WorldWideScience

Sample records for universal identification scheme

  1. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  2. Closed loop identification using a modified Hansen scheme

    DEFF Research Database (Denmark)

    Sekunda, André Krabdrup; Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2015-01-01

    in closed loop [4], and one such method is the Hansen scheme [1]. Standard identification using Hansen scheme demands generating the identification signals indirectly. In this paper it is instead proposed to use the relationship between the Youla factorization of a plant and its stabilizing controller...... in order to keep the system stable. Furthermore because the dynamics of such a system depends on the rotational speed it is needed to conduct an identification while the system is part of a closed loop scheme. The authors believe the paper able to contribute towards a simpler and more direct way...... of identifying closed loop plants using Hansen scheme....

  3. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  4. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Science.gov (United States)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  5. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  6. Universal health coverage in Latin American countries: how to improve solidarity-based schemes.

    Science.gov (United States)

    Titelman, Daniel; Cetrángolo, Oscar; Acosta, Olga Lucía

    2015-04-04

    In this Health Policy we examine the association between the financing structure of health systems and universal health coverage. Latin American health systems encompass a wide range of financial sources, which translate into different solidarity-based schemes that combine contributory (payroll taxes) and non-contributory (general taxes) sources of financing. To move towards universal health coverage, solidarity-based schemes must heavily rely on countries' capacity to increase public expenditure in health. Improvement of solidarity-based schemes will need the expansion of mandatory universal insurance systems and strengthening of the public sector including increased fiscal expenditure. These actions demand a new model to integrate different sources of health-sector financing, including general tax revenue, social security contributions, and private expenditure. The extent of integration achieved among these sources will be the main determinant of solidarity and universal health coverage. The basic challenges for improvement of universal health coverage are not only to spend more on health, but also to reduce the proportion of out-of-pocket spending, which will need increased fiscal resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  8. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  9. Multi-stage identification scheme for detecting damage in structures under ambient excitations

    International Nuclear Information System (INIS)

    Bao, Chunxiao; Li, Zhong-Xian; Hao, Hong

    2013-01-01

    Structural damage identification methods are critical to the successful application of structural health monitoring (SHM) systems to civil engineering structures. The dynamic response of civil engineering structures is usually characterized by high nonlinearity and non-stationarity. Accordingly, an improved Hilbert–Huang transform (HHT) method which is adaptive, output-only and applicable to system identification of in-service structures under ambient excitations is developed in this study. Based on this method, a multi-stage damage detection scheme including the detection of damage occurrence, damage existence, damage location and the estimation of damage severity is developed. In this scheme, the improved HHT method is used to analyse the structural acceleration response, the obtained instantaneous frequency detects the instant of damage occurrence, the instantaneous phase is sensitive to minor damage and provides reliable damage indication, and the damage indicator developed based on statistical analysis of the Hilbert marginal spectrum detects damage locations. Finally, the response sampled at the detected damage location is continuously analysed to estimate the damage severity. Numerical and experimental studies of frame structures under ambient excitations are performed. The results demonstrate that this scheme accomplishes the above damage detection functions within one flow. It is robust, time efficient, simply implemented and applicable to the real-time SHM of in-service structures. (paper)

  10. On a second order of accuracy stable difference scheme for the solution of a source identification problem for hyperbolic-parabolic equations

    Science.gov (United States)

    Ashyralyyeva, Maral; Ashyraliyev, Maksat

    2016-08-01

    In the present paper, a second order of accuracy difference scheme for the approximate solution of a source identification problem for hyperbolic-parabolic equations is constructed. Theorem on stability estimates for the solution of this difference scheme and their first and second order difference derivatives is presented. In applications, this abstract result permits us to obtain the stability estimates for the solutions of difference schemes for approximate solutions of two source identification problems for hyperbolic-parabolic equations.

  11. Universal block diagram based modeling and simulation schemes for fractional-order control systems.

    Science.gov (United States)

    Bai, Lu; Xue, Dingyü

    2017-05-08

    Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Optimum Electrode Configurations for Two-Probe, Four-Probe and Multi-Probe Schemes in Electrical Resistance Tomography for Delamination Identification in Carbon Fiber Reinforced Composites

    Directory of Open Access Journals (Sweden)

    Luis Waldo Escalona-Galvis

    2018-04-01

    Full Text Available Internal damage in Carbon Fiber Reinforced Polymer (CFRP composites modifies the internal electrical conductivity of the composite material. Electrical Resistance Tomography (ERT is a non-destructive evaluation (NDE technique that determines the extent of damage based on electrical conductivity changes. Implementation of ERT for damage identification in CFRP composites requires the optimal selection of the sensing sites for accurate results. This selection depends on the measuring scheme used. The present work uses an effective independence (EI measure for selecting the minimum set of measurements for ERT damage identification using three measuring schemes: two-probe, four-probe and multi-probe. The electrical potential field in two CFRP laminate layups with 14 electrodes is calculated using finite element analyses (FEA for a set of specified delamination damage cases. The measuring schemes consider the cases of 14 electrodes distributed on both sides and seven electrodes on only one side of the laminate for each layup. The effectiveness of EI reduction is demonstrated by comparing the inverse identification results of delamination cases for the full and the reduced sets using the measuring schemes and electrode sets. This work shows that the EI measure optimally reduces electrode and electrode combinations in ERT based damage identification for different measuring schemes.

  13. Quality of service management efficient scheme for the universal mobile telecommunications system

    Directory of Open Access Journals (Sweden)

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  14. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  15. Equity of the premium of the Ghanaian National Health Insurance Scheme and the implications for achieving universal coverage.

    Science.gov (United States)

    Amporfu, Eugenia

    2013-01-07

    The Ghanaian National Health Insurance Scheme (NHIS) was introduced to provide access to adequate health care regardless of ability to pay. By law the NHIS is mandatory but because the informal sector has to make premium payment before they are enrolled, the authorities are unable to enforce mandatory nature of the scheme. The ultimate goal of the Scheme then is to provide all residents with access to adequate health care at affordable cost. In other words, the Scheme intends to achieve universal coverage. An important factor for the achievement of universal coverage is that revenue collection be equitable. The purpose of this study is to examine the vertical and horizontal equity of the premium collection of the Scheme. The Kakwani index method as well as graphical analysis was used to study the vertical equity. Horizontal inequity was measured through the effect of the premium on redistribution of ability to pay of members. The extent to which the premium could cause catastrophic expenditure was also examined. The results showed that revenue collection was both vertically and horizontally inequitable. The horizontal inequity had a greater effect on redistribution of ability to pay than vertical inequity. The computation of catastrophic expenditure showed that a small minority of the poor were likely to incur catastrophic expenditure from paying the premium a situation that could impede the achievement of universal coverage. The study provides recommendations to improve the inequitable system of premium payment to help achieve universal coverage.

  16. Equity of the premium of the Ghanaian national health insurance scheme and the implications for achieving universal coverage

    Directory of Open Access Journals (Sweden)

    Amporfu Eugenia

    2013-01-01

    Full Text Available Abstract The Ghanaian National Health Insurance Scheme (NHIS was introduced to provide access to adequate health care regardless of ability to pay. By law the NHIS is mandatory but because the informal sector has to make premium payment before they are enrolled, the authorities are unable to enforce mandatory nature of the scheme. The ultimate goal of the Scheme then is to provide all residents with access to adequate health care at affordable cost. In other words, the Scheme intends to achieve universal coverage. An important factor for the achievement of universal coverage is that revenue collection be equitable. The purpose of this study is to examine the vertical and horizontal equity of the premium collection of the Scheme. The Kakwani index method as well as graphical analysis was used to study the vertical equity. Horizontal inequity was measured through the effect of the premium on redistribution of ability to pay of members. The extent to which the premium could cause catastrophic expenditure was also examined. The results showed that revenue collection was both vertically and horizontally inequitable. The horizontal inequity had a greater effect on redistribution of ability to pay than vertical inequity. The computation of catastrophic expenditure showed that a small minority of the poor were likely to incur catastrophic expenditure from paying the premium a situation that could impede the achievement of universal coverage. The study provides recommendations to improve the inequitable system of premium payment to help achieve universal coverage.

  17. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  18. Development and test of a classification scheme for human factors in incident reports

    International Nuclear Information System (INIS)

    Miller, R.; Freitag, M.; Wilpert, B.

    1997-01-01

    The Research Center System Safety of the Berlin University of Technology conducted a research project on the analysis of Human Factors (HF) aspects in incident reported by German Nuclear Power Plants. Based on psychological theories and empirical studies a classification scheme was developed which permits the identification of human involvement in incidents. The classification scheme was applied in an epidemiological study to a selection of more than 600 HF - relevant incidents. The results allow insights into HF related problem areas. An additional study proved that the application of the classification scheme produces results which are reliable and independent from raters. (author). 13 refs, 1 fig

  19. Elucidation of molecular kinetic schemes from macroscopic traces using system identification.

    Directory of Open Access Journals (Sweden)

    Miguel Fribourg

    2017-02-01

    Full Text Available Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic processes from the overall (macroscopic response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE. SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology

  20. Decreased Risk of Preeclampsia After the Introduction of Universal Voucher Scheme for Antenatal Care and Birth Services in the Republic of Korea.

