects for using EC in the control schemes of boilers.

  2. Quantifying bicycle network connectivity.

    Science.gov (United States)

    Lowry, Michael; Loh, Tracy Hadden

    2017-02-01

    The intent of this study was to compare bicycle network connectivity for different types of bicyclists and different neighborhoods. Connectivity was defined as the ability to reach important destinations, such as grocery stores, banks, and elementary schools, via pathways or roads with low vehicle volumes and low speed limits. The analysis was conducted for 28 neighborhoods in Seattle, Washington under existing conditions and for a proposed bicycle master plan, which when complete will provide over 700 new bicycle facilities, including protected bike lanes, neighborhood greenways, and multi-use trails. The results showed different levels of connectivity across neighborhoods and for different types of bicyclists. Certain projects were shown to improve connectivity differently for confident and non-confident bicyclists. The analysis showed a positive correlation between connectivity and observed utilitarian bicycle trips. To improve connectivity for the majority of bicyclists, planners and policy-makers should provide bicycle facilities that allow immediate, low-stress access to the street network, such as neighborhood greenways. The analysis also suggests that policies and programs that build confidence for bicycling could greatly increase connectivity.

  3. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  4. A RELIABILITY ENHANCED DENSITY ADAPTIVE DATA DISSEMINATION SCHEME FOR VANETS

    Institute of Scientific and Technical Information of China (English)

    Zhou Lianke; Cui Gang; Luo Danyan; Liu Hongwei

    2011-01-01

    In this paper,a reliability enhanced and density adaptive data disseminating scheme is proposed for Vehicular Ad hoc NETworks (VANETs).The distributed on demand inquiring and responding mechanism is employed to get nodes' connectivity information.The announcing-listening process is also designed to find the nodes with bigger additional degree to rebroadcast,by which the relaying node is selected freely from density's influence.Simultaneously,a reliability parameter is designed to choose redundant relays for each hop.According to the importance of the broadcast,the parameter is set by the source node properly.Simulation results show that the scheme has achieved good performances such as low forwarding ratio,short latency and low load.The broadcast coverage ratio is ensured against the influence of key link errors and relaying nodes failure by paying suitable additional communication.

  5. Singularities of invariant connections

    Energy Technology Data Exchange (ETDEWEB)

    Amores, A.M. (Universidad Complutense, Madrid (Spain)); Gutierrez, M. (Universidad Politecnica, Madrid (Spain))

    1992-12-01

    A reductive homogeneous space M = P/G is considered, endowed with an invariant connection, i.e., such that all left translations of M induced by members of P preserve it. The authors study the set of singularities of such connections giving sufficient conditions for it to be empty, or, in other cases, familities of b-incomplete curves converging to singularities. A full description of the b-completion of a connection with M = R[sup m] (or a quotient of it) is given with information on its topology. 5 refs.

  6. Covariant Magnetic Connection Hypersurfaces

    CERN Document Server

    Pegoraro, F

    2016-01-01

    In the single fluid, nonrelativistic, ideal-Magnetohydrodynamic (MHD) plasma description magnetic field lines play a fundamental role by defining dynamically preserved "magnetic connections" between plasma elements. Here we show how the concept of magnetic connection needs to be generalized in the case of a relativistic MHD description where we require covariance under arbitrary Lorentz transformations. This is performed by defining 2-D {\\it magnetic connection hypersurfaces} in the 4-D Minkowski space. This generalization accounts for the loss of simultaneity between spatially separated events in different frames and is expected to provide a powerful insight into the 4-D geometry of electromagnetic fields when ${\\bf E} \\cdot {\\bf B} = 0$.

  7. Improving Interoperability by Incorporating UnitsML Into Markup Languages.

    Science.gov (United States)

    Celebi, Ismet; Dragoset, Robert A; Olsen, Karen J; Schaefer, Reinhold; Kramer, Gary W

    2010-01-01

    Maintaining the integrity of analytical data over time is a challenge. Years ago, data were recorded on paper that was pasted directly into a laboratory notebook. The digital age has made maintaining the integrity of data harder. Nowadays, digitized analytical data are often separated from information about how the sample was collected and prepared for analysis and how the data were acquired. The data are stored on digital media, while the related information about the data may be written in a paper notebook or stored separately in other digital files. Sometimes the connection between this "scientific meta-data" and the analytical data is lost, rendering the spectrum or chromatogram useless. We have been working with ASTM Subcommittee E13.15 on Analytical Data to create the Analytical Information Markup Language or AnIML-a new way to interchange and store spectroscopy and chromatography data based on XML (Extensible Markup Language). XML is a language for describing what data are by enclosing them in computer-useable tags. Recording the units associated with the analytical data and metadata is an essential issue for any data representation scheme that must be addressed by all domain-specific markup languages. As scientific markup languages proliferate, it is very desirable to have a single scheme for handling units to facilitate moving information between different data domains. At NIST, we have been developing a general markup language just for units that we call UnitsML. This presentation will describe how UnitsML is used and how it is being incorporated into AnIML.

  8. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  9. Elliptic Curve Blind Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    YOULin; YANGYixian; WENQiaoyan

    2003-01-01

    Blind signature schemes are important cryptographic protocols in guaranteeing the privacy or anonymity of the users.Three new blind signature schemes and their corresponding generalizations are pro-posed. Moreover, their securities are simply analyzed.

  10. Secret sharing scheme with inherited characteristic

    Institute of Scientific and Technical Information of China (English)

    Ye Zhenjun; Meng Fanzhen

    2006-01-01

    To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.

  11. Linear multi-secret sharing schemes

    Institute of Scientific and Technical Information of China (English)

    XIAO Liangliang; LIU Mulan

    2005-01-01

    In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multisecret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal.

  12. Improvement of publicly verifiable authenticated encryption scheme

    Institute of Scientific and Technical Information of China (English)

    LEI Fei-yu; CHEN Wen; MA Chang-she; CHEN Ke-fei

    2007-01-01

    A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency.

  13. A massive momentum-subtraction scheme

    CERN Document Server

    Boyle, Peter; Khamseh, Ava

    2016-01-01

    A new renormalization scheme is defined for fermion bilinears in QCD at non vanishing quark masses. This new scheme, denoted RI/mSMOM, preserves the benefits of the nonexceptional momenta introduced in the RI/SMOM scheme, and allows a definition of renormalized composite fields away from the chiral limit. Some properties of the scheme are investigated by performing explicit one-loop computation in dimensional regularization.

  14. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  15. Connective Tissue Naevus

    Directory of Open Access Journals (Sweden)

    Bhat Ramesh M

    1999-01-01

    Full Text Available A young adult female patient of connective tissue naevus presented with papules and indurated plaques on both les and left arm. Histopathology showed increased amount of collagen in the dermis. Osteopoikilosis was absent.

  16. Strengthening connections: functional connectivity and brain plasticity

    OpenAIRE

    2014-01-01

    The ascendancy of functional neuroimaging has facilitated the addition of network-based approaches to the neuropsychologist’s toolbox for evaluating the sequelae of brain insult. In particular, intrinsic functional connectivity (iFC) mapping of resting state fMRI (R-fMRI) data constitutes an ideal approach to measuring macro-scale networks in the human brain. Beyond the value of iFC mapping for charting how the functional topography of the brain is altered by insult and injury, iFC analyses c...

  17. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  18. Connective Tissue Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    2008349 A clinical analysis of 32 patients with diffuse alveolar hemorrhage in diffuse connective tissue diseases. CHEN Guangxing(陈光星), et al. Dept Rheumatol, PUMC & CAMS Beijing 100730. Chin J Intern Med 2008;47(5):362-365.Objective To provide clues to diagnosis and treatment for diffuse alveolar hemorrhage(DAH)in patients with diffuse connective tissue diseases(CTD).Method To analyze restropectively the data of clinical features,

  19. Reliability of power connections

    Institute of Scientific and Technical Information of China (English)

    BRAUNOVIC Milenko

    2007-01-01

    Despite the use of various preventive maintenance measures, there are still a number of problem areas that can adversely affect system reliability. Also, economical constraints have pushed the designs of power connections closer to the limits allowed by the existing standards. The major parameters influencing the reliability and life of Al-Al and Al-Cu connections are identified. The effectiveness of various palliative measures is determined and the misconceptions about their effectiveness are dealt in detail.

  20. NEACP Onboard Connectivity Study

    Science.gov (United States)

    1990-03-30

    Methodology Framework .............................. 6-3 6.2.2 Sources of ME Cost Savings with NOCH ............... 6-5 6.2.3 Additional Benefits of 1OCU...processing system (MPS) installation connects all record and data communications equipment to a common MIL -STD-1553B bus and automates many of the manual...Local Area Network Concepts A NOCH developed around a generic bus would provide connectivity throughout the aircraft, thereby reducing or eliminating

  1. Connections between Frontier Markets

    Directory of Open Access Journals (Sweden)

    Eliza-Olivia Lungu

    2013-06-01

    Full Text Available The global financial system presents a high degree of connectivity and the network theory provides the natural framework for visualizing the structure of it connections. I analyse the financial links established between the frontier markets and how these links evolve over a 10 years period (2001 - 2011. I identify patterns in the network looking both at the node specific statistics (degree, strength and clustering coefficient and at the aggregated network statistics (network density and network asymmetry index.

  2. Population Monotonic Path Schemes for Simple Games

    NARCIS (Netherlands)

    Ciftci, B.B.; Borm, P.E.M.; Hamers, H.J.M.

    2006-01-01

    A path scheme for a simple game is composed of a path, i.e., a sequence of coalitions that is formed during the coalition formation process and a scheme, i.e., a payoff vector for each coalition in the path.A path scheme is called population monotonic if a player's payoff does not decrease as the pa

  3. A new semi-Lagrangian difference scheme

    Institute of Scientific and Technical Information of China (English)

    季仲贞; 陈嘉滨

    2001-01-01

    A new completely energy-conserving semi-Lagrangian scheme is constructed. The numerical solution of shallow water equation shows that this conservative scheme preserves the total energy in twelve significant digits, while the traditional scheme does only in five significant digits.

  4. Arbitrated quantum signature scheme with message recovery

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-02-16

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.

  5. Quantum Signature Scheme with Weak Arbitrator

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  6. Current terminology and diagnostic classification schemes.

    Science.gov (United States)

    Okeson, J P

    1997-01-01

    This article reviews the current terminology and classification schemes available for temporomandibular disorders. The origin of each term is presented, and the classification schemes that have been offered for temporomandibular disorders are briefly reviewed. Several important classifications are presented in more detail, with mention of advantages and disadvantages. Final recommendations are provided for future direction in the area of classification schemes.

  7. A Model of Hierarchical Key Assignment Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhigang; ZHAO Jing; XU Maozhi

    2006-01-01

    A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.

  8. The generalized scheme-independent Crewther relation in QCD

    Energy Technology Data Exchange (ETDEWEB)

    Shen, Jian-Ming; Wu, Xing-Gang; Ma, Yang; Brodsky, Stanley J.