    Science.gov (United States)

    Choe, Seung-Ah; Min, Hye Sook; Cho, Sung-Il

    2017-01-01

    Objectives A number of interventions to reduce disparities in maternal health have been introduced and implemented without concrete evidence to support them. In Korea, a universal voucher scheme for antenatal care and birth services was initiated in December 2008 to improve Korea's fertility rate. This study explores the risk of preeclampsia after the introduction of a universal voucher scheme. Methods Population-based cohort data from the National Health Insurance Service-National Sample Cohort (NHIS-NSC) covering 2002-2013 were analysed. A generalized linear mixed model (GLMM) was used to estimate the relationship between the risk of preeclampsia and voucher scheme introduction. Results The annual age-adjusted incidence of preeclampsia showed no significant unidirectional change during the study period. In the GLMM analysis, the introduction of a voucher scheme was associated with a reduced risk of preeclampsia, controlling for potential confounding factors. The interaction between household income level and voucher scheme was not significant. Conclusions for Practice This finding suggests that the introduction of a voucher scheme for mothers is related to a reduced risk of preeclampsia even under universal health coverage.

  1. Performance comparison of different graylevel image fusion schemes through a universal image quality index

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.

    2003-01-01

    We applied a recently introduced universal image quality index Q that quantifies the distortion of a processed image relative to its original version, to assess the performance of different graylevel image fusion schemes. The method is as follows. First, we adopt an original test image as the

  2. Relation Between Early Maladaptive Schemes and Anxiety and Depression Features in University Students

    Directory of Open Access Journals (Sweden)

    Diana Lucía Sánchez-Ortíz***

    2009-12-01

    Full Text Available Anxiety and depression are important health problems, because of the high prevalence rates in normal population and in clinical population. This non-experimental study intends to identify the cognitive profile, through the early maladaptive schemes in students from the Universidad Pontificia Bolivariana Bucaramanga, related with depression and anxiety scores. Thegoal is to contribute to the identification of cognitive characteristics that could help in the prevention of these disorders. 259 psychology students of the first seven semesters were evaluated by means from the following questionnaires: BDI, ST/DEP, STAI and YSQ-L2. The results don’t show the presence of specific schemes as a function of the presence of State/ Trait depression or State/Trait anxiety, which might suggest, through the dimensional paradigm, the presence of a cognitive pattern for an anxiety and depression mix disorder. It is suggested that further research should be carried out with other samples, including clinical population.

  3. Peer Mentoring during the Transition to University: Assessing the Usage of a Formal Scheme within the UK

    Science.gov (United States)

    Collings, Rosalyn; Swanson, Vivien; Watkins, Ruth

    2016-01-01

    Although mentoring has become increasingly popular within UK higher education, there is little evaluative research. The current longitudinal study aimed to evaluate the usage of a peer mentoring scheme during a first semester at university amongst 124 students. Results indicate that during the first week at university the majority accessed the…

  4. Mapping of the Universe of Knowledge in Different Classification Schemes

    Directory of Open Access Journals (Sweden)

    M. P. Satija

    2017-06-01

    Full Text Available Given the variety of approaches to mapping the universe of knowledge that have been presented and discussed in the literature, the purpose of this paper is to systematize their main principles and their applications in the major general modern library classification schemes. We conducted an analysis of the literature on classification and the main classification systems, namely Dewey/Universal Decimal Classification, Cutter’s Expansive Classification, Subject Classification of J.D. Brown, Colon Classification, Library of Congress Classification, Bibliographic Classification, Rider’s International Classification, Bibliothecal Bibliographic Klassification (BBK, and Broad System of Ordering (BSO. We conclude that the arrangement of the main classes can be done following four principles that are not mutually exclusive: ideological principle, social purpose principle, scientific order, and division by discipline. The paper provides examples and analysis of each system. We also conclude that as knowledge is ever-changing, classifications also change and present a different structure of knowledge depending upon the society and time of their design.

  5. Use of a Generic Identification Scheme Connecting Events and Detector Description in the ATLAS Experiment

    CERN Document Server

    Arnault, C.

    2003-01-01

    High energy physics detectors can be described hierarchically from the different subsystems to their divisions in r, phi, theta and to the individual readout channels. An identification schema that follows the logical decomposition of the ATLAS detector has been introduced allowing identification of individual readout channels as well as other parts of the detector, in particular detector elements. These identifiers provide a sort of ?glue? allowing, for example, the connection of raw event data to their detector description for position calculation or alignment corrections, as well as fast access to subsets of the event data for event trigger selection. There are two important requirements on the software to support such an identification scheme. First is the possibility to formally specify these identifiers in terms of their structure and allowed values. And second is to generate different forms of the identifiers optimised in terms of access efficiency to information content, compactness or search key effi...

  6. Universal Service Obligations: The Role of Subsidization Schemes and the Consequences of Accounting Separation

    International Nuclear Information System (INIS)

    Mirabel, F.; Poudou, J.C.; Roland, M.

    2007-01-01

    This paper (i) highlights the role that unit subsidies can play in the compensation scheme of a Universal Service Obligation (USO), and (ii) shows that welfare may be reduced when regulation requires accounting separation of network activities for vertically integrated USO providers. This suggests that accounting separation should be avoided when a USO is implemented. (authors)

  7. Hospital Coding Practice, Data Quality, and DRG-Based Reimbursement under the Thai Universal Coverage Scheme

    Science.gov (United States)

    Pongpirul, Krit

    2011-01-01

    In the Thai Universal Coverage scheme, hospital providers are paid for their inpatient care using Diagnosis Related Group (DRG) reimbursement. Questionable quality of the submitted DRG codes has been of concern whereas knowledge about hospital coding practice has been lacking. The objectives of this thesis are (1) To explore hospital coding…

  8. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    Science.gov (United States)

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  9. Multi-stage robust scheme for citrus identification from high resolution airborne images

    Science.gov (United States)

    Amorós-López, Julia; Izquierdo Verdiguier, Emma; Gómez-Chova, Luis; Muñoz-Marí, Jordi; Zoilo Rodríguez-Barreiro, Jorge; Camps-Valls, Gustavo; Calpe-Maravilla, Javier

    2008-10-01

    Identification of land cover types is one of the most critical activities in remote sensing. Nowadays, managing land resources by using remote sensing techniques is becoming a common procedure to speed up the process while reducing costs. However, data analysis procedures should satisfy the accuracy figures demanded by institutions and governments for further administrative actions. This paper presents a methodological scheme to update the citrus Geographical Information Systems (GIS) of the Comunidad Valenciana autonomous region, Spain). The proposed approach introduces a multi-stage automatic scheme to reduce visual photointerpretation and ground validation tasks. First, an object-oriented feature extraction process is carried out for each cadastral parcel from very high spatial resolution (VHR) images (0.5m) acquired in the visible and near infrared. Next, several automatic classifiers (decision trees, multilayer perceptron, and support vector machines) are trained and combined to improve the final accuracy of the results. The proposed strategy fulfills the high accuracy demanded by policy makers by means of combining automatic classification methods with visual photointerpretation available resources. A level of confidence based on the agreement between classifiers allows us an effective management by fixing the quantity of parcels to be reviewed. The proposed methodology can be applied to similar problems and applications.

  10. Scheme for the implementation of a universal quantum cloning machine via cavity-assisted atomic collisions in cavity QED

    International Nuclear Information System (INIS)

    Zou Xubo; Pahlke, K.; Mathis, W.

    2003-01-01

    We propose a scheme to implement the 1→2 universal quantum cloning machine of Buzek and Hillery [Phys. Rev. A 54, 1844 (1996)] in the context of cavity QED. The scheme requires cavity-assisted collision processes between atoms, which cross through nonresonant cavity fields in the vacuum states. The cavity fields are only virtually excited to face the decoherence problem. That's why the requirements on the cavity quality factor can be loosened

  11. Identification of isomers and control of ionization and dissociation processes using dual-mass-spectrometer scheme and genetic algorithm optimization

    International Nuclear Information System (INIS)

    Chen Zhou; Qiu-Nan Tong; Zhang Cong-Cong; Hu Zhan

    2015-01-01

    Identification of acetone and its two isomers, and the control of their ionization and dissociation processes are performed using a dual-mass-spectrometer scheme. The scheme employs two sets of time of flight mass spectrometers to simultaneously acquire the mass spectra of two different molecules under the irradiation of identically shaped femtosecond laser pulses. The optimal laser pulses are found using closed-loop learning method based on a genetic algorithm. Compared with the mass spectra of the two isomers that are obtained with the transform limited pulse, those obtained under the irradiation of the optimal laser pulse show large differences and the various reaction pathways of the two molecules are selectively controlled. The experimental results demonstrate that the scheme is quite effective and useful in studies of two molecules having common mass peaks, which makes a traditional single mass spectrometer unfeasible. (paper)

  12. A new modelling and identification scheme for time-delay systems with experimental investigation: a relay feedback approach

    Science.gov (United States)

    Pandey, Saurabh; Majhi, Somanath; Ghorai, Prasenjit

    2017-07-01

    In this paper, the conventional relay feedback test has been modified for modelling and identification of a class of real-time dynamical systems in terms of linear transfer function models with time-delay. An ideal relay and unknown systems are connected through a negative feedback loop to bring the sustained oscillatory output around the non-zero setpoint. Thereafter, the obtained limit cycle information is substituted in the derived mathematical equations for accurate identification of unknown plants in terms of overdamped, underdamped, critically damped second-order plus dead time and stable first-order plus dead time transfer function models. Typical examples from the literature are included for the validation of the proposed identification scheme through computer simulations. Subsequently, the comparisons between estimated model and true system are drawn through integral absolute error criterion and frequency response plots. Finally, the obtained output responses through simulations are verified experimentally on real-time liquid level control system using Yokogawa Distributed Control System CENTUM CS3000 set up.