    2017-07-01

    The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton–nucleon scattering times the Adler function, defined from the cross section for electron–positron annihilation into hadrons, has no pQCD radiative corrections. The “Generalized Crewther Relation” relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp) at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp-1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd(Q)=Σi≥1αˆg1i(Qi), at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is negligible. Similar

  9. Support schemes and market design in international offshore grids

    DEFF Research Database (Denmark)

    Schröder, Sascha Thorsten

    2013-01-01

    International offshore grids can combine the grid connection of offshore wind parks with the possibility for international power trading in the future. This paper investigates the choice of support scheme and power market design in international offshore grids and derives resulting incentives....... For example, day-ahead market design could be chosen such that an offshore wind park is affiliated to a national country or placed in a neutral offshore hub. With regard to balancing, an offshore wind park's access to a specific country may be blocked due to interconnector congestion from power trading. Hence...

  10. The generalized scheme-independent Crewther relation in QCD

    Directory of Open Access Journals (Sweden)

    Jian-Ming Shen

    2017-07-01

    Full Text Available The Principle of Maximal Conformality (PMC provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton–nucleon scattering times the Adler function, defined from the cross section for electron–positron annihilation into hadrons, has no pQCD radiative corrections. The “Generalized Crewther Relation” relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp−1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd(Q=∑i≥1αˆg1i(Qi, at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is

  11. [Connective tissue and inflammation].

    Science.gov (United States)

    Jakab, Lajos

    2014-03-23

    The author summarizes the structure of the connective tissues, the increasing motion of the constituents, which determine the role in establishing the structure and function of that. The structure and function of the connective tissue are related to each other in the resting as well as inflammatory states. It is emphasized that cellular events in the connective tissue are part of the defence of the organism, the localisation of the damage and, if possible, the maintenance of restitutio ad integrum. The organism responds to damage with inflammation, the non specific immune response, as well as specific, adaptive immunity. These processes are located in the connective tissue. Sterile and pathogenic inflammation are relatively similar processes, but inevitable differences are present, too. Sialic acids and glycoproteins containing sialic acids have important roles, and the role of Siglecs is also highlighted. Also, similarities and differences in damages caused by pathogens and sterile agents are briefly summarized. In addition, the roles of adhesion molecules linked to each other, and the whole event of inflammatory processes are presented. When considering practical consequences it is stressed that the structure (building up) of the organism and the defending function of inflammation both have fundamental importance. Inflammation has a crucial role in maintaining the integrity and the unimpaired somato-psychological state of the organism. Thus, inflammation serves as a tool of organism identical with the natural immune response, inseparably connected with the specific, adaptive immune response. The main events of the inflammatory processes take place in the connective tissue.

  12. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...

  13. Update on the Pyramid Scheme

    Science.gov (United States)

    Banks, Tom; Torres, T. J.

    2012-10-01

    We summarize recent work in which we attempt to make consistent models of LHC physics, from the Pyramid Scheme. The models share much with the NMSSM, in particular, enhanced tree level contributions to the Higgs mass and a preference for small tan β. There are three different singlet fields, and a new strongly coupled gauge theory, so the constraints of perturbative unification are quite different. We outline our general approach to the model, which contains a Kähler potential for three of the low energy fields, which is hard to calculate. Detailed calculations, based on approximations to the Kähler potential, will be presented in a future publication.

  14. DEVELOPMENT OF THE SCHEME AND EXERGY ANALYSIS OF THE EGS WITH THE POSSIBILITY OF THE SIMULTANEOUS PRODUCTION OF ELECTRICITY AND "DEEP COLD"

    Directory of Open Access Journals (Sweden)

    V. Ia Gubarev

    2014-01-01

    Full Text Available One of the areas of energy conservation is the use of an expander-generator sets, that convert pressurized natural gas into electricity. In applying the expander-generator set for using gas pressure power generation gas flow necessary to heat, as as a result of expansion of the gas in an expander and a corresponding lowering of the temperature, the formation of condensate and hydrates in gas pipelines and fittings, piping and, as a consequence, their blockage or obstruction. In connection with this gas before detander-generating set to be heated so that at its exit gas temperature was at least 0 0C. A scheme in which the heater is replaced by adsorption drying, which makes it possible to use an expander-generator set at low temperatures without the risk of it or after it, mist and hydrates. Gas adsorption drying - process is selective absorption of the surface pores of the solid adsorbent of water molecules from the gas, and then extract them from the pores by applying external influences. The process of adsorption drying gas can achieve dew point – 90 0C. Including this unit, or equivalent, in the scheme with the DHA, get simultaneous generation of electricity and "deep cold". Area of application "deep cold" is very broads. Along with all energy and chemical industries, he is in demand in the food industry, plants for the production of beer and soft drinks. Chill needed for freezing and for subsequent storage products in refrigeration terminals and warehouses. This article contains diagrams of the adsorption unit, unit the receipt of "deep cold", a description of their work and exergy analysis of the developed scheme.

  15. Dual Authentication For Bluetooth Connection

    Directory of Open Access Journals (Sweden)

    Diallo Alhassane Saliou

    2014-07-01

    Full Text Available Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN. This is because the radio frequency (RF waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS. These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC algorithm with Secure Hash Algorithm (SHA-256. The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE as software and a Bluetooth (BT Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the

  16. Integration of current identity-based district-varied health insurance schemes in China: implications and challenges.

    Science.gov (United States)

    Wang, Hai-Qiang; Liu, Zhi-Heng; Zhang, Yong-Zhao; Luo, Zhuo-Jing

    2012-03-01

    With China's great efforts to improve public health insurance, clear progress has been achieved toward the ambitious full health insurance coverage strategy for all. The current health insurance schemes in China fall into three categories: urban employee basic health insurance scheme, urban resident scheme, and new rural cooperative medical system. Despite their phasic success, these substantially identity-based, district-varied health insurance schemes have separate operation mechanisms, various administrative institutions, and consequently poor connections. On the other hand, the establishment and implementation of various health insurance schemes provide the preconditioning of more sophisticated social health insurance schemes, the increase in the income of urban and rural people, and the great importance attached by the government. Moreover, the reform of the "Hukou" (household register) system provides economical, official, and institutional bases. Therefore, the establishment of an urban-rural integrated, citizen-based, and nationwide-universal health insurance scheme by the government is critically important to attain equality and national connection. Accordingly, the differences between urban and rural areas should be minimized. In addition, the current schemes, administrative institutions, and networks should be integrated and interconnected. Moreover, more expenditure on health insurance might be essential for the integration despite the settings of global financial crisis. Regardless of the possible challenges in implementation, the proposed new scheme is promising and may be applied in the near future for the benefit of the Chinese people and global health.

  17. A correlation significance learning scheme for auto-associative memories.

    Science.gov (United States)

    Lee, D L; Wang, W J

    1995-12-01

    A new concept called correlation significance for expanding the attraction regions around all the stored vectors (attractors) of an asynchronous auto-associative memory is introduced. Since the well known outer product rule adopts equally-weighted correlation matrix for the neuron connections, the attraction region around each attractor is not maximized. In order to maximize these attraction regions, we devise a rule that all the correlations between two different components of two different stored patterns should be unequally weighted. By this formalism, the connection matrix T of the asynchronous neural network is designed by using the gradient descent approach. Additionally, an exponential type error function is constructed such that the number of successfully stored vectors can be directly examined during the entire learning process. Finally, computer simulations demonstrate the efficiency and capability of this scheme.

  18. CONSTRUCTION OF THIRD-ORDER WNND SCHEME AND ITS APPLICATION IN COMPLEX FLOW

    Institute of Scientific and Technical Information of China (English)

    刘伟; 赵海洋; 谢昱飞

    2005-01-01

    According to the Liu' s weighted idea, a space third-order WNND ( weighted non-oscillatory, containing no free parameters, and dissipative scheme ) scheme was constructed based on the stencils of second-order NND (non-oscillatory, containing no free parameters, and dissipative scheme ) scheme. It was applied in solving linear-wave equation, 1D Euler equations and 3D Navier-Stokes equations. The numerical results indicate that the WNND scheme which does not increase interpolated point ( compared to NND scheme) has more advantages in simulating discontinues and convergence than NND scheme. Appling WNND scheme to simulating the hypersonic flow around lift-body shows:With the AoA ( angle of attack ) increasing from 0° to 50°, the structure of limiting streamline of leeward surface changes from unseparating, open-separating to separating,which occurs from the combined-point (which consists of saddle and node points ). The separating area of upper wing surface is increasing with the AoA's increasing. The topological structures of hypersonic fiowfield based on the sectional flow patterns perpendicular to the body axis agree well with Zhang Hanxin' s theory. Additionally, the unstable-structure phenomenon which is showed by two saddles connection along leeward symmetry line occurs at some sections when the AoA is bigger than 20°.

  19. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  20. Pseudorandomness of Camellia-Like Scheme

    Institute of Scientific and Technical Information of China (English)

    Wen-Ling Wu

    2006-01-01

    Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camellialike scheme. It is then proved that five-round Camellia-like scheme is pseudorandom and eight-round Camellia-like scheme is super-pseudorandom for adaptive adversaries. Further the paper considers more efficient construction of Camellia-like scheme, and discusses how to construct pseudorandom Camellia-like scheme from less random functions.

  1. Modification of QUICK scheme by skew points

    Energy Technology Data Exchange (ETDEWEB)

    Mirzaei, M.; Mohammadi, R.; Malekzadeh, M. [K.N. Toosi Univ. of Technology, Aerospace Engineering Dept., Tehran (Iran, Islamic Republic of)]. E-mail: Mirzaei@kntu.ac.ir

    2005-07-01

    This paper presents a new method for convective flux approximation based on inclusions of skew points. The scheme uses the truncated terms of QUICK scheme and with the aid of an equation extracted from momentum equations, the skew points will appear in the convective flux formula. The results show that the presented scheme has better accuracy than the other schemes. Diffusion fluxes are approximated using power law scheme and for evaluation of the performance of the presented method several test cases were carried out and the results are compared with the results of other numerical works and experimental data. (author)

  2. A Provably Secure Asynchronous Proactive RSA Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Rui-shan; LI Qiang; CHEN Ke-fei

    2005-01-01

    The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the se curity definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol,signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.

  3. Hash function based secret sharing scheme designs

    CERN Document Server

    Chum, Chi Sing

    2011-01-01

    Secret sharing schemes create an effective method to safeguard a secret by dividing it among several participants. By using hash functions and the herding hashes technique, we first set up a (t+1, n) threshold scheme which is perfect and ideal, and then extend it to schemes for any general access structure. The schemes can be further set up as proactive or verifiable if necessary. The setup and recovery of the secret is efficient due to the fast calculation of the hash function. The proposed scheme is flexible because of the use of existing hash functions.