  13. Yeast identification: reassessment of assimilation tests as sole universal identifiers.

    Science.gov (United States)

    Spencer, J; Rawling, S; Stratford, M; Steels, H; Novodvorska, M; Archer, D B; Chandra, S

    2011-11-01

    To assess whether assimilation tests in isolation remain a valid method of identification of yeasts, when applied to a wide range of environmental and spoilage isolates. Seventy-one yeast strains were isolated from a soft drinks factory. These were identified using assimilation tests and by D1/D2 rDNA sequencing. When compared to sequencing, assimilation test identifications (MicroLog™) were 18·3% correct, a further 14·1% correct within the genus and 67·6% were incorrectly identified. The majority of the latter could be attributed to the rise in newly reported yeast species. Assimilation tests alone are unreliable as a universal means of yeast identification, because of numerous new species, variability of strains and increasing coincidence of assimilation profiles. Assimilation tests still have a useful role in the identification of common species, such as the majority of clinical isolates. It is probable, based on these results, that many yeast identifications reported in older literature are incorrect. This emphasizes the crucial need for accurate identification in present and future publications. © 2011 The Authors. Letters in Applied Microbiology © 2011 The Society for Applied Microbiology.

  14. Development of a universal dual-bolus injection scheme for the quantitative assessment of myocardial perfusion cardiovascular magnetic resonance

    Directory of Open Access Journals (Sweden)

    Alfakih Khaled

    2011-05-01

    Full Text Available Abstract Background The dual-bolus protocol enables accurate quantification of myocardial blood flow (MBF by first-pass perfusion cardiovascular magnetic resonance (CMR. However, despite the advantages and increasing demand for the dual-bolus method for accurate quantification of MBF, thus far, it has not been widely used in the field of quantitative perfusion CMR. The main reasons for this are that the setup for the dual-bolus method is complex and requires a state-of-the-art injector and there is also a lack of post processing software. As a solution to one of these problems, we have devised a universal dual-bolus injection scheme for use in a clinical setting. The purpose of this study is to show the setup and feasibility of the universal dual-bolus injection scheme. Methods The universal dual-bolus injection scheme was tested using multiple combinations of different contrast agents, contrast agent dose, power injectors, perfusion sequences, and CMR scanners. This included 3 different contrast agents (Gd-DO3A-butrol, Gd-DTPA and Gd-DOTA, 4 different doses (0.025 mmol/kg, 0.05 mmol/kg, 0.075 mmol/kg and 0.1 mmol/kg, 2 different types of injectors (with and without "pause" function, 5 different sequences (turbo field echo (TFE, balanced TFE, k-space and time (k-t accelerated TFE, k-t accelerated balanced TFE, turbo fast low-angle shot and 3 different CMR scanners from 2 different manufacturers. The relation between the time width of dilute contrast agent bolus curve and cardiac output was obtained to determine the optimal predefined pause duration between dilute and neat contrast agent injection. Results 161 dual-bolus perfusion scans were performed. Three non-injector-related technical errors were observed (1.9%. No injector-related errors were observed. The dual-bolus scheme worked well in all the combinations of parameters if the optimal predefined pause was used. Linear regression analysis showed that the optimal duration for the predefined

  15. A Pre-Detection Based Anti-Collision Algorithm with Adjustable Slot Size Scheme for Tag Identification

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo LIANG

    2015-06-01

    Full Text Available One of the research areas in RFID systems is a tag anti-collision protocol; how to reduce identification time with a given number of tags in the field of an RFID reader. There are two types of tag anti-collision protocols for RFID systems: tree based algorithms and slotted aloha based algorithms. Many anti-collision algorithms have been proposed in recent years, especially in tree based protocols. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. Particularly, the tree based protocols had faced the long identification delay. Recently, a Hybrid Hyper Query Tree (H2QT protocol, which is a tree based approach, was proposed and aiming to speedup tag identification in large scale RFID systems. The main idea of H2QT is to track the tag response and try to predict the distribution of tag IDs in order to reduce collisions. In this paper, we propose a pre-detection tree based algorithm, called the Adaptive Pre-Detection Broadcasting Query Tree algorithm (APDBQT, to avoid those unnecessary queries. Our proposed APDBQT protocol can reduce not only the collisions but the idle cycles as well by using pre-detection scheme and adjustable slot size mechanism. The simulation results show that our proposed technique provides superior performance in high density environments. It is shown that the APDBQT is effective in terms of increasing system throughput and minimizing identification delay.

  16. Development of efficient GPU parallelization of WRF Yonsei University planetary boundary layer scheme

    Directory of Open Access Journals (Sweden)

    M. Huang

    2015-09-01

    Full Text Available The planetary boundary layer (PBL is the lowest part of the atmosphere and where its character is directly affected by its contact with the underlying planetary surface. The PBL is responsible for vertical sub-grid-scale fluxes due to eddy transport in the whole atmospheric column. It determines the flux profiles within the well-mixed boundary layer and the more stable layer above. It thus provides an evolutionary model of atmospheric temperature, moisture (including clouds, and horizontal momentum in the entire atmospheric column. For such purposes, several PBL models have been proposed and employed in the weather research and forecasting (WRF model of which the Yonsei University (YSU scheme is one. To expedite weather research and prediction, we have put tremendous effort into developing an accelerated implementation of the entire WRF model using graphics processing unit (GPU massive parallel computing architecture whilst maintaining its accuracy as compared to its central processing unit (CPU-based implementation. This paper presents our efficient GPU-based design on a WRF YSU PBL scheme. Using one NVIDIA Tesla K40 GPU, the GPU-based YSU PBL scheme achieves a speedup of 193× with respect to its CPU counterpart running on one CPU core, whereas the speedup for one CPU socket (4 cores with respect to 1 CPU core is only 3.5×. We can even boost the speedup to 360× with respect to 1 CPU core as two K40 GPUs are applied.

  17. Restricted Freedom: Negotiating Same-Sex Identifications in the Residential Spaces of a South African University

    Science.gov (United States)

    Msibi, Thabo; Jagessar, Valenshia

    2015-01-01

    International higher education research focused on students who claim same-sex identifications in university residential spaces has tended to prioritise the "gay as victim" discourse, often leading to the pathologising of same-sex identification. While there is emerging research seeking to challenge this dimension of scholarship by…

  18. A universal and reliable assay for molecular sex identification of three-spined sticklebacks (Gasterosteus aculeatus).

    Science.gov (United States)

    Toli, E-A; Calboli, F C F; Shikano, T; Merilä, J

    2016-11-01

    In heterogametic species, biological differences between the two sexes are ubiquitous, and hence, errors in sex identification can be a significant source of noise and bias in studies where sex-related sources of variation are of interest or need to be controlled for. We developed and validated a universal multimarker assay for reliable sex identification of three-spined sticklebacks (Gasterosteus aculeatus). The assay makes use of genotype scores from three sex-linked loci and utilizes Bayesian probabilistic inference to identify sex of the genotyped individuals. The results, validated with 286 phenotypically sexed individuals from six populations of sticklebacks representing all major genetic lineages (cf. Pacific, Atlantic and Japan Sea), indicate that in contrast to commonly used single-marker-based sex identification assays, the developed multimarker assay should be 100% accurate. As the markers in the assay can be scored from agarose gels, it provides a quick and cost-efficient tool for universal sex identification of three-spined sticklebacks. The general principle of combining information from multiple markers to improve the reliability of sex identification is transferable and can be utilized to develop and validate similar assays for other species. © 2016 John Wiley & Sons Ltd.

  19. Novel toggle-rate based energy-efficient scheme for heavy load real-time IM-DD OFDM-PON with ONU LLID identification in time-domain using amplitude decision.

    Science.gov (United States)

    Qin, Youxiang; Zhang, Junjie

    2017-07-10

    A novel low complexity and energy-efficient scheme by controlling the toggle-rate of ONU with time-domain amplitude identification is proposed for a heavy load downlink in an intensity-modulation and direct-detection orthogonal frequency division multiplexing passive optical network (IM-DD OFDM-PON). In a conventional OFDM-PON downlink, all ONUs have to perform demodulation for all the OFDM frames in a broadcast way no matter whether the frames are targeted to or not, which causes a huge energy waste. However, in our scheme, the optical network unit (ONU) logical link identifications (LLIDs) are inserted into each downlink OFDM frame in time-domain at the optical line terminal (OLT) side. At the ONU side, the LLID is obtained with a low complexity and high precision amplitude identification method. The ONU sets the toggle-rate of demodulation module to zero when the frames are not targeted to, which avoids unnecessary digital signal processing (DSP) energy consumption. Compared with the sleep-mode methods consisting of clock recovery and synchronization, toggle-rate shows its advantage in fast changing, which is more suitable for the heavy load scenarios. Moreover, for the first time to our knowledge, the characteristics of the proposed scheme are investigated in a real-time IM-DD OFDM system, which performs well at the received optical power as low as -21dBm. The experimental results show that 25.1% energy consumption can be saved in the receiver compared to the conventional configurations.

  20. Transnational Higher Education: The Importance of Institutional Reputation, Trust and Student-University Identification in International Partnerships

    Science.gov (United States)

    Heffernan, Troy; Wilkins, Stephen; Butt, Muhammad Mohsin

    2018-01-01

    Purpose: The purpose of this paper is to assess the extent to which the critical relational variables of university reputation, student trust and student-university identification influence student behaviour towards transnational education partnerships. Design/methodology/approach: Students undertaking British degrees at two transnational…

  1. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  2. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  3. LEARNING VECTOR QUANTIZATION FOR ADAPTED GAUSSIAN MIXTURE MODELS IN AUTOMATIC SPEAKER IDENTIFICATION

    Directory of Open Access Journals (Sweden)

    IMEN TRABELSI

    2017-05-01

    Full Text Available Speaker Identification (SI aims at automatically identifying an individual by extracting and processing information from his/her voice. Speaker voice is a robust a biometric modality that has a strong impact in several application areas. In this study, a new combination learning scheme has been proposed based on Gaussian mixture model-universal background model (GMM-UBM and Learning vector quantization (LVQ for automatic text-independent speaker identification. Features vectors, constituted by the Mel Frequency Cepstral Coefficients (MFCC extracted from the speech signal are used to train the New England subset of the TIMIT database. The best results obtained (90% for gender- independent speaker identification, 97 % for male speakers and 93% for female speakers for test data using 36 MFCC features.

  4. Secret-key and identification rates for biometric identification systems with protected templates

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2010-01-01

    In this paper we consider secret generation in biometric identification systems with protected templates. This problem is closely related to the study of the bio metric identification capacity [Willems et al., 2003] and [O’Sullivan and Sclmmid, 2002] and the common randomness generation scheme

  5. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  6. Brief of the joint research with universities, etc. for 2002. Except the research by the JNC cooperative research scheme on the nuclear fuel cycle

    International Nuclear Information System (INIS)

    2003-09-01

    The Japan Nuclear Cycle Development Institute (JNC) promote the basic and fundamental research in relation to the research and development projects of JNC through collaboration with universities and other research institutes (referred to as 'universities, etc.' below). This report includes a summary of the results of the research carried out in fiscal year 2002 on 15 joint researches with universities, etc. In addition, this report removes the research by the JNC Cooperative Research Scheme on the Nuclear Fuel Cycle. (author)

  7. Sequential blind identification of underdetermined mixtures using a novel deflation scheme.

    Science.gov (United States)

    Zhang, Mingjian; Yu, Simin; Wei, Gang

    2013-09-01

    In this brief, we consider the problem of blind identification in underdetermined instantaneous mixture cases, where there are more sources than sensors. A new blind identification algorithm, which estimates the mixing matrix in a sequential fashion, is proposed. By using the rank-1 detecting device, blind identification is reformulated as a constrained optimization problem. The identification of one column of the mixing matrix hence reduces to an optimization task for which an efficient iterative algorithm is proposed. The identification of the other columns of the mixing matrix is then carried out by a generalized eigenvalue decomposition-based deflation method. The key merit of the proposed deflation method is that it does not suffer from error accumulation. The proposed sequential blind identification algorithm provides more flexibility and better robustness than its simultaneous counterpart. Comparative simulation results demonstrate the superior performance of the proposed algorithm over the simultaneous blind identification algorithm.

  8. A scheme for designing extreme multistable discrete dynamical ...

    Indian Academy of Sciences (India)

    A scheme for designing extreme multistable discrete dynamical systems ... Abstract. In this paper, we propose a scheme for designing discrete extreme multistable systems coupling two identical dynamical systems. Existence ... Department of Applied Mathematics, University of Calcutta, 92 APC Road, Kolkata 700 009, India ...

  9. Quantitative identification and analysis of sub-seismic extensional structure system: technique schemes and processes

    International Nuclear Information System (INIS)

    Chenghua, Ou; Chen, Wei; Ma, Zhonggao

    2015-01-01

    Quantitative characterization of complex sub-seismic extensional structure system that essentially controls petroleum exploitation is difficult to implement in seismic profile interpretation. This research, based on a case study in block M of Myanmar, established a set of quantitative treatment schemes and technique processes for the identification of sub-seismic low-displacement (SSLD) extensional faults or fractures upon structural deformation restoration and geometric inversion. Firstly, the master-subsidiary inheritance relations and configuration of the seismic-scale extensional fault systems are determined by analyzing the structural pattern. Besides, three-dimensional (3D) pattern and characteristics of the seismic-scale extensional structure have been illustrated by a 3D structure model built upon seismic sections. Moreover, according to the dilatancy obtained from structural restoration on the basis of inclined shear method, as well as the fracture-flow index, potential SSLD extensional faults or fractures have been quantitatively identified. Application of the technique processes to the sub-seismic low-displacement extensional structures in block M in Myanmar is instructive to quantitatively interpret those SSLD extensional structure systems in practice. (paper)

  10. Application of stable adaptive schemes to nuclear reactor systems, (1)

    International Nuclear Information System (INIS)

    Fukuda, Toshio

    1978-01-01

    Parameter identification and adaptive control schemes are presented for a point reactor with internal feedbacks which lead to the nonlinearity of the overall system. Both are shown stable with new representation of the system, which corresponds to the nonminimal system representation, in the vein of the Model Reference Adaptive System (MRAS) via the Lyapunov's method. For the sake of the parameter identification, model parameters can be adjusted adaptively as soon as measurements start, while plant parameters can also adaptively be compensated through control input to reduce the output error between the model and the plant for the case of the adaptive control. In the case of the adaptive control, control schemes are presented for two cases, the case of the unknown decay constant of the delayed neutron and the case of the known constant. The adaptive control scheme for the latter case is shown extremely simpler than that for the former. Furthermore, when plant parameters vary slowly with time, computer simulations show that the proposed adaptive control scheme works satisfactorily enough to stabilize an unstable reactor and that it does even in the noise with small variance. (auth.)

  11. BUILDING MODEL ANALYSIS APPLICATIONS WITH THE JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY (JUPITER) API

    Science.gov (United States)

    The open-source, public domain JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) API (Application Programming Interface) provides conventions and Fortran-90 modules to develop applications (computer programs) for analyzing process models. The input ...

  12. Digital Modulation Identification Model Using Wavelet Transform and Statistical Parameters

    Directory of Open Access Journals (Sweden)

    P. Prakasam

    2008-01-01

    Full Text Available A generalized modulation identification scheme is developed and presented. With the help of this scheme, the automatic modulation classification and recognition of wireless communication signals with a priori unknown parameters are possible effectively. The special features of the procedure are the possibility to adapt it dynamically to nearly all modulation types, and the capability to identify. The developed scheme based on wavelet transform and statistical parameters has been used to identify M-ary PSK, M-ary QAM, GMSK, and M-ary FSK modulations. The simulated results show that the correct modulation identification is possible to a lower bound of 5 dB. The identification percentage has been analyzed based on the confusion matrix. When SNR is above 5 dB, the probability of detection of the proposed system is more than 0.968. The performance of the proposed scheme has been compared with existing methods and found it will identify all digital modulation schemes with low SNR.

  13. Thailand's universal coverage scheme and its impact on health-seeking behavior.

    Science.gov (United States)

    Paek, Seung Chun; Meemon, Natthani; Wan, Thomas T H

    2016-01-01

    Thailand's Universal Coverage Scheme (UCS) has improved healthcare access and utilization since its initial introduction in 2002. However, a substantial proportion of beneficiaries has utilized care outside the UCS boundaries. Because low utilization may be an indication of a policy gap between people's health needs and the services available to them, we investigated the patterns of health-seeking behavior and their social/contextual determinants among UCS beneficiaries in the year 2013. The study findings from the outpatient analysis showed that the use of designated facilities for care was significantly higher in low-income, unemployed, and chronic status groups. The findings from the inpatient analysis showed that the use of designated facilities for care was significantly higher in the low-income, older, and female groups. Particularly, for the low-income group, we found that they (1) had greater health care needs, (2) received a larger number of services from designated facilities, and (3) paid the least for both inpatient and outpatient services. This pro-poor impact indicated that the UCS could adequately respond to beneficiaries' needs in terms of vertical equity. However, we also found that a considerable proportion of beneficiaries utilized out-of-network services, which implied a lack of universal access to policy services from a horizontal equity point of view. Thus, the policy should continue expanding and diversifying its service benefits to strengthen horizontal equity. Particularly, private sector involvement for those who are employed as well as the increased unmet health needs of those in rural areas may be important policy priorities for that. Lastly, methodological issues such as severity adjustment and a detailed categorization of health-seeking behaviors need to be further considered for a better understanding of the policy impact.