  4. A New Signature Scheme with Shared Verification

    Institute of Scientific and Technical Information of China (English)

    JIA Xiao-yun; LUO Shou-shan; YUAN Chao-wei

    2006-01-01

    With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digital signature scheme vith shared verification based on the fiat-shamir signature scheme. This scheme is suitable not only for digital signatures of one public key, but also for situations where multiple public keys are required. In addition, the scheme can resist all kinds of collusion, making it more practicable and safer. Additionally it is more efficient than other schemes.

  5. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  6. Nonrepudiable Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    LI JiGuo(李继国); CAO ZhenFu(曹珍富); ZHANG YiChen(张亦辰)

    2003-01-01

    The concept of proxy signature introduced by Mambo, Usuda, and Okamotoallows a designated person, called a proxy signer, to sign on behalf of an original signer. However,most existing proxy signature schemes do not support nonrepudiation. In this paper, two securenonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of theexisting schemes. The proposed schemes can withstand public key substitution attack. In addition,the new schemes have some other advantages such as proxy signature key generation and updatingusing insecure channels. This approach can also be applied to other ElGamal-like proxy signatureschemes.

  7. Heritable Disorders of Connective Tissue

    Science.gov (United States)

    ... Connective Tissue Find a Clinical Trial Journal Articles Connective Tissue August 2016 Questions and Answers about Heritable Disorders of Connective Tissue This publication contains general information about heritable (genetic) ...

  8. Algebraic connectivity and graph robustness.

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John Todd; Byrne, Raymond Harry; Abdallah, Chaouki T. (University of New Mexico)

    2009-07-01

    Recent papers have used Fiedler's definition of algebraic connectivity to show that network robustness, as measured by node-connectivity and edge-connectivity, can be increased by increasing the algebraic connectivity of the network. By the definition of algebraic connectivity, the second smallest eigenvalue of the graph Laplacian is a lower bound on the node-connectivity. In this paper we show that for circular random lattice graphs and mesh graphs algebraic connectivity is a conservative lower bound, and that increases in algebraic connectivity actually correspond to a decrease in node-connectivity. This means that the networks are actually less robust with respect to node-connectivity as the algebraic connectivity increases. However, an increase in algebraic connectivity seems to correlate well with a decrease in the characteristic path length of these networks - which would result in quicker communication through the network. Applications of these results are then discussed for perimeter security.

  9. Linear connections on matrix geometries

    CERN Document Server

    Madore, J; Mourad, J; Madore, John; Masson, Thierry; Mourad, Jihad

    1994-01-01

    A general definition of a linear connection in noncommutative geometry has been recently proposed. Two examples are given of linear connections in noncommutative geometries which are based on matrix algebras. They both possess a unique metric connection.

  10. Signal processing unit

    Energy Technology Data Exchange (ETDEWEB)

    Boswell, J.

    1983-01-01

    The architecture of the signal processing unit (SPU) comprises an ROM connected to a program bus, and an input-output bus connected to a data bus and register through a pipeline multiplier accumulator (pmac) and a pipeline arithmetic logic unit (palu), each associated with a random access memory (ram1,2). The system pulse frequency is from 20 mhz. The pmac is further detailed, and has a capability of 20 mega operations per second. There is also a block diagram for the palu, showing interconnections between the register block (rbl), separator for bus (bs), register (reg), shifter (sh) and combination unit. The first and second rams have formats 64*16 and 32*32 bits, respectively. Further data are a 5-v power supply and 2.5 micron n-channel silicon gate mos technology with about 50000 transistors.

  11. A MAXIMUM POWER POINT TRACKING SCHEME FOR A 1kW ...

    African Journals Online (AJOL)

    user

    of energy have made PV systems suitable for energy ... electricity sector, with improved generation and stable .... Resistance Rsh in parallel with the diode. .... connected in series with an output resistance (rg) around ..... scheme for thermoelectric battery energy storage ... Stand-Alone Solar Energy Supply Performance for.

  12. Generalizations of generating functions for higher continuous hypergeometric orthogonal polynomials in the Askey scheme

    OpenAIRE

    2014-01-01

    We use connection relations and series rearrangement to generalize generating functions for several higher continuous orthogonal polynomials in the Askey scheme, namely the Wilson, continuous dual Hahn, continuous Hahn, and Meixner-Pollaczek polynomials. We also determine corresponding definite integrals using the orthogonality relations for these polynomials.

  13. Hybrid Transmission Scheme for MIMO Relay Channels

    Directory of Open Access Journals (Sweden)

    Guangming Xu

    2009-11-01

    Full Text Available To improve the achievable rate for the MIMO channels, we propose a hybrid transmission (HT scheme that mixes half-duplex decode-and-forward cooperative relaying transmission (DFRH)with direct transmission (DT. In the HT scheme, the source message is divided into two parts: one is transmitted by DFRH scheme and another is transmitted by DT scheme. Precoding and decoding are considered to convert the original MIMO relay channel into several parallel subchannels so that resource allocation can be easily performed. We focus on the spatial subchannel and power allocation problem. The objective of this problem is to maximize the total achievable rate under the constraints of joint total transmission power. Simulation results show that significant capacity gain can be achieved by the HT scheme compared to the DT scheme and the pure DFRH scheme.

  14. High-Order Energy Stable WENO Schemes

    Science.gov (United States)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  15. Connectable solar air collectors

    Energy Technology Data Exchange (ETDEWEB)

    Oestergaard Jensen, S.; Bosanac, M.

    2002-02-01

    The project has proved that it is possible to manufacture solar air collector panels, which in an easy way can be connected into large collector arrays with integrated ducting without loss of efficiency. The developed connectable solar air collectors are based on the use of matrix absorbers in the form of perforated metal sheets. Three interconnected solar air collectors of the above type - each with an transparent area of approx. 3 m{sup 2} - was tested and compared with parallel tests on two single solar air collectors also with a transparent area of approx. 3 m{sup 2} One of the single solar air collectors has an identical absorber as the connectable solar air collectors while the absorber of the other single solar air collector was a fibre cloth. The efficiency of the three solar air collectors proved to be almost identical in the investigated range of mass flow rates and temperature differences. The solar air collectors further proved to be very efficient - as efficient as the second most efficient solar air collectors tested in the IEA task 19 project Solar Air Systems. Some problems remain although to be solved: the pressure drop across especially the connectable solar air collectors is too high - mainly across the inlets of the solar air collectors. It should, however, be possible to considerably reduce the pressure losses with a more aerodynamic design of the inlet and outlet of the solar air collectors; The connectable solar air collectors are easy connectable but the air tightness of the connections in the present form is not good enough. As leakage leads to lower efficiencies focus should be put on making the connections more air tight without loosing the easiness in connecting the solar air collectors. As a spin off of the project a simple and easy way to determine the efficiency of solar, air collectors for pre-heating of fresh air has been validated. The simple method of determining the efficiency has with success been compared with an advance method

  16. Coordinated Control Scheme for Ancillary Services from Offshore Wind Power Plants to AC and DC Grids

    DEFF Research Database (Denmark)

    Sakamuri, Jayachandra N.; Altin, Müfit; Hansen, Anca Daniela;

    2016-01-01

    This paper proposes a new approach of providing ancillary services to AC and DC grids from offshore wind power plants (OWPPs), connected through multi-terminal HVDC network. A coordinated control scheme where OWPP’s AC grid frequency modulated according to DC grid voltage variations is used...... to detect and provide the ancillary service requirements of both AC and DC grids, is proposed in this paper. In particular, control strategies for onshore frequency control, fault ridethrough support in the onshore grid, and DC grid voltage control are considered. The proposed control scheme involves only...... local measurements and therefore avoids the need of communication infrastructure otherwise required for communication based control, and thus increases the reliability of the control system. The effectiveness of the proposed control scheme is demonstrated on a MTDC connected wind power system developed...

  17. The CONNECT project

    DEFF Research Database (Denmark)

    Assaf, Yaniv; Alexander, Daniel C; Jones, Derek K

    2013-01-01

    diameter and axonal density). This unique insight into both tissue microstructure and connectivity has enormous potential value in understanding the structure and organization of the brain as well as providing unique insights to abnormalities that underpin disease states. The CONNECT (Consortium......In recent years, diffusion MRI has become an extremely important tool for studying the morphology of living brain tissue, as it provides unique insights into both its macrostructure and microstructure. Recent applications of diffusion MRI aimed to characterize the structural connectome using...... tractography to infer connectivity between brain regions. In parallel to the development of tractography, additional diffusion MRI based frameworks (CHARMED, AxCaliber, ActiveAx) were developed enabling the extraction of a multitude of micro-structural parameters (axon diameter distribution, mean axonal...

  18. Skeletal muscle connective tissue

    DEFF Research Database (Denmark)

    Brüggemann, Dagmar Adeline

      The connective tissue content of skeletal muscle is believed to be the major factor responsible for defining the eating quality of different meat cuts, although attempts to correlate quantifications based on traditional histological methods have not as yet been able to prove this relation....... Collagen, being the major protein in connective tissue, has been extensively investigated with regard to its relation to meat tenderness, but the results have been rather conflicting. Meat from older animals is tougher than that from younger animals, and changes in the properties of the collagen due...... that collagen plays a significant role in determining the tenderness of meat. What are we missing? Therefore, fundamental aspects of connective tissue research have been the centre of attention throughout this thesis. A holistic view has been applied, glancing at this complex tissue which has many facets...

  19. Connectivity and superconductivity

    CERN Document Server

    Rubinstein, Jacob

    2000-01-01

    The motto of connectivity and superconductivity is that the solutions of the Ginzburg--Landau equations are qualitatively influenced by the topology of the boundaries, as in multiply-connected samples. Special attention is paid to the "zero set", the set of the positions (also known as "quantum vortices") where the order parameter vanishes. The effects considered here usually become important in the regime where the coherence length is of the order of the dimensions of the sample. It takes the intuition of physicists and the awareness of mathematicians to find these new effects. In connectivity and superconductivity, theoretical and experimental physicists are brought together with pure and applied mathematicians to review these surprising results. This volume is intended to serve as a reference book for graduate students and researchers in physics or mathematics interested in superconductivity, or in the Schrödinger equation as a limiting case of the Ginzburg--Landau equations.

  20. THE IMPACTS OF PRICING SCHEMES ON DECENTRALIZED ASSEMBLY SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Li JIANG

    2008-01-01

    We study an assembly system where one assembler produces a final product to satisfy the price sensitive and uncertain demands.One unit of final product needs inputs from n complementary components each provided from a distinct supplier.The assembler orders from the suppliers and their relationships are governed by price-only contracts.The assembler practices two alternative pricing schemes:a fixed pricing scheme by which she fixes a retail price in all market situations.and a responsive pricing scheme by which she adjusts retail prices after observing actual demand curves.We find that,when the assembler practices the two pricing schemes,the suppliers charge the same wholesale prices,channel profit is allocated among the firms according to the same proportions,and the relative performances of the system under decentralized decision makings with respect to those under centralized decision makings are the same.Furthermore,responsive pricing improves the assembler's absolute performance,and the gains pass over to the suppliers in terms of higher profits and to the customers in terms of enhanced product availability and lowered market price.