  14. Universal Detection and Identification of Avian Influenza Virus by Use of Resequencing Microarrays

    Science.gov (United States)

    2009-04-01

    Recent outbreaks of Nipah virus , severe acute respiratory syndrome virus , and avian influenza virus reiterate the impor- tance of zoonotic microbes as...Society for Microbiology. All Rights Reserved. Universal Detection and Identification of Avian Influenza Virus by Use of Resequencing Microarrays...been, and continue to emerge as, threats to human health. The recent outbreaks of highly pathogenic avian influenza virus in bird populations and the

  15. Cost-Prioritized Droop Schemes for Autonomous AC Microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2015-01-01

    This paper presents two cost-prioritized droop sche- mes for distributed generators (DGs) in a rural or islanded microgrid. Dispatch prioritization of the schemes allows autonomous identification of the appropriate DGs for generation, in accordance to the overall load conditions of the microgrid....

  16. GPU-Accelerated Stony-Brook University 5-class Microphysics Scheme in WRF

    Science.gov (United States)

    Mielikainen, J.; Huang, B.; Huang, A.

    2011-12-01

    The Weather Research and Forecasting (WRF) model is a next-generation mesoscale numerical weather prediction system. Microphysics plays an important role in weather and climate prediction. Several bulk water microphysics schemes are available within the WRF, with different numbers of simulated hydrometeor classes and methods for estimating their size fall speeds, distributions and densities. Stony-Brook University scheme (SBU-YLIN) is a 5-class scheme with riming intensity predicted to account for mixed-phase processes. In the past few years, co-processing on Graphics Processing Units (GPUs) has been a disruptive technology in High Performance Computing (HPC). GPUs use the ever increasing transistor count for adding more processor cores. Therefore, GPUs are well suited for massively data parallel processing with high floating point arithmetic intensity. Thus, it is imperative to update legacy scientific applications to take advantage of this unprecedented increase in computing power. CUDA is an extension to the C programming language offering programming GPU's directly. It is designed so that its constructs allow for natural expression of data-level parallelism. A CUDA program is organized into two parts: a serial program running on the CPU and a CUDA kernel running on the GPU. The CUDA code consists of three computational phases: transmission of data into the global memory of the GPU, execution of the CUDA kernel, and transmission of results from the GPU into the memory of CPU. CUDA takes a bottom-up point of view of parallelism is which thread is an atomic unit of parallelism. Individual threads are part of groups called warps, within which every thread executes exactly the same sequence of instructions. To test SBU-YLIN, we used a CONtinental United States (CONUS) benchmark data set for 12 km resolution domain for October 24, 2001. A WRF domain is a geographic region of interest discretized into a 2-dimensional grid parallel to the ground. Each grid point has

  17. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  18. Closed-loop System Identification with New Sensors

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, K; Stoustrup, Jakob

    2008-01-01

    This paper deals with system identification of new system dynamics revealed by online introduction of new sensors in existing multi-variable linear control systems. The so-called "Hansen Scheme" utilises the dual Youla-Kucera parameterisation of all systems stabilised by a given linear controller...... to transform closed-loop system identification problems into open-loop-like problems. We show that this scheme can be formally extended to accomodate extra sensors in a nice way. The approach is illustrated on a simple simulation example....

  19. The Role of Speaker Identification in Korean University Students' Attitudes towards Five Varieties of English

    Science.gov (United States)

    Yook, Cheongmin; Lindemann, Stephanie

    2013-01-01

    This study investigates how the attitudes of 60 Korean university students towards five varieties of English are affected by the identification of the speaker's nationality and ethnicity. The study employed both a verbal guise technique and questions eliciting overt beliefs and preferences related to learning English. While the majority of the…

  20. Knowing One's Place: Parental Educational Background Influences Social Identification with Academia, Test Anxiety, and Satisfaction with Studying at University.

    Science.gov (United States)

    Janke, Stefan; Rudert, Selma C; Marksteiner, Tamara; Dickhäuser, Oliver

    2017-01-01

    First-generation students (i.e., students whose parents did not attend university) often experience difficulties fitting in with the social environment at universities. This experience of personal misfit is supposedly associated with an impaired social identification with their aspired in-group of academics compared to continuing-generation students (i.e., students with at least one parent with an academic degree. In this article, we investigate how the postulated differences in social identification with the group of academics affect first-generation students' satisfaction with studying and test anxiety over time. We assume that first-generation students' impaired social identification with the group of academics leads to decreased satisfaction with studying and aggravated test anxiety over the course of the first academic year. In a longitudinal study covering students' first year at a German university, we found that continuing-generation students consistently identified more strongly with their new in-group of academics than first-generation students. The influence of social identification on test anxiety and satisfaction with studying differed between groups. For continuing-generation students, social identification with the group of academics buffered test anxiety and helped them maintain satisfaction with studying over time. We could not find these direct effects within the group of first-generation students. Instead, first-generation students were more sensitive to effects of test anxiety on satisfaction with studying and vice versa over time. The results suggest that first-generation students might be more sensitive to the anticipation of academic failure. Furthermore, continuing-generation students' social identification with the group of academics might have buffered them against the impact of negative experiences during the entry phase at university. Taken together, our findings underscore that deficit-driven approaches focusing solely on first

  1. Distance tracking scheme for seamless handover in IMS-based ...

    African Journals Online (AJOL)

    This paper proposes a fast and seamless handover scheme for systems based on IP Multimedia Subsystem (IMS) architectural framework with Universal Mobile Telecommunications System (UMTS) access network. In the scheme the location, direction and movement pattern of a Mobile Node (MN) in a network cell are ...

  2. Optimum wireless sensor deployment scheme for structural health monitoring: a simulation study

    International Nuclear Information System (INIS)

    Liu, Chengyin; Fang, Kun; Teng, Jun

    2015-01-01

    With the rapid advancements in smart sensing technology and wireless communication technology, the wireless sensor network (WSN) offers an alternative solution to structural health monitoring (SHM). In WSNs, dense deployment of wireless nodes aids the identification of structural dynamic characteristics, while data transmission is a significant issue since wireless channels typically have a lower bandwidth and a limited power supply. This paper provides a wireless sensor deployment optimization scheme for SHM, in terms of both energy consumption and modal identification accuracy. A spherical energy model is established to formulate the energy consumption within a WSN. The optimal number of sensors and their locations are obtained through solving a multi-objective function with weighting factors on energy consumption and modal identification accuracy using a genetic algorithm (GA). Simulation and comparison results with traditional sensor deployment methods demonstrate the efficiency of the proposed optimization scheme. (paper)

  3. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  4. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  5. Knowing One’s Place: Parental Educational Background Influences Social Identification with Academia, Test Anxiety, and Satisfaction with Studying at University

    Directory of Open Access Journals (Sweden)

    Stefan Janke

    2017-08-01

    Full Text Available First-generation students (i.e., students whose parents did not attend university often experience difficulties fitting in with the social environment at universities. This experience of personal misfit is supposedly associated with an impaired social identification with their aspired in-group of academics compared to continuing-generation students (i.e., students with at least one parent with an academic degree. In this article, we investigate how the postulated differences in social identification with the group of academics affect first-generation students’ satisfaction with studying and test anxiety over time. We assume that first-generation students’ impaired social identification with the group of academics leads to decreased satisfaction with studying and aggravated test anxiety over the course of the first academic year. In a longitudinal study covering students’ first year at a German university, we found that continuing-generation students consistently identified more strongly with their new in-group of academics than first-generation students. The influence of social identification on test anxiety and satisfaction with studying differed between groups. For continuing-generation students, social identification with the group of academics buffered test anxiety and helped them maintain satisfaction with studying over time. We could not find these direct effects within the group of first-generation students. Instead, first-generation students were more sensitive to effects of test anxiety on satisfaction with studying and vice versa over time. The results suggest that first-generation students might be more sensitive to the anticipation of academic failure. Furthermore, continuing-generation students’ social identification with the group of academics might have buffered them against the impact of negative experiences during the entry phase at university. Taken together, our findings underscore that deficit-driven approaches

  6. Knowing One’s Place: Parental Educational Background Influences Social Identification with Academia, Test Anxiety, and Satisfaction with Studying at University

    Science.gov (United States)

    Janke, Stefan; Rudert, Selma C.; Marksteiner, Tamara; Dickhäuser, Oliver

    2017-01-01

    First-generation students (i.e., students whose parents did not attend university) often experience difficulties fitting in with the social environment at universities. This experience of personal misfit is supposedly associated with an impaired social identification with their aspired in-group of academics compared to continuing-generation students (i.e., students with at least one parent with an academic degree. In this article, we investigate how the postulated differences in social identification with the group of academics affect first-generation students’ satisfaction with studying and test anxiety over time. We assume that first-generation students’ impaired social identification with the group of academics leads to decreased satisfaction with studying and aggravated test anxiety over the course of the first academic year. In a longitudinal study covering students’ first year at a German university, we found that continuing-generation students consistently identified more strongly with their new in-group of academics than first-generation students. The influence of social identification on test anxiety and satisfaction with studying differed between groups. For continuing-generation students, social identification with the group of academics buffered test anxiety and helped them maintain satisfaction with studying over time. We could not find these direct effects within the group of first-generation students. Instead, first-generation students were more sensitive to effects of test anxiety on satisfaction with studying and vice versa over time. The results suggest that first-generation students might be more sensitive to the anticipation of academic failure. Furthermore, continuing-generation students’ social identification with the group of academics might have buffered them against the impact of negative experiences during the entry phase at university. Taken together, our findings underscore that deficit-driven approaches focusing solely on first

  7. Identification of Polymers in University Class Experiments.

    Science.gov (United States)

    Bowen, Humphry J. M.