  1. Image-restoration algorithms for a fully connected architecture.

    Science.gov (United States)

    Abbiss, J B; Brames, B J; Byrne, C L; Fiddy, M A

    1990-06-15

    We describe the implementation of a technique for achieving image superresolution using a fully connected network of simple processors operating in an iterative mode. We show that an updating scheme can be specified that ensures convergence for the serial (asynchronous) updating case. With the appropriate hardware, parallel (synchronous) updating becomes of particular interest because of the potential for accelerated convergence; it is this approach that we envisage implementing in optical hardware. For this case also, we present a convergent scheme that can be related to a regularized form of the Gerchberg-Papoulis algorithm.

  2. Best connected rectangular arrangements

    Directory of Open Access Journals (Sweden)

    Krishnendra Shekhawat

    2016-03-01

    Full Text Available It can be found quite often in the literature that many well-known architects have employed either the golden rectangle or the Fibonacci rectangle in their works. On contrary, it is rare to find any specific reason for using them so often. Recently, Shekhawat (2015 proved that the golden rectangle and the Fibonacci rectangle are one of the best connected rectangular arrangements and this may be one of the reasons for their high presence in architectural designs. In this work we present an algorithm that generates n-4 best connected rectangular arrangements so that the proposed solutions can be further used by architects for their designs.

  3. Scheme of thinking quantum systems

    CERN Document Server

    Yukalov, V I

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  4. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  5. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  6. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  7. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...

  8. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  9. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...

  10. Improvement of Some Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    LIJiguo; LIANGZhenghe; ZHUYuelong; HANGYichen

    2005-01-01

    In 1996, Mambo et al. introduced the concept of proxy signature. Proxy signature can be applied to mobile agent, e-vote etc. Recently, Sun and Hsieh showed that Lee et al's strong proxy signature scheme and its application to multi-proxy signature scheme, Shum and Wei's privacy-protected strong proxy signature scheme, and Park and Lee's nominative proxy signature scheme were all insecure against the original signer's forgery attack. In this paper, we show those proxy signature schemes don't withstand public key substitution attack and give some slight but important modifications for those proxy signature schemes such that the resulting schemes are secure against the original signer's forgery attack and public key substitution attack. In addition, we show that Park and Lee's nominative proxy signature scheme don't satisfy strong nonrepudiation and strong identifiability. Improved schemes satisfy all properties of strong proxy signature scheme, and doesn't use secure channel between the original signer and the proxy signer.

  11. Evaluation of frame aggregation schemes for the p-persistent based next generation WLANS

    Science.gov (United States)

    Ahmad, Ashar; Anna, Kiran; Bassiouni, Mostafa A.

    2010-04-01

    The next Generation IEEE 802.11n is designed to improve the throughput of the existing standard 802.11. It aims to achieve this by increasing the data rate from 54 Mbps to 600 Mbps with the help of physical layer enhancements. Therefore, the Medium Access Layer (MAC) requires improvements to fully utilize the capabilities of the enhanced 802.11n physical layer. In this paper, we present the performance evaluation results of two frame aggregation schemes viz., MAC Protocol Data Unit Aggregation (A-MPDU) and MAC Service Data Unit Aggregation (A-MSDU) and study their performance impact when the two schemes are incorporated in a p-persistent based 802.11n. The simulation results have shown that the two schemes achieve consistent performance improvement over the standard non-aggregation scheme.

  12. A Novel Protection Scheme against Fault Resistance for AC Microgrid

    Directory of Open Access Journals (Sweden)

    Xinrui Liu

    2017-01-01

    Full Text Available The faults characteristics of the lines in AC microgrid are weakened due to the fault resistance, which may refuse protection action. To solve the problems caused by different types of the faults through fault resistance (FTFR, the faults where the fault point resistance is greater than zero in AC microgrid, a novel FTFR protection scheme based on the active power of 0-frame component or d-frame component consumed by fault resistance is proposed in this paper as the backup protection of FTFR. This proposed protection scheme utilizes the active power of 0-frame component or d-frame component consumed by fault resistance to identify internal FTFR and external faults. It performs well in grid-connected mode and islanded mode by adopting self-adaptive threshold and is not affected by the factors such as the fault position and the fault resistance value. The theoretical analysis and various simulations show that this protection scheme can identify and isolate different types of internal FTFR in AC microgrid with high reliability and high sensitivity.

  13. Children's schemes for anticipating the validity of nets for solids

    Science.gov (United States)

    Wright, Vince; Smith, Ken

    2017-06-01

    There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's (Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.

  14. Children's schemes for anticipating the validity of nets for solids

    Science.gov (United States)

    Wright, Vince; Smith, Ken

    2017-09-01

    There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's ( Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.

  15. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    , and receipt of their authentication request at the same time. Therefore, secure, and efficient group authentication, and authorization scheme is required that authenticates a group of devices at once in the context of resource constrained IoT. This paper presents novel Threshold Cryptography-based Group...... Authentication (TCGA) scheme for the IoT which verifies authenticity of all the devices taking part in the group communication. This paper also presents TCGA framework which is flexible and secure. The proposed TCGA scheme is implemented for WI-FI environment, and the result shows that TCGA scheme is lightweight......Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  16. A Coordination Scheme for Distributed Model Predictive Control: Integration of Flexible DERs

    DEFF Research Database (Denmark)

    Costanzo, Giuseppe Tommaso; Gehrke, Oliver; Bondy, Daniel Esteban Morales

    2013-01-01

    between the grid and a cluster of units in the same feeder in pricedriven demand response applications. Preliminary simulations prove that the proposed coordination scheme for DMPC succeeds in coordinating flexible DER unit, achieving significant peak shaving when required. The rationale of this approach...... consists in coordinating independent units equipped with local MPC controller via simple information passing and hiding in the local controllers the units’ dynamics....

  17. Natural connections given by general linear and classical connections

    OpenAIRE

    Janyška, Josef

    2004-01-01

    We assume a vector bundle $p: E\\to M$ with a general linear connection $K$ and a classical linear connection $\\Lam$ on $M$. We prove that all classical linear connections on the total space $E$ naturally given by $(\\Lam, K)$ form a 15-parameter family. Further we prove that all connections on $J^1 E$ naturally given by $(\\Lam, K)$ form a 14-parameter family. Both families of connections are described geometrically.

  18. The connected brain

    NARCIS (Netherlands)

    van den Heuvel, M.P.

    2009-01-01

    The connected brain Martijn van den Heuvel, 2009 Our brain is a network. It is a network of different brain regions that are all functionally and structurally linked to each other. In the past decades, neuroimaging studies have provided a lot of information about the specific functions of each separ

  19. Preschool Connected Speech Inventory.

    Science.gov (United States)

    DiJohnson, Albert; And Others

    This speech inventory developed for a study of aurally handicapped preschool children (see TM 001 129) provides information on intonation patterns in connected speech. The inventory consists of a list of phrases and simple sentences accompanied by pictorial clues. The test is individually administered by a teacher-examiner who presents the spoken…

  20. 18.CONNECTIVE TISSUE DISORDER

    Institute of Scientific and Technical Information of China (English)

    1993-01-01

    930734 Measurement of serum soluble interleukin—2 receptor in connective tissue diseases.CAI Houronget al.Dept Intern Med,Affili Gulou Hosp,Med School,Nanjing Univ,Nanjing,210008,ShanghaiJ Immunol 1993;13(4):216—218December 1993 Vol 10 No 4

  1. Clip, connect, clone

    DEFF Research Database (Denmark)

    Fujima, Jun; Lunzer, Aran; Hornbæk, Kasper

    2010-01-01

    using three mechanisms: clipping of input and result elements from existing applications to form cells on a spreadsheet; connecting these cells using formulas, thus enabling result transfer between applications; and cloning cells so that multiple requests can be handled side by side. We demonstrate...

  2. Revisiting city connectivity

    NARCIS (Netherlands)

    Mans, U.

    2014-01-01

    This article introduces a new perspective on city connectivity in order to analyze non-hub cities and their position in the world economy. The author revisits the different approaches discussed in the Global Commodity Chains (GCC), Global Production Networks (GPN) and World City Network (WCN) discou

  3. Wireless Connectivity and Capacity

    CERN Document Server

    Halldorsson, Magnus M

    2011-01-01

    Given $n$ wireless transceivers located in a plane, a fundamental problem in wireless communications is to construct a strongly connected digraph on them such that the constituent links can be scheduled in fewest possible time slots, assuming the SINR model of interference. In this paper, we provide an algorithm that connects an arbitrary point set in $O(\\log n)$ slots, improving on the previous best bound of $O(\\log^2 n)$ due to Moscibroda. This is complemented with a super-constant lower bound on our approach to connectivity. An important feature is that the algorithms allow for bi-directional (half-duplex) communication. One implication of this result is an improved bound of $\\Omega(1/\\log n)$ on the worst-case capacity of wireless networks, matching the best bound known for the extensively studied average-case. We explore the utility of oblivious power assignments, and show that essentially all such assignments result in a worst case bound of $\\Omega(n)$ slots for connectivity. This rules out a recent cla...

  4. Connecting with Your Audience.

    Science.gov (United States)

    Mamchur, Carolyn

    1989-01-01

    A workshop model on presentation skills for teachers in the classroom is presented. The goals and techniques would apply to many teaching situations in the college classroom, as well as lectures and symposium presentations. Making a personal connection, focusing on audience, and empowering the audience are discussed. (MLW)

  5. Connecting Competing Memories

    NARCIS (Netherlands)

    Laarse, van der R.; Saloul, I.A.M.

    Research Expert Meeting: Connecting Competing Memories of War in Contemporary Europe5 March 2014NIAS hosts, 6 - 7 March, the expert meeting of the Consortium for 'The Cultural Heritage of War in Contemporary Europe'. The aim is to draft main themes and discuss financial and research structures regar

  6. Technology and Internet Connections.

    Science.gov (United States)

    Allen, Denise; Lindroth, Linda

    1996-01-01

    Suggests that teachers can use computer software and Internet connections to enhance curriculum and capitalize student's natural interest in sports and sports figures. Provides a list of activities that students can do in relation to the Olympic games and gives information on how technology can assist in such activities. Appropriate Internet…

  7. The Anansi Connection.

    Science.gov (United States)

    Carger, Chris Liska

    1998-01-01

    Describes a teacher educator's efforts to connect children's literature, sponsored by a partnership between Northern Illinois University and Chicago Public Schools. In one project, student teachers used award-winning picture books to inspire African-American eighth graders to create pastels on black paper. In another, regional folk tales inspired…

  8. Preschool Connected Speech Inventory.

    Science.gov (United States)

    DiJohnson, Albert; And Others

    This speech inventory developed for a study of aurally handicapped preschool children (see TM 001 129) provides information on intonation patterns in connected speech. The inventory consists of a list of phrases and simple sentences accompanied by pictorial clues. The test is individually administered by a teacher-examiner who presents the spoken…

  9. Strengthening connections: functional connectivity and brain plasticity.

    Science.gov (United States)

    Kelly, Clare; Castellanos, F Xavier

    2014-03-01

    The ascendancy of functional neuroimaging has facilitated the addition of network-based approaches to the neuropsychologist's toolbox for evaluating the sequelae of brain insult. In particular, intrinsic functional connectivity (iFC) mapping of resting state fMRI (R-fMRI) data constitutes an ideal approach to measuring macro-scale networks in the human brain. Beyond the value of iFC mapping for charting how the functional topography of the brain is altered by insult and injury, iFC analyses can provide insights into experience-dependent plasticity at the macro level of large-scale functional networks. Such insights are foundational to the design of training and remediation interventions that will best facilitate recovery of function. In this review, we consider what is currently known about the origin and function of iFC in the brain, and how this knowledge is informative in neuropsychological settings. We then summarize studies that have examined experience-driven plasticity of iFC in healthy control participants, and frame these findings in terms of a schema that may aid in the interpretation of results and the generation of hypotheses for rehabilitative studies. Finally, we outline some caveats to the R-fMRI approach, as well as some current developments that are likely to bolster the utility of the iFC paradigm for neuropsychology.

  10. Rapid Parameterization Schemes for Aircraft Shape Optimization

    Science.gov (United States)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  11. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  12. A Signature Scheme with Non-Repudiation

    Institute of Scientific and Technical Information of China (English)

    XIN Xiangjun; GUO Xiaoli; XIAO Guozhen

    2006-01-01

    Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.

  13. On contravariant product conjugate connections

    Directory of Open Access Journals (Sweden)

    A. M. Blaga

    2012-02-01

    Full Text Available Invariance properties for the covariant and contravariant connections on a Riemannian manifold with respect to an almost product structure are stated. Restricting to a distribution of the contravariant connections is also discussed. The particular case of the conjugate connection is investigated and properties of the extended structural and virtual tensors for the contravariant connections are given.

  14. Intel Xeon Phi accelerated Weather Research and Forecasting (WRF Goddard microphysics scheme

    Directory of Open Access Journals (Sweden)

    J. Mielikainen

    2014-12-01

    Full Text Available The Weather Research and Forecasting (WRF model is a numerical weather prediction system designed to serve both atmospheric research and operational forecasting needs. The WRF development is a done in collaboration around the globe. Furthermore, the WRF is used by academic atmospheric scientists, weather forecasters at the operational centers and so on. The WRF contains several physics components. The most time consuming one is the microphysics. One microphysics scheme is the Goddard cloud microphysics scheme. It is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF model. The Goddard microphysics scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Goddard scheme incorporates a large number of improvements. Thus, we have optimized the Goddard scheme code. In this paper, we present our results of optimizing the Goddard microphysics scheme on Intel Many Integrated Core Architecture (MIC hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The Intel MIC is capable of executing a full operating system and entire programs rather than just kernels as the GPU does. The MIC coprocessor supports all important Intel development tools. Thus, the development environment is one familiar to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discussed in this paper. The results show that the optimizations improved performance of Goddard microphysics scheme on Xeon Phi 7120P by a factor of 4.7×. In addition, the optimizations reduced the Goddard microphysics scheme's share of the total WRF processing time from 20.0 to 7.5%. Furthermore, the same

  15. Constructing an Urban Population Model for Medical Insurance Scheme Using Microsimulation Techniques

    Directory of Open Access Journals (Sweden)

    Linping Xiong

    2012-01-01

    Full Text Available China launched a pilot project of medical insurance reform in 79 cities in 2007 to cover urban nonworking residents. An urban population model was created in this paper for China’s medical insurance scheme using microsimulation model techniques. The model made it clear for the policy makers the population distributions of different groups of people, the potential urban residents entering the medical insurance scheme. The income trends of units of individuals and families were also obtained. These factors are essential in making the challenging policy decisions when considering to balance the long-term financial sustainability of the medical insurance scheme.

  16. Constructing an urban population model for medical insurance scheme using microsimulation techniques.

    Science.gov (United States)

    Xiong, Linping; Zhang, Lulu; Tang, Weidong; Ma, Yuqin

    2012-01-01

    China launched a pilot project of medical insurance reform in 79 cities in 2007 to cover urban nonworking residents. An urban population model was created in this paper for China's medical insurance scheme using microsimulation model techniques. The model made it clear for the policy makers the population distributions of different groups of people, the potential urban residents entering the medical insurance scheme. The income trends of units of individuals and families were also obtained. These factors are essential in making the challenging policy decisions when considering to balance the long-term financial sustainability of the medical insurance scheme.

  17. Economic scheme for remote preparation of an arbitrary five-qubit Brown-type state

    Indian Academy of Sciences (India)

    Chen Hua-Bao; Fu Hau; Li Xiao-Wei; Ma Peng-Cheng; Zhan You-Bang

    2016-04-01

    A scheme for remotely preparing an arbitrary five-qubit Brown state by using three three-qubit GHZ states as the quantum channel is proposed. It is shown that, after the sender performs two different three-qubit projective measurements, the receiver should introduce two auxiliary qubits and employ suitable C-NOT gates, Toffoli gate and unitary operations on his qubits, theoriginal state can be recovered with unit probability. Compared with the previous scheme, the advantage of the present scheme is that the entanglement resource can be reduced.

  18. GPGPU for orbital function evaluation with a new updating scheme.

    Science.gov (United States)

    Uejima, Yutaka; Maezono, Ryo

    2013-01-15

    We have accelerated an ab initio quantum Monte Carlo electronic structure calculation using general purpose computing on graphical processing units (GPGPU). The part of the code causing the bottleneck for extended systems is replaced by Compute Unified Device Architecture-GPGPU subroutine kernels which build up spline basis set expansions of electronic orbital functions at each Monte Carlo step. We have achieved a speedup of a factor of 30 for the bottleneck for a simulation of solid TiO(2) with 1536 electrons. To improve the performance with GPGPU we propose a new updating scheme for Monte Carlo sampling, quasi-simultaneous updating, which is intermediate between configuration-by-configuration updating and the widely used particle-by-particle updating. The error in the energy due to by the single precision treatment and the new updating scheme is found to be within the required accuracy of ~10(-3) hartree per primitive cell.

  19. Multi-object quantum traveling ballot scheme

    Institute of Scientific and Technical Information of China (English)

    Yuan Li; Guihua Zeng

    2009-01-01

    Based on quantum mechanics, a traveling ballot scheme with anonymity and secrecy is introduced to realize voting. By searching the objects in large amount of data bases, every voter may cast votes to his desired candidates. Therefore, the proposed scheme may be applied to voting with a great deal of candidates, such as network voting and so on. The security analysis of the present scheme is also performed.

  20. SYNCHRONIZATION RECOVERY SCHEME IN WATERMARKING DETECTION

    Institute of Scientific and Technical Information of China (English)

    Xiao Weiwei; Zhang Li; Ji Zhen; Zhang Jihong

    2003-01-01

    Most proposed digital watermarking algorithms are sensitive to geometric attacksbecause the synchronization information of watermark embedding and detection is destroyed. Inthis letter a novel synchronization recovery scheme based on image normalization is proposed. Thepresented scheme does not require the original image and can be applied to various watermarksystems. A wavelet-based watermarking scheme is proposed as an example and experimentalresults show that it is robust to geometric attacks.

  1. Blind Signature Scheme Based on Chebyshev Polynomials

    Directory of Open Access Journals (Sweden)

    Maheswara Rao Valluri

    2011-12-01

    Full Text Available A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  2. Blind Signature Scheme Based on Chebyshev Polynomials

    OpenAIRE

    Maheswara Rao Valluri

    2011-01-01

    A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  3. Pyramid Schemes on the Tibetan Plateau

    OpenAIRE

    Devin Gonier; Rgyal yum sgrol ma

    2012-01-01

    The unique features of pyramid schemes and certain underlying causes for their development on the Tibetan Plateau are analyzed. Research was conducted by analyzing 521 surveys, allowing estimation of pyramid scheme activity on the Plateau and an identification of related cultural and social specificities. Firsthand accounts were collected revealing details of personal involvement. Survey data and similarities in the accounts were studied to suggest how involvement in pyramid schemes might be ...

  4. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  5. Signcryption scheme based on schnorr digital signature

    CERN Document Server

    Savu, Laura

    2012-01-01

    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.

  6. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  7. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  8. General Compact Labeling Schemes for Dynamic Trees

    OpenAIRE

    2006-01-01

    Let $F$ be a function on pairs of vertices. An {\\em $F$- labeling scheme} is composed of a {\\em marker} algorithm for labeling the vertices of a graph with short labels, coupled with a {\\em decoder} algorithm allowing one to compute $F(u,v)$ of any two vertices $u$ and $v$ directly from their labels. As applications for labeling schemes concern mainly large and dynamically changing networks, it is of interest to study {\\em distributed dynamic} labeling schemes. This paper investigates labelin...

  9. Design of Current-Controller with PR-regulator for LCL-Filter Based Grid-Connected Converter

    DEFF Research Database (Denmark)

    Zeng, Guohong; Rasmussen, Tonny Wederberg

    2010-01-01

    In the application of LCL-filter based converters, the structure and parameters of current-controller is very important for the system stability and output current quality. This paper presents a filter-capacitor current feedback control scheme for grid-connected converter. The controller...... is consisted of a proportional-resonance regulator and a proportional regulator. Unlike the existing control strategy with unit capacitor current feedback, the proposed method applies the proportional regulator to the feedback path, which can decouple these two regulators, and simplify the tuning process....... Controller parameters are tuned with the aid of root-locus of system close-loop transfer function, which can provide better grasp of the influence of individual parameters and make the design process visible and holistic without any simplification and assumption. The validity, reasonability and feasibility...

  10. Money Laundering Detection Framework to Link the Disparate and Evolving Schemes

    Directory of Open Access Journals (Sweden)

    Murad Mehmet

    2013-09-01

    Full Text Available Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing to detect money laundering. Our framework captures an ongoing single scheme as an event, and associations among such ongoing sequence of events to capture complex relationships among evolving money laundering schemes. The framework can detect associated multiple money laundering networks even in the absence of some evidence. We validated the accuracy of detecting evolving money laundering schemes using a multi-phases test methodology. Our test used data generated from real-life cases, and extrapolated to generate more data from real-life schemes generator that we implemented.

  11. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  12. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  13. Efficient Certificateless Signcryption Scheme from Weil Pairing

    Directory of Open Access Journals (Sweden)

    Gang Yu

    2011-08-01

    Full Text Available Certificateless signcryption has both the advantage of certificateless public key cryptography, which overcome the escrow problem inherited from identity based cryptography without the use of certificates as in traditional public key cryptography, and signcryption which can fulfill both the functions of signature and encryption in a logical signal step. In this paper, we explicit the security model for certificateless signcryption and propose an efficient certificateless signcryption scheme from Weil pairings. The new scheme not only can be proved to be secure in our model but also can simultaneously provide public verifiability and forward security. Furthermore, compared with existing schemes, the new scheme is more efficient.