    1990-01-01

    The apparatus, reagents, preliminary classification, nomenclature, acquisition, and procedures used in the identification of synthetic polymers are described. Specific tests for the identification of the presence of hydrocarbons, chlorine, fluorine, sulfur, and nitrogen and the absence of halogens and sulfur are discussed. (CW)

  8. Social health insurance contributes to universal coverage in South Africa, but generates inequities: survey among members of a government employee insurance scheme

    OpenAIRE

    Goudge, Jane; Alaba, Olufunke A.; Govender, Veloshnee; Harris, Bronwyn; Nxumalo, Nonhlanhla; Chersich, Matthew F.

    2018-01-01

    Background Many low- and middle-income countries are reforming their health financing mechanisms as part of broader strategies to achieve universal health coverage (UHC). Voluntary social health insurance, despite evidence of resulting inequities, is attractive to policy makers as it generates additional funds for health, and provides access to a greater range of benefits for the formally employed. The South African government introduced a voluntary health insurance scheme (GEMS) for governme...

  9. Incremental Closed-loop Identification of Linear Parameter Varying Systems

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, Klaus

    2011-01-01

    , closed-loop system identification is more difficult than open-loop identification. In this paper we prove that the so-called Hansen Scheme, a technique known from linear time-invariant systems theory for transforming closed-loop system identification problems into open-loop-like problems, can be extended...

  10. Simple, Reliable, and Cost-Effective Yeast Identification Scheme for the Clinical Laboratory

    OpenAIRE

    Koehler, Ann P.; Chu, Kai-Cheong; Houang, Elizabeth T. S.; Cheng, Augustine F. B.

    1999-01-01

    The appearance of colonies on the chromogenic medium CHROMagar Candida combined with observation of morphology on corn meal–Tween 80 agar was used for the identification of 353 clinical yeast isolates. The results were compared with those obtained with API yeast identification kits. The accuracy of identification and the turnaround time were equivalent for each method, and our cultural method was less expensive.

  11. Feature extraction and sensor selection for NPP initiating event identification

    International Nuclear Information System (INIS)

    Lin, Ting-Han; Wu, Shun-Chi; Chen, Kuang-You; Chou, Hwai-Pwu

    2017-01-01

    Highlights: • A two-stage feature extraction scheme for NPP initiating event identification. • With stBP, interrelations among the sensors can be retained for identification. • With dSFS, sensors that are crucial for identification can be efficiently selected. • Efficacy of the scheme is illustrated with data from the Maanshan NPP simulator. - Abstract: Initiating event identification is essential in managing nuclear power plant (NPP) severe accidents. In this paper, a novel two-stage feature extraction scheme that incorporates the proposed sensor type-wise block projection (stBP) and deflatable sequential forward selection (dSFS) is used to elicit the discriminant information in the data obtained from various NPP sensors to facilitate event identification. With the stBP, the primal features can be extracted without eliminating the interrelations among the sensors of the same type. The extracted features are then subjected to a further dimensionality reduction by selecting the sensors that are most relevant to the events under consideration. This selection is not easy, and a combinatorial optimization technique is normally required. With the dSFS, an optimal sensor set can be found with less computational load. Moreover, its sensor deflation stage allows sensors in the preselected set to be iteratively refined to avoid being trapped into a local optimum. Results from detailed experiments containing data of 12 event categories and a total of 112 events generated with a Taiwan’s Maanshan NPP simulator are presented to illustrate the efficacy of the proposed scheme.

  12. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  13. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  14. Closed-loop Identification for Control of Linear Parameter Varying Systems

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, Klaus

    2014-01-01

    , closed- loop system identification is more difficult than open-loop identification. In this paper we prove that the so-called Hansen Scheme, a technique known from linear time-invariant systems theory for transforming closed-loop system identification problems into open-loop-like problems, can...

  15. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  16. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  17. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  18. Application of stable adaptive schemes to nuclear reactor systems, (2)

    International Nuclear Information System (INIS)

    Kukuda, Toshio

    1979-01-01

    The parameter identification and adaptive control schemes applied in a previous study to a nonlinear point reactor are extended to the case of a loosely-coupled-core reactor with internal feedbacks, constituting a nonlinear overall system. Both schemes are shown to be stable, with the system newly represented on the pattern of the Model Reference Adaptive System (MRAS) with use made of the Lyapunov's method. For either parameter identification or adaptive control of a loosely-coupled-core reactor, there exists no canonical form of multiple input-multiple output system which can be directly applied for deriving the MRAS with the matrix version of the Kalman-Yakubovich lemma as it was in the case of the point reactor. This difficulty is circumvented by the practical assumption that the neutron density can be directly measured on each core as reactivity change is applied as input into the coupled core as a whole. For parameter identification, the model parameters are adaptively adjusted to those of each core, while for the adaptive control, plant parameters of each core can be adaptively compensated, again through control inputs, to asymptotically reduce the output error between the model and the plant. The point reactor is shown to correspond to a special case. (author)

  19. Advanced neural network-based computational schemes for robust fault diagnosis

    CERN Document Server

    Mrugalski, Marcin

    2014-01-01

    The present book is devoted to problems of adaptation of artificial neural networks to robust fault diagnosis schemes. It presents neural networks-based modelling and estimation techniques used for designing robust fault diagnosis schemes for non-linear dynamic systems. A part of the book focuses on fundamental issues such as architectures of dynamic neural networks, methods for designing of neural networks and fault diagnosis schemes as well as the importance of robustness. The book is of a tutorial value and can be perceived as a good starting point for the new-comers to this field. The book is also devoted to advanced schemes of description of neural model uncertainty. In particular, the methods of computation of neural networks uncertainty with robust parameter estimation are presented. Moreover, a novel approach for system identification with the state-space GMDH neural network is delivered. All the concepts described in this book are illustrated by both simple academic illustrative examples and practica...

  20. Application of Intel Many Integrated Core (MIC) architecture to the Yonsei University planetary boundary layer scheme in Weather Research and Forecasting model

    Science.gov (United States)

    Huang, Melin; Huang, Bormin; Huang, Allen H.

    2014-10-01

    The Weather Research and Forecasting (WRF) model provided operational services worldwide in many areas and has linked to our daily activity, in particular during severe weather events. The scheme of Yonsei University (YSU) is one of planetary boundary layer (PBL) models in WRF. The PBL is responsible for vertical sub-grid-scale fluxes due to eddy transports in the whole atmospheric column, determines the flux profiles within the well-mixed boundary layer and the stable layer, and thus provide atmospheric tendencies of temperature, moisture (including clouds), and horizontal momentum in the entire atmospheric column. The YSU scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. To accelerate the computation process of the YSU scheme, we employ Intel Many Integrated Core (MIC) Architecture as it is a multiprocessor computer structure with merits of efficient parallelization and vectorization essentials. Our results show that the MIC-based optimization improved the performance of the first version of multi-threaded code on Xeon Phi 5110P by a factor of 2.4x. Furthermore, the same CPU-based optimizations improved the performance on Intel Xeon E5-2603 by a factor of 1.6x as compared to the first version of multi-threaded code.

  1. Parameters identification and adaptive full state hybrid projective synchronization of chaotic (hyper-chaotic) systems

    International Nuclear Information System (INIS)

    Hu Manfeng; Xu Zhenyuan; Zhang Rong; Hu Aihua

    2007-01-01

    Based on the active control idea and the invariance principle of differential equations, a general scheme of adaptive full state hybrid projective synchronization (FSHPS) and parameters identification of a class of chaotic (hyper-chaotic) systems with linearly dependent uncertain parameters is proposed in this Letter. With this effective scheme parameters identification and FSHPS of chaotic and hyper-chaotic systems can be realized simultaneously. Numerical simulations on the chaotic Chen system and the hyper-chaotic Chen system are presented to verify the effectiveness of the proposed scheme

  2. Nondestructive identification of the Bell diagonal state

    International Nuclear Information System (INIS)

    Jin Jiasen; Yu Changshui; Song Heshan

    2011-01-01

    We propose a scheme for identifying an unknown Bell diagonal state. In our scheme the measurements are performed on the probe qubits instead of the Bell diagonal state. The distinct advantage is that the quantum state of the evolved Bell diagonal state ensemble plus probe states will still collapse on the original Bell diagonal state ensemble after the measurement on probe states; i.e., our identification is quantum state nondestructive. How to realize our scheme in the framework of cavity electrodynamics is also shown.

  3. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    Science.gov (United States)

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Cattle identification based in biometric features of the muzzle

    OpenAIRE

    Monteiro, Marta; Cadavez, Vasco; Monteiro, Fernando C.

    2015-01-01

    Cattle identification has been a serious problem for breeding association. Muzzle pattern or nose print has the same characteristic with the human fingerprint which is the most popular biometric marker. The identification accuracy and the processing time are two key challenges of any cattle identification methodology. This paper presents a robust and fast cattle identification scheme from muzzle images using Speed-up Robust Features matching. The matching refinement technique based on the mat...