  14. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......, where we examine the finite-sample properties of an estimator of the roughness parameter of a Brownian semistationary process and study Monte Carlo option pricing in the rough Bergomi model of Bayer et al. (2015), respectively....

  15. An Improved Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    GU Li-ze; ZHANG Sheng; YANG Yi-xian

    2005-01-01

    Based on the Kim-like's proxy multi-signature scheme[1],an improved proxy multi-signature scheme is proposed.The new scheme overcomes the two problems in the Kim-like's proxy multi-signature scheme:(1)Security issue(every original signer can forge a valid proxy multi-signature for any message);(2)Efficiency issue(both the size of the proxy multi-signature and the efficiency of signature checking are dependent on the number of the original signers).

  16. Connecting Pills and People

    DEFF Research Database (Denmark)

    Seeberg, Jens

    2012-01-01

    Objectives: This article explores the impact of intensive competition within the pharmaceutical industry and among private providers on health care in an Indian city. Methods: In-depth interviewing and clinical observation were used over a period of 18 months. Private practitioners and chemists, ...... services are urgently needed and a planned health insurance scheme should be linked to quality control measures......., who provided regular services to inhabitants of a poor neighborhood in central Bhubaneswar, were included. Results: Fierce competition in private health in Odisha, India, reduced quality of care for the poor. The pharmaceutical industry exploited weak links in the health system to push drugs...

  17. An improved molecular connectivity index

    Institute of Scientific and Technical Information of China (English)

    李新华; 俞庆森; 朱龙观

    2000-01-01

    Through modification of the delta values of the molecular connectivity indexes, and connecting the quantum chemistry with topology method effectively, the molecular connectivity indexes are converted into quantum-topology indexes. The modified indexes not only keep all information obtained from the original molecular connectivity method but also have their own virtue in application, and at the same time make up some disadvantages of the quantum and molecular connectivity methods.

  18. DSRC versus 4G-LTE for Connected Vehicle Applications: A Study on Field Experiments of Vehicular Communication Performance

    Directory of Open Access Journals (Sweden)

    Zhigang Xu

    2017-01-01

    Full Text Available Dedicated short-range communication (DSRC and 4G-LTE are two widely used candidate schemes for Connected Vehicle (CV applications. It is thus of great necessity to compare these two most viable communication standards and clarify which one can meet the requirements of most V2X scenarios with respect to road safety, traffic efficiency, and infotainment. To the best of our knowledge, almost all the existing studies on comparing the feasibility of DRSC or LTE in V2X applications use software-based simulations, which may not represent realistic constraints. In this paper, a Connected Vehicle test-bed is established, which integrates the DSRC roadside units, 4G-LTE cellular communication stations, and vehicular on-board terminals. Three Connected Vehicle application scenarios are set as Collision Avoidance, Traffic Text Message Broadcast, and Multimedia File Download, respectively. A software tool is developed to record GPS positions/velocities of the test vehicles and record certain wireless communication performance indicators. The experiments have been carried out under different conditions. According to our results, 4G-LTE is more preferred for the nonsafety applications, such as traffic information transmission, file download, or Internet accessing, which does not necessarily require the high-speed real-time communication, while for the safety applications, such as Collision Avoidance or electronic traffic sign, DSRC outperforms the 4G-LTE.

  19. Connection Cryostats for LHC Dispersion Suppressors

    CERN Document Server

    Marque, S; Genet, M; Skoczen, B

    2004-01-01

    The lattice of the Large Hadron Collider (LHC) being built at CERN is based on 8 standard arcs of 2.5 km length. Each arc is bounded on either side by Dispersion Suppressors connected to the arc by connection cryostats providing 15m long drift spaces. As for a dipole magnet, the connection cryostat provides a continuity of beam and insulation vacuum, electrical powering, cryogenic circuits, thermal and radiation shielding. In total 16 modules will be constructed. The stringent functional specification has led to various design options. Among them, a light mechanical structure has been developed with a stiffness comparable to that of a dipole magnet, for alignment purpose. Thermal studies, including lambda front propagation, have been performed to ensure a cooling down time to 1.9 K within the time budget. A special cooling scheme around the beam tubes has been chosen to cope with heat loads produced during operation. We report on the general design of these modules and on the adopted manufacturing process whi...

  20. Novel coupling scheme to control dynamics of coupled discrete systems

    Science.gov (United States)

    Shekatkar, Snehal M.; Ambika, G.

    2015-08-01

    We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.

  1. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-04-09

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes.

  2. Spectrum-efficient multipath provisioning with content connectivity for the survivability of elastic optical datacenter networks

    Science.gov (United States)

    Gao, Tao; Li, Xin; Guo, Bingli; Yin, Shan; Li, Wenzhe; Huang, Shanguo

    2017-07-01

    Multipath provisioning is a survivable and resource efficient solution against increasing link failures caused by natural or man-made disasters in elastic optical datacenter networks (EODNs). Nevertheless, the conventional multipath provisioning scheme is designed only for connecting a specific node pair. Also, it is obvious that the number of node-disjoint paths between any two nodes is restricted to network connectivity, which has a fixed value for a given topology. Recently, the concept of content connectivity in EODNs has been proposed, which guarantees that a user can be served by any datacenter hosting the required content regardless of where it is located. From this new perspective, we propose a survivable multipath provisioning with content connectivity (MPCC) scheme, which is expected to improve the spectrum efficiency and the whole system survivability. We formulate the MPCC scheme with Integer Linear Program (ILP) in static traffic scenario and a heuristic approach is proposed for dynamic traffic scenario. Furthermore, to adapt MPCC to the variation of network state in dynamic traffic scenario, we propose a dynamic content placement (DCP) strategy in the MPCC scheme for detecting the variation of the distribution of user requests and adjusting the content location dynamically. Simulation results indicate that the MPCC scheme can reduce over 20% spectrum consumption than conventional multipath provisioning scheme in static traffic scenario. And in dynamic traffic scenario, the MPCC scheme can reduce over 20% spectrum consumption and over 50% blocking probability than conventional multipath provisioning scheme. Meanwhile, benefiting from the DCP strategy, the MPCC scheme has a good adaption to the variation of the distribution of user requests.

  3. Simple Analytic Formula for the Period of the Nonlinear Pendulum via the Struve Function: Connection to Acoustical Impedance Matching

    Science.gov (United States)

    Douvropoulos, Theodosios G.

    2012-01-01

    An approximate formula for the period of pendulum motion beyond the small amplitude regime is obtained based on physical arguments. Two different schemes of different accuracy are developed: in the first less accurate scheme, emphasis is given on the non-quadratic form of the potential in connection to isochronism, and a specific form of a generic…

  4. Optimal Censoring Scheme Selection Based on Artificial Bee Colony Optimization (ABC Algorithm

    Directory of Open Access Journals (Sweden)

    K. Kalaivani

    2015-07-01

    Full Text Available Life testing plans are more vital for carrying out researches on reliability and survival analysis. The inadequacy in the number of testing units or the timing limitations prevents the experiment from being continued until all the failures are detected. Hence, censoring grows to be an inheritably important and well-organized methodology for estimating the model parameters of underlying distributions. Type I and II censoring schemes are the most widely employed censoring schemes. The chief problem associated with the designing of life testing experiments practically is the determination of optimum censoring scheme. Hence, this study attempts to determine the optimum censoring through the minimization of total cost spent for the experiment, consuming less termination time and reasonable number of failures. The ABC algorithm is being employed in this study for obtaining the optimal censoring schemes. Entropy and variance serves as the optimal criterion. The proposed method utilizes Risk analysis to evaluate the efficiency or reliability of the optimal censoring scheme that is being determined. Optimum censoring scheme indicates the process of determining the best scheme from among the entire censoring schemes possible, in accordance to a specific optimality criterion.

  5. Connecting Science with Society

    DEFF Research Database (Denmark)

    awareness of the important questions of our society reflected in scientific research and of the answers produced by these research activities. The CRIS2010 conference, entitled “Bringing Science to Society”, therefore seeks to highlight the role of Current Research Information Systems for communicating......CRIS2010, the 10th conference in the bi-annual series organized by euroCRIS, focuses on the connecting role of Current Research Information Systems (CRIS). Aalborg, Denmark where CRIS2010 is held, is located near the intersection of the Northern Sea and Kattegat, a place were not only the waters...... of two seas are exchanged, but also goods and culture. In a similar way, Current Research Information Systems are at the intersection between (publicly funded) research and society. They do not only connect actors, activities and results within the research domain but also play a crucial role in raising...

  6. Connecting to Everyday Practices

    DEFF Research Database (Denmark)

    Iversen, Ole Sejer; Smith, Rachel Charlotte

    2012-01-01

    construction and reproduction of cultural heritage creating novel connections between self and others and between past, present and future. We present experiences from a current research project, the Digital Natives exhibition, in which social media was designed as an integral part of the exhibition to connect...... issues of digital heritage with audiences’ everyday practices in a museum. We point to the fact the use of social media in museums not only challenge us to rethink the design of technology for museum experiences. Social media also challenge us to rethink conceptions of museums and cultural heritage......We suggest that social media can contribute to reconnecting audiences’ everyday practices to issues of cultural heritage in museum institutions. Social media can support the creation of dialogical spaces in the museum, both playful and reflective, that allow audiences to engage in the ongoing...

  7. Weldless Flange Connections

    OpenAIRE

    Andersson, Mattias; Jonsson, Henrik; Löfqvist, Stefan; Maigne, Remi; Bravo, Unai

    2004-01-01

    This development project is a bachelor’s degree thesis work that will conclude the education program ”Development Technology” at Blekinge Institute of Technology. The development project has been done in cooperation with Faurecia Exhaust Systems AB in Torsås that constructs and manufactures manifolds, catalytic converters, mufflers and whole exhaust systems. The task with this project was to find a new solution concept for the connection of pipes into flanges in manifolds. The concept that Fa...

  8. Connecting textual segments

    DEFF Research Database (Denmark)

    Brügger, Niels

    2017-01-01

    In “Connecting textual segments: A brief history of the web hyperlink” Niels Brügger investigates the history of one of the most fundamental features of the web: the hyperlink. Based on the argument that the web hyperlink is best understood if it is seen as another step in a much longer and broader......-alone computers and in local and global digital networks....

  9. Connecting with Citizens

    DEFF Research Database (Denmark)

    Jørgensen, Poul Erik Flyvholm; Isaksson, Maria

    2017-01-01

    /2007. If Norway, like Denmark, significantly reduces its number of municipalities, the majority of municipalities will undergo significant change and experience loss of identity. Each new municipality will need to create meaningful new identities attractive to publics fearful of alienation inside a community...... they have no relationship to. The study examines how municipalities reach out to connect with their publics, and whether they employ emotional and engaging discourse. Our data consists of 20 Norwegian and 20 Danish municipal websites....