  5. Student and Staff Perceptions of a Vacation Research Assistantship Scheme

    Science.gov (United States)

    Penn, Felicity; Stephens, Danielle; Morgan, Jessica; Upton, Penney; Upton, Dominic

    2013-01-01

    There is a push for universities to equip graduates with desirable employability skills and "hands-on" experience. This article explores the perceptions of students and staff experiences of a research assistantship scheme. Nine students from the University of Worcester were given the opportunity to work as a student vacation researcher…

  6. A Support Vector Machine-Based Gender Identification Using Speech Signal

    Science.gov (United States)

    Lee, Kye-Hwan; Kang, Sang-Ick; Kim, Deok-Hwan; Chang, Joon-Hyuk

    We propose an effective voice-based gender identification method using a support vector machine (SVM). The SVM is a binary classification algorithm that classifies two groups by finding the voluntary nonlinear boundary in a feature space and is known to yield high classification performance. In the present work, we compare the identification performance of the SVM with that of a Gaussian mixture model (GMM)-based method using the mel frequency cepstral coefficients (MFCC). A novel approach of incorporating a features fusion scheme based on a combination of the MFCC and the fundamental frequency is proposed with the aim of improving the performance of gender identification. Experimental results demonstrate that the gender identification performance using the SVM is significantly better than that of the GMM-based scheme. Moreover, the performance is substantially improved when the proposed features fusion technique is applied.

  7. Towards a universal certification scheme for NDT personnel

    International Nuclear Information System (INIS)

    Barnett, David

    2009-01-01

    Australia has been involved in the United Nations Development Program (UNDP) in SE Asia since 1980. In doing so it has provided assistance to emerging nations in the region through training and skills development of nondestructive testing personnel. As a result of involvement in this program consensus was reached between nations that the way forward in terms of qualification and certification was to adopt the guidelines being developed by ISO Standards Committee, ISO TC 135 SC7 for a new international standards, ISO 9712. In doing so, the member countries of the IAEA/UN Development Project recognised the benefits that harmonisation of certification schemes would bring in promoting trade in the region and the recognition of the skills of NDT personnel. ISO 9712 was first issued in 1992. (author)

  8. The design of IPv6's transitional scheme in university

    Science.gov (United States)

    Li, Biqing; Li, Zhao

    2017-05-01

    According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.

  9. Readout scheme for the Baby-MIND detector

    CERN Document Server

    Noah, Etam; Cadoux, F; Favre, Y; Martinez, B; Nicola, L; Parsa, S; Rayner, M; Antonova, M; Fedotov, S; Izmaylov, A; Kleymenova, A; Khabibullin, M; Khotyantsev, A; Kudenko, Y; Likhacheva, V; Mefodiev, A; Mineev, O; Ovsiannikova, T; Shaykhiev, A; Suvorov, S; Yershov, N; Tsenov, R

    2016-01-01

    A readout scheme has been designed for the plastic scintillator bars of the Baby-MIND detector modules. This spectrometer will measure momentum and identify the charge of 1 GeV/c muons with magnetized iron plates interleaved with detector modules. One challenge the detector aims to address is that of keeping high charge identification efficiencies for momenta below 1 GeV/c where multiple scattering in the iron plates degrades momentum resolution. A front-end board has been developed, with 3 CITIROC readout chips per board and up to 96 channels. Hamamatsu MPPCs type S12571-025C photosensors were chosen for readout of wavelength shifting fibers embedded in plastic scintillators. Procurement of the MPPCs has been carried out to instrument 3000 channels in total. Design choices and first results of this readout scheme are presented.

  10. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  11. Stakeholder Groups of Public and Private Universities in the Czech Republic – Identification, Categorization and Prioritization

    Directory of Open Access Journals (Sweden)

    Slabá Marie

    2015-09-01

    Full Text Available With regard to changes in the environment of tertiary education and tertiary educational systems, universities are now unlikely to succeed as ‘separated closed’ institutions that are unresponsive to their environment and stakeholders. Stakeholder analysis is considered as an important part of university management and marketing and universities have to take care of key stakeholder groups and build long term relationships with them. This paper focuses on the stakeholder analysis and adopts the stake-holder theory and analysis for the needs of the Czech market of tertiary education. This paper analyses results of the author’s online questionnaire that provided the input for data analysis deploying basic descriptive analysis and first steps of stakeholder analysis – identification, categorization and prioritization. Results of author’s research show that there are only slight differences between public and private universities and their perspective concerning generic stakeholder groups of universities. However the research revealed two controversial stakeholder groups – donors and competitors. In comparison with other stakeholder groups perception of these two stakeholder groups by public and private universities is very different. Stakeholder groups of public and private universities were categorized into four basic groups - primary internal stakeholder groups, primary external stakeholder groups, secondary internal stakeholder groups, and secondary external stakeholder groups. Primary internal and external stakeholder groups which are crucial for survival of universities are the most important stakeholder groups for universities. The author identified ten most important stakeholder groups for public and private universities separately, based on assigned priorities that will be used for further research.

  12. Social health insurance contributes to universal coverage in South Africa, but generates inequities: survey among members of a government employee insurance scheme.

    Science.gov (United States)

    Goudge, Jane; Alaba, Olufunke A; Govender, Veloshnee; Harris, Bronwyn; Nxumalo, Nonhlanhla; Chersich, Matthew F

    2018-01-04

    Many low- and middle-income countries are reforming their health financing mechanisms as part of broader strategies to achieve universal health coverage (UHC). Voluntary social health insurance, despite evidence of resulting inequities, is attractive to policy makers as it generates additional funds for health, and provides access to a greater range of benefits for the formally employed. The South African government introduced a voluntary health insurance scheme (GEMS) for government employees in 2005 with the aim of improving access to care and extending health coverage. In this paper we ask whether the new scheme has assisted in efforts to move towards UHC. Using a cross-sectional survey across four of South Africa's nine provinces, we interviewed 1329 government employees, from the education and health sectors. Data were collected on socio-demographics, insurance coverage, health status and utilisation of health care. Multivariate logistic regression was used to determine if service utilisation was associated with insurance status. A quarter of respondents remained uninsured, even higher among 20-29 year olds (46%) and lower-skilled employees (58%). In multivariate analysis, the odds of an outpatient visit and hospital admission for the uninsured was 0.3 fold that of the insured. Cross-subsidisation within the scheme has provided lower-paid civil servants with improved access to outpatient care at private facilities and chronic medication, where their outpatient (0.54 visits/month) and inpatient utilisation (10.1%/year) approximates that of the overall population (29.4/month and 12.2% respectively). The scheme, however, generated inequities in utilisation among its members due to its differential benefit packages, with, for example, those with the most benefits having 1.0 outpatient visits/month compared to 0.6/month with lowest benefits. By introducing the scheme, the government chose to prioritise access to private sector care for government employees, over

  13. Providing Universal Health Insurance Coverage in Nigeria.

    Science.gov (United States)

    Okebukola, Peter O; Brieger, William R

    2016-07-07

    Despite a stated goal of achieving universal coverage, the National Health Insurance Scheme of Nigeria had achieved only 4% coverage 12 years after it was launched. This study assessed the plans of the National Health Insurance Scheme to achieve universal health insurance coverage in Nigeria by 2015 and discusses the challenges facing the scheme in achieving insurance coverage. In-depth interviews from various levels of the health-care system in the country, including providers, were conducted. The results of the analysis suggest that challenges to extending coverage include the difficulty in convincing autonomous state governments to buy into the scheme and an inadequate health workforce that might not be able to meet increased demand. Recommendations for increasing the scheme's coverage include increasing decentralization and strengthening human resources for health in the service delivery systems. Strong political will is needed as a catalyst to achieving these goals. © The Author(s) 2016.

  14. Structure identification of an uncertain network coupled with complex-variable chaotic systems via adaptive impulsive control

    International Nuclear Information System (INIS)

    Liu Dan-Feng; Wu Zhao-Yan; Ye Qing-Ling

    2014-01-01

    In this paper, structure identification of an uncertain network coupled with complex-variable chaotic systems is investigated. Both the topological structure and the system parameters can be unknown and need to be identified. Based on impulsive stability theory and the Lyapunov function method, an impulsive control scheme combined with an adaptive strategy is adopted to design effective and universal network estimators. The restriction on the impulsive interval is relaxed by adopting an adaptive strategy. Further, the proposed method can monitor the online switching topology effectively. Several numerical simulations are provided to illustrate the effectiveness of the theoretical results. (general)

  15. The Effect of a Monitoring Scheme on Tutorial Attendance and Assignment Submission

    Science.gov (United States)

    Burke, Grainne; Mac an Bhaird, Ciaran; O'Shea, Ann

    2013-01-01

    We report on the implementation of a monitoring scheme by the Department of Mathematics and Statistics at the National University of Ireland Maynooth. The scheme was introduced in an attempt to increase the level and quality of students' engagement with certain aspects of their undergraduate course. It is well documented that students with higher…

  16. Universal programmable quantum circuit schemes to emulate an operator

    Energy Technology Data Exchange (ETDEWEB)

    Daskin, Anmer; Grama, Ananth; Kollias, Giorgos [Department of Computer Science, Purdue University, West Lafayette, Indiana 47907 (United States); Kais, Sabre [Department of Chemistry, Department of Physics and Birck Nanotechnology Center, Purdue University, West Lafayette, Indiana 47907 (United States); Qatar Environment and Energy Research Institute, Doha (Qatar)

    2012-12-21

    Unlike fixed designs, programmable circuit designs support an infinite number of operators. The functionality of a programmable circuit can be altered by simply changing the angle values of the rotation gates in the circuit. Here, we present a new quantum circuit design technique resulting in two general programmable circuit schemes. The circuit schemes can be used to simulate any given operator by setting the angle values in the circuit. This provides a fixed circuit design whose angles are determined from the elements of the given matrix-which can be non-unitary-in an efficient way. We also give both the classical and quantum complexity analysis for these circuits and show that the circuits require a few classical computations. For the electronic structure simulation on a quantum computer, one has to perform the following steps: prepare the initial wave function of the system; present the evolution operator U=e{sup -iHt} for a given atomic and molecular Hamiltonian H in terms of quantum gates array and apply the phase estimation algorithm to find the energy eigenvalues. Thus, in the circuit model of quantum computing for quantum chemistry, a crucial step is presenting the evolution operator for the atomic and molecular Hamiltonians in terms of quantum gate arrays. Since the presented circuit designs are independent from the matrix decomposition techniques and the global optimization processes used to find quantum circuits for a given operator, high accuracy simulations can be done for the unitary propagators of molecular Hamiltonians on quantum computers. As an example, we show how to build the circuit design for the hydrogen molecule.