  10. Connective tissue ulcers.

    Science.gov (United States)

    Dabiri, Ganary; Falanga, Vincent

    2013-11-01

    Connective tissue disorders (CTD), which are often also termed collagen vascular diseases, include a number of related inflammatory conditions. Some of these diseases include rheumatoid arthritis, systemic lupus erythematosus, systemic sclerosis (scleroderma), localized scleroderma (morphea variants localized to the skin), Sjogren's syndrome, dermatomyositis, polymyositis, and mixed connective tissue disease. In addition to the systemic manifestations of these diseases, there are a number of cutaneous features that make these conditions recognizable on physical exam. Lower extremity ulcers and digital ulcers are an infrequent but disabling complication of long-standing connective tissue disease. The exact frequency with which these ulcers occur is not known, and the cause of the ulcerations is often multifactorial. Moreover, a challenging component of CTD ulcerations is that there are still no established guidelines for their diagnosis and treatment. The morbidity associated with these ulcerations and their underlying conditions is very substantial. Indeed, these less common but intractable ulcers represent a major medical and economic problem for patients, physicians and nurses, and even well organized multidisciplinary wound healing centers.

  11. Energy storage connection system

    Science.gov (United States)

    Benedict, Eric L.; Borland, Nicholas P.; Dale, Magdelena; Freeman, Belvin; Kite, Kim A.; Petter, Jeffrey K.; Taylor, Brendan F.

    2012-07-03

    A power system for connecting a variable voltage power source, such as a power controller, with a plurality of energy storage devices, at least two of which have a different initial voltage than the output voltage of the variable voltage power source. The power system includes a controller that increases the output voltage of the variable voltage power source. When such output voltage is substantially equal to the initial voltage of a first one of the energy storage devices, the controller sends a signal that causes a switch to connect the variable voltage power source with the first one of the energy storage devices. The controller then causes the output voltage of the variable voltage power source to continue increasing. When the output voltage is substantially equal to the initial voltage of a second one of the energy storage devices, the controller sends a signal that causes a switch to connect the variable voltage power source with the second one of the energy storage devices.

  12. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  13. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu

  14. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  15. Finite volume renormalization scheme for fermionic operators

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher; Orginos, Kostas [JLAB

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  16. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  17. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  18. Unconditionnally stable scheme for Riccati equation

    CERN Document Server

    Dubois, François; 10.1051/proc:2000003

    2011-01-01

    We present a numerical scheme for the resolution of matrix Riccati equation used in control problems. The scheme is unconditionnally stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.

  19. Modified Mean-Pyramid Coding Scheme

    Science.gov (United States)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  20. A New Public-Key Encryption Scheme

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Xi Sun; Yu-Min Wang

    2007-01-01

    This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme.As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption,the third version of knowledge of exponent assumption (KEA3).Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2).This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations.The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption.In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.

  1. Novel Link Adaptation Schemes for OFDM System

    Institute of Scientific and Technical Information of China (English)

    LEI Ming; CAI Peng; XU Yue-shan; ZHANG Ping

    2003-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) is the most promising technique supporting the high data rate transmission. The combination of the link adaptation and OFDM can further increase the spectral efficiency. In this paper, we put forward two link adaptation schemes for OFDM system which have the advantages of both flexibility and practicability. Both of the two novel link adaptation schemes are based on the iterative mechanism to allocate the bit and power to subcarriers according to their channel gains and noisy levels which are assumed to be already known at the transmitter. The candidate modulation modes are determined freely before the link adaptation schemes are performed. The distinction between the two novel link adaptation schemes is that in the novel scheme A, the modulation mode is upgraded to the neighboring higher-order mode, while in the novel scheme B the modulation is upgraded to the genuine optimal mode. Therefore, the novel scheme A has the advantage of lower complexity and the novel scheme B has the advantage of higher spectral efficiency.

  2. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  3. Modified Mean-Pyramid Coding Scheme

    Science.gov (United States)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  4. Phase calibration scheme for a ``T'' array

    Science.gov (United States)

    Ramesh, R.; Subramanian, K. R.; Sastry, Ch. V.

    1999-10-01

    A calibration scheme based on closure and redundancy techniques is described for correcting the phase errors in the complex visibilities observed with a T-shaped radio interferometer array. Practical details of the scheme are illustrated with reference to the Gauribidanur radioheliograph (GRH).

  5. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re

  6. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  7. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    Science.gov (United States)

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  8. A Secure Threshold Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Wang Xiaoming; Fu Fangwei

    2003-01-01

    The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack

  9. Cornering (3+1) sterile neutrino schemes

    CERN Document Server

    Maltoni, M; Valle, José W F

    2001-01-01

    Using the most recent atmospheric neutrino data, as well as short-baseline and tritium $\\beta$-decay data we show that (3+1) sterile neutrino schemes are severely disfavored, in contrast to the theoretically favored (2+2) schemes.

  10. Multiobjective Synergistic Scheduling Optimization Model for Wind Power and Plug-In Hybrid Electric Vehicles under Different Grid-Connected Modes

    Directory of Open Access Journals (Sweden)

    Liwei Ju

    2014-01-01

    Full Text Available In order to promote grid’s wind power absorptive capacity and to overcome the adverse impacts of wind power on the stable operation of power system, this paper establishes benefit contrastive analysis models of wind power and plug-in hybrid electric vehicles (PHEVs under the optimization goal of minimum coal consumption and pollutant emission considering multigrid connected modes. Then, a two-step adaptive solving algorithm is put forward to get the optimal system operation scheme with the highest membership degree based on the improved ε constraints method and fuzzy decision theory. Thirdly, the IEEE36 nodes 10-unit system is used as the simulation system. Finally, the sensitive analysis for PHEV’s grid connected number is made. The result shows the proposed algorithm is feasible and effective to solve the model. PHEV’s grid connection could achieve load shifting effect and promote wind power grid connection. Especially, the optimization goals reach the optimum in fully optimal charging mode. As PHEV’s number increases, both abandoned wind and thermal power generation cost would decrease and the peak and valley difference of load curve would gradually be reduced.

  11. Connection Conditions and the Spectral Family under Singular Potentials

    CERN Document Server

    Tsutsui, I; Fülöp, T

    2003-01-01

    To describe a quantum system whose potential is divergent at one point, one must provide proper connection conditions for the wave functions at the singularity. Generalizing the scheme used for point interactions in one dimension, we present a set of connection conditions which are well-defined even if the wave functions and/or their derivatives are divergent at the singularity. Our generalized scheme covers the entire U(2) family of quantizations (self-adjoint Hamiltonians) admitted for the singular system. We use this scheme to examine the spectra of the Coulomb potential $V(x) = - e^2 / | x |$ and the harmonic oscillator with square inverse potential $V(x) = (m \\omega^2 / 2) x^2 + g/x^2$, and thereby provide a general perspective for these models which have previously been treated with restrictive connection conditions resulting in conflicting spectra. We further show that, for any parity invariant singular potentials $V(-x) = V(x)$, the spectrum is determined solely by the eigenvalues of the characteristi...

  12. Statistical technique for analysing functional connectivity of multiple spike trains.

    Science.gov (United States)

    Masud, Mohammad Shahed; Borisyuk, Roman

    2011-03-15

    A new statistical technique, the Cox method, used for analysing functional connectivity of simultaneously recorded multiple spike trains is presented. This method is based on the theory of modulated renewal processes and it estimates a vector of influence strengths from multiple spike trains (called reference trains) to the selected (target) spike train. Selecting another target spike train and repeating the calculation of the influence strengths from the reference spike trains enables researchers to find all functional connections among multiple spike trains. In order to study functional connectivity an "influence function" is identified. This function recognises the specificity of neuronal interactions and reflects the dynamics of postsynaptic potential. In comparison to existing techniques, the Cox method has the following advantages: it does not use bins (binless method); it is applicable to cases where the sample size is small; it is sufficiently sensitive such that it estimates weak influences; it supports the simultaneous analysis of multiple influences; it is able to identify a correct connectivity scheme in difficult cases of "common source" or "indirect" connectivity. The Cox method has been thoroughly tested using multiple sets of data generated by the neural network model of the leaky integrate and fire neurons with a prescribed architecture of connections. The results suggest that this method is highly successful for analysing functional connectivity of simultaneously recorded multiple spike trains.

  13. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  14. Two level scheme solvers for nuclear spectroscopy

    Science.gov (United States)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  15. An Efficient Forward Secure Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    YU Jia; KONG Fan-yu; LI Da-xing

    2006-01-01

    A new efficient forward secure signature scheme based on bilinear pairings is presented in this paper.Each complexity of key generation, key update, signing and verifying algorithms in this scheme is O(1) in terms of the total number of time periods T. Because a new structure in node secret key storage and a unique strategy in key update are employed, the signing and verifying costs don't grow when T increases. At the same time, the key generation and key update algorithms are efficiently constructed thanks to using the pre-order traversal technique of binary trees. Compared with other schemes based on bilinear pairings, the signature size in this scheme is very short, which doesn't change with T increasing. The scheme is forward secure in random oracle model assuming CDH problem is hard.

  16. Comparison among sea surface roughness schemes

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the measurements from the US National Data Buoy Center 3-m discus buoy site No.44004 (38.5°N, 70.47°W) from January 1 to March 31 of 2003, with the COARE algorithm (Version 3.0), the results from four parameterization schemes developed recently for sea surface aerodynamic roughness length were compared with each other. Calculations of frictional speed u*, drag coefficient Cd and wind stress τ indicate that the calculated frictional velocities from the four schemes (8.50%-16.20%, the normalized standard error estimate, or NSEE), the computed drag coefficients and wind stress (respectively 15.08%-28.67% and 17.26%-50.59% NSEE) are reasonable. Schemes YT96 and GW03 are consistent. The O02 scheme gives overestimated values for u* and Cd. Schemes TY01 and GW03 display discontinuous characteristics in handling young wave data.

  17. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  18. Remodulation scheme based on a two-section reflective SOA

    Science.gov (United States)

    Guiying, Jiang; Lirong, Huang

    2014-05-01

    A simple and cost-effective remodulation scheme using a two-section reflective semiconductor optical amplifier (RSOA) is proposed for a colorless optical network unit (ONU). Under proper injection currents, the front section functions as a modulator to upload the upstream signal while the rear section serves as a data eraser for efficient suppression of the downstream data. The dependences of the upstream transmission performance on the lengths and driven currents of the RSOA, the injection optical power and extinction ratio of the downstream are investigated. By optimizing these parameters, the downstream data can be more completely suppressed and the upstream transmission performance can be greatly improved.

  19. Asymmetric network connectivity using weighted harmonic averages

    Science.gov (United States)

    Morrison, Greg; Mahadevan, L.

    2011-02-01

    We propose a non-metric measure of the "closeness" felt between two nodes in an undirected, weighted graph using a simple weighted harmonic average of connectivity, that is a real-valued Generalized Erdös Number (GEN). While our measure is developed with a collaborative network in mind, the approach can be of use in a variety of artificial and real-world networks. We are able to distinguish between network topologies that standard distance metrics view as identical, and use our measure to study some simple analytically tractable networks. We show how this might be used to look at asymmetry in authorship networks such as those that inspired the integer Erdös numbers in mathematical coauthorships. We also show the utility of our approach to devise a ratings scheme that we apply to the data from the NetFlix prize, and find a significant improvement using our method over a baseline.

  20. Naturally Connecting the World

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ During China International Trade Fair for Home Textiles and Accessories held in Shanghai 2010(on Aug.25th the second day of the fair),Cotton Council International(CCI)hosted an exchange meeting targeted the COTTON USATM home textile licenses,taking"Naturally Connecting the World-Opportunities for Sourcing and Collaboration with Cotton-Made Home Textiles"as the theme of the meeting.CCI's representative institution in China invited the domestic famous home textile brands,enterprises and their customers to participate in the exchange which aims to introduce the current development trend of the global cotton textile industry through CCI,the powerful platform of communication.

  1. Transcultural Tectonic Connections

    DEFF Research Database (Denmark)

    Carter, Adrian

    2014-01-01

    This paper presents an understanding of Jørn Utzon, as one of the most profound exponents of a transcultural and tectonic approach to modern architecture in the late twentieth century. The paper will examine the sources of inspiration, intersections and connections in Utzon’s architecture; which...... ruins in Mexico. The Sydney Opera House’s signature sail-like roof shells derive from knowledge of boat building in his youth and ancient Chinese and Japanese temple roofs floating above a stone base. With the choice of ceramic tiles to accentuate the sculptural character of the shells, owing its...

  2. Practicing (Dis)connections

    DEFF Research Database (Denmark)

    day-to-day character of the work practices entailed, tracing their at once embedded, yet, distributed and disparate – (dis)connected – configurations. In the course of an MRI exam, from the screening of the patient to the scanning itself, and onto the subsequent processing and analysis of the images...... and redistribution of knowledge-practices in and through sociotechnical change, particularly in the light of the advent of film-less radiology, and how MRI comes to be particularly implicated in the transition/development in radiology toward practices entailing picture archive and communication systems (PACS...

  3. Some Numerical Methods for Exponential Analysis with Connection to a General Identification Scheme for Linear Processes

    Science.gov (United States)

    1980-11-01

    generalized nodel described by Eykhoff [1, 2], Astrom and Eykhoff [3], and on pages 209-220 of Eykhoff [4]. The origin of the general- ized model can be...aspects of process-parameter estimation," IEEE Trans. Auto. Control, October 1963, pp. 347-357. 3. K. J. Astrom and P. Eykhoff, "System

  4. Changes in the local government income compensation scheme

    Directory of Open Access Journals (Sweden)

    Alicja Młynarczyk

    2016-09-01

    Full Text Available The significant factor that enforces changes in the current local government financing system are some defects in the horizontal compensation scheme at the poviat and voievodship levels, expressed in the overdue redistribution of income. The changes in the local government income compensation scheme, as proposed recently by the legislator, result from the necessity to implement the recommendations of the Constitutional Tribunal. According to the Tribunal, the horizontal compensation scheme, based on transferring funds from wealthier local governments to poorer ones by the means of making payments for increasing the values of subsidies, should make for an exceptional measure and may only supplement the system of vertical compensating from the Treasury. The intention that stands behind the new draft is to introduce such a corrective and compensating mechanism that would not bring about reduction of incomes achieved by the contributing voivodeships. The proposed solutions would be temporary only - for the period of three years. Permanent solutions, however, need to be adopted to economical reforms, which will have an effect on incomes achieved by local government units.

  5. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  6. The India Connection

    Science.gov (United States)

    Abdul-Alim, Jamaal

    2012-01-01

    Even though lawmakers in India don't seem likely to pass any laws that would enable foreign universities to set up shop in India anytime soon, opportunities still abound for institutions of higher learning in the United States to collaborate with their Indian counterparts and to engage and recruit students in India as well. That's the consensus…

  7. The Literature Connection.

    Science.gov (United States)

    State of Reading, 1996

    1996-01-01

    Presents: the 1996/97 Texas Bluebonnet Award Master List of 19 children's books; a short essay about what she writes and why she writes it by Texas author Angela Shelf Medearis; an essay introducing Arte Publico Press in Houston, a publisher of contemporary and recovered literature by United States Hispanic authors; and the 1996/97 Texas Lone Star…

  8. The India Connection

    Science.gov (United States)

    Abdul-Alim, Jamaal

    2012-01-01

    Even though lawmakers in India don't seem likely to pass any laws that would enable foreign universities to set up shop in India anytime soon, opportunities still abound for institutions of higher learning in the United States to collaborate with their Indian counterparts and to engage and recruit students in India as well. That's the consensus…

  9. China Connections Reference Book.

    Science.gov (United States)

    Kalat, Marie B.; Hoermann, Elizabeth F.

    This reference book focuses on six aspects of the geography of the People's Republic of China. They are: territory, governing units, population and land use, waterways, land forms, and climates. Designed as a primary reference, the book explains how the Chinese people and their lifestyles are affected by China's geography. Special components…

  10. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  11. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  12. A Downlink and Uplink Alignment Scheme for Power Saving in IEEE 802.16 Protocol

    Directory of Open Access Journals (Sweden)

    Jenhui Chen

    2014-01-01

    Full Text Available This study shows the problem of power saving mechanism (PSM that sleep intervals of uplink (UL connections do not synchronize with sleep intervals of downlink (DL connections. That is, the energy of a mobile station (MS is not really saved if the DL connections are in the sleep mode while the UL connections are in normal mode, and vice versa. To avoid the asynchronism of power saving (PS between UL and DL connections, we invent a mechanism of DL connections regulating UL connections, called DL and UL Alignment (DUAL scheme, to improve the energy efficiency for PS. Considering that the buffer size of MS is limited, DUAL uses the mean packet arrival rate of UL λu and a relatively safe threshold of buffer size QT as the parameters to estimate the maximum allowable waiting time to align the UL with the DL connections. To analyze the performance of DUAL, a system model of PS is proposed to evaluate the performance of DUAL under different conditions. The correctness of performance analysis of DUAL is validated by using simulation with realistic parameters. Numerical experiments show that DUAL improves the energy conservation significantly when UL traffic is greater than DL traffic.

  13. A downlink and uplink alignment scheme for power saving in IEEE 802.16 protocol.

    Science.gov (United States)

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    This study shows the problem of power saving mechanism (PSM) that sleep intervals of uplink (UL) connections do not synchronize with sleep intervals of downlink (DL) connections. That is, the energy of a mobile station (MS) is not really saved if the DL connections are in the sleep mode while the UL connections are in normal mode, and vice versa. To avoid the asynchronism of power saving (PS) between UL and DL connections, we invent a mechanism of DL connections regulating UL connections, called DL and UL Alignment (DUAL) scheme, to improve the energy efficiency for PS. Considering that the buffer size of MS is limited, DUAL uses the mean packet arrival rate of UL λ u and a relatively safe threshold of buffer size Q T as the parameters to estimate the maximum allowable waiting time to align the UL with the DL connections. To analyze the performance of DUAL, a system model of PS is proposed to evaluate the performance of DUAL under different conditions. The correctness of performance analysis of DUAL is validated by using simulation with realistic parameters. Numerical experiments show that DUAL improves the energy conservation significantly when UL traffic is greater than DL traffic.

  14. LHCb connects its pipes

    CERN Multimedia

    2006-01-01

    Two weeks ago the first beryllium section of the LHCb beam vacuum chamber was installed. This three-day operation, after requiring lengthy preparation work, demanded patience and precision as the first of four sections of the beampipe was connected to the vertex locator (VeLo) vacuum vessel. The AT-VAC Group with the collaboration of PH/LBD, including Gloria Corti, Tatsuya Nakada, Patrice Mermet, Delios Ramos, Frans Mul, Bruno Versollato, Bernard Corajod, and Raymond Veness. (Not pictured: Adriana Rossi and Laurent Bouvet) This first installed section is composed of a nearly two-metre long conical tube of one-millimetre thick beryllium and of a thin spherical-shaped window, 800 millimeter diameter, made of an aluminum alloy, and has the appearance of a mushroom lying on its side. The window is connected to the conical part of the beampipe through an aluminum alloy bellow, which is needed to allow for mechanical alignment once the assembly is installed. Beryllium was chosen as the material for 12 m of the 19...

  15. A Spatial Domain Quantum Watermarking Scheme

    Science.gov (United States)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  16. Connectivity-oriented urban projects

    NARCIS (Netherlands)

    Philibert Petit, E.

    2006-01-01

    This thesis is about connections in the built environment, networked connections for the mobility of people at the smallest scale of the urban realm: the pedestrian scale. It deals with applications of the new science of networks as a tool for observation and assessment of connectivity in the urban

  17. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  18. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  19. Exploiting Same Scale Similarity in Fisher's Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yao

    2001-01-01

    The method proposed by Y. Fisher is the most popular fractal image coding scheme. In his scheme, domain blocks are constrained to be twice as large as range blocks in order to ensure the convergence of the iterative decoding stage. However,this constraint has limited the fractal encoder to exploit the self-similarity of the original image. In order to overcome the shortcoming, a novel scheme using same-sized range and domain blocks is proposed in the paper. Experimental results show the improvements in compression performance.

  20. Mission Mangalam scheme: Ex ploring the opportunities.

    Directory of Open Access Journals (Sweden)

    Dr. Pallavi A. Upadhyay*,

    2015-01-01

    Full Text Available Background Mission Mangalam has been launched by the Gujarat Government in 2010.It is an integrated poverty alleviation approach and an initiative to empower women. Mission Mangalam is helping women to earn their livelihood and to become independent. These Sakhimandals are linked to banks to fulfill the requirement of fund. Sakhimandals get financial assistance from banks. Some of the core benefits of the scheme can be linked with the health sector as well; Objectives (1 To review the scheme of Mission Mangalam (2 To explore the possibility of health linkage with the scheme (3 To study the perception of beneficiaries and their socio- demographic profile; Methodology: A cross sectional study. Samplesize-152 women members of Sakhimandals in Saraspur ward. Health of all the members of Mandals of Saraspur was checked by the Ahmedabad Municipal Corporation. Women of Sakhimandals were interviewed to understand their perception about the scheme as well as about any other health benefit they have experienced for themselves or their family members. 3 Additionally, Community based survey of 50 BPL families was carried out to assess the proportion of families covered under the scheme of Mission Mangalam. Results: Mean age of these women (n=152 was 31.81 years with SD=6.74. Education of maximum number 71(47% of women was up to secondary. Mean income was 5460 Rs/month with SD=1840 .Mean of number of family members is 5.4. 109 (72% women are residing in chali area. 98(64% women were told about this scheme by social worker, others were told about the scheme by her friend or UCD official. Paired t test was carried out to find increase in Hb levels of the beneficiary women. It was found to be significant (p=0.007, t=15.64. Age of women is associated with habit to save money. (p=0.003. There are only 22 (44% out of 50 families visited, who have at least one member enrolled under the scheme. More stringent efforts for universal coverage have to be made by