  17. Universal programmable quantum circuit schemes to emulate an operator

    International Nuclear Information System (INIS)

    Daskin, Anmer; Grama, Ananth; Kollias, Giorgos; Kais, Sabre

    2012-01-01

    Unlike fixed designs, programmable circuit designs support an infinite number of operators. The functionality of a programmable circuit can be altered by simply changing the angle values of the rotation gates in the circuit. Here, we present a new quantum circuit design technique resulting in two general programmable circuit schemes. The circuit schemes can be used to simulate any given operator by setting the angle values in the circuit. This provides a fixed circuit design whose angles are determined from the elements of the given matrix–which can be non-unitary–in an efficient way. We also give both the classical and quantum complexity analysis for these circuits and show that the circuits require a few classical computations. For the electronic structure simulation on a quantum computer, one has to perform the following steps: prepare the initial wave function of the system; present the evolution operator U=e −iHt for a given atomic and molecular Hamiltonian H in terms of quantum gates array and apply the phase estimation algorithm to find the energy eigenvalues. Thus, in the circuit model of quantum computing for quantum chemistry, a crucial step is presenting the evolution operator for the atomic and molecular Hamiltonians in terms of quantum gate arrays. Since the presented circuit designs are independent from the matrix decomposition techniques and the global optimization processes used to find quantum circuits for a given operator, high accuracy simulations can be done for the unitary propagators of molecular Hamiltonians on quantum computers. As an example, we show how to build the circuit design for the hydrogen molecule.

  18. A disclosure scheme for protecting the victims of domestic violence.

    Science.gov (United States)

    Griffith, Richard

    2017-06-08

    Richard Griffith, Senior Lecturer in Health Law at Swansea University, explains how the Domestic Violence Disclosure Scheme aims to protect potential victims by allowing disclosure of a partner's previous crimes.

  19. Sparsity regularization for parameter identification problems

    International Nuclear Information System (INIS)

    Jin, Bangti; Maass, Peter

    2012-01-01

    The investigation of regularization schemes with sparsity promoting penalty terms has been one of the dominant topics in the field of inverse problems over the last years, and Tikhonov functionals with ℓ p -penalty terms for 1 ⩽ p ⩽ 2 have been studied extensively. The first investigations focused on regularization properties of the minimizers of such functionals with linear operators and on iteration schemes for approximating the minimizers. These results were quickly transferred to nonlinear operator equations, including nonsmooth operators and more general function space settings. The latest results on regularization properties additionally assume a sparse representation of the true solution as well as generalized source conditions, which yield some surprising and optimal convergence rates. The regularization theory with ℓ p sparsity constraints is relatively complete in this setting; see the first part of this review. In contrast, the development of efficient numerical schemes for approximating minimizers of Tikhonov functionals with sparsity constraints for nonlinear operators is still ongoing. The basic iterated soft shrinkage approach has been extended in several directions and semi-smooth Newton methods are becoming applicable in this field. In particular, the extension to more general non-convex, non-differentiable functionals by variational principles leads to a variety of generalized iteration schemes. We focus on such iteration schemes in the second part of this review. A major part of this survey is devoted to applying sparsity constrained regularization techniques to parameter identification problems for partial differential equations, which we regard as the prototypical setting for nonlinear inverse problems. Parameter identification problems exhibit different levels of complexity and we aim at characterizing a hierarchy of such problems. The operator defining these inverse problems is the parameter-to-state mapping. We first summarize some

  20. Systematic Luby Transform codes as incremental redundancy scheme

    CSIR Research Space (South Africa)

    Grobler, TL

    2011-09-01

    Full Text Available Transform Codes as Incremental Redundancy Scheme T. L. Grobler y, E. R. Ackermann y, J. C. Olivier y and A. J. van Zylz Department of Electrical, Electronic and Computer Engineering University of Pretoria, Pretoria 0002, South Africa Email: trienkog...@gmail.com, etienne.ackermann@ieee.org yDefence, Peace, Safety and Security (DPSS) Council for Scientific and Industrial Research (CSIR), Pretoria 0001, South Africa zDepartment of Mathematics and Applied Mathematics University of Pretoria, Pretoria 0002, South...

  1. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  2. How Governance Regimes Shape the Implementation of Water Reuse Schemes

    Directory of Open Access Journals (Sweden)

    Jos Frijns

    2016-12-01

    Full Text Available The governance dimensions of water reuse scheme development and operation, such as policies and regulatory frameworks, and public involvement and stakeholder collaboration, can serve to both facilitate and constrain wider adoption of water reuse practices. This paper explores the significance and underlying structure of the key governance challenges facing the water reuse sector in Europe. It presents empirical evidence from interviews and focus group sessions conducted at four water reuse schemes: an indirect potable reuse scheme at Torreele (Belgium, the urban reuse of treated municipal wastewater at the London Olympic Park (United Kingdom and at Sabadell (Spain, and the reuse of agro-industrial effluent for irrigation at Capitanata (Italy. The findings underscore the importance of clarity in policy arrangements around water reuse, as well as of the financial competitiveness of reuse projects compared to alternative water supply options. Operators of water reuse schemes expressed a preference for water quality standards, which focus on appropriateness for use rather than over-emphasise the waters’ origin so that unnecessary treatment and costs can be avoided. Positive public support was widely acknowledged as an important factor in the success or failure of water reuse schemes. We conclude that constructive institutional relationships underpin many of the challenges faced by reuse scheme operators and that greater emphasis should be given to building confidence and gaining trust in water service providers through early identification of how governance regimes shape the viability of new schemes.

  3. Un estudio exploratorio de los esquemas que emplean los alumnos de bachillerato para validar resultados matemáticos/ An exploratory study of schemes used by senior high school students to validate mathematic results

    Directory of Open Access Journals (Sweden)

    Víctor Larios Osorio

    2018-04-01

    Full Text Available Mathematics, as a body of scientific knowledge, includes not only a set of concepts and theories described in books and scientific journals but a procedural knowledge used for solving problems and proving the resulting solution. There is a tool for proving solutions, the so-called mathematical proof, which is worth to be included in the educational process. To complete the study herein described a random stratified sample was selected and given a test demanding to explain the answers given. However, high school students (15-18 years old do not rely on the use of the known proof scheme. For that reason, a diagnostic study was carried out at the Autonomous University of Querétaro (UAQ in order to identify the strategies the students are currently following and finding ways to teach such mathematical proof scheme. The findings are a description of individual students’ argumentative practices and the identification and grouping of the most frequently used proof scheme.

  4. Adaptive PCA based fault diagnosis scheme in imperial smelting process.

    Science.gov (United States)

    Hu, Zhikun; Chen, Zhiwen; Gui, Weihua; Jiang, Bin

    2014-09-01

    In this paper, an adaptive fault detection scheme based on a recursive principal component analysis (PCA) is proposed to deal with the problem of false alarm due to normal process changes in real process. Our further study is also dedicated to develop a fault isolation approach based on Generalized Likelihood Ratio (GLR) test and Singular Value Decomposition (SVD) which is one of general techniques of PCA, on which the off-set and scaling fault can be easily isolated with explicit off-set fault direction and scaling fault classification. The identification of off-set and scaling fault is also applied. The complete scheme of PCA-based fault diagnosis procedure is proposed. The proposed scheme is first applied to Imperial Smelting Process, and the results show that the proposed strategies can be able to mitigate false alarms and isolate faults efficiently. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  5. Microarrays for Universal Detection and Identification of Phytoplasmas

    DEFF Research Database (Denmark)

    Nicolaisen, Mogens; Nyskjold, Henriette; Bertaccini, Assunta

    2013-01-01

    Detection and identification of phytoplasmas is a laborious process often involving nested PCR followed by restriction enzyme analysis and fine-resolution gel electrophoresis. To improve throughput, other methods are needed. Microarray technology offers a generic assay that can potentially detect...... and differentiate all types of phytoplasmas in one assay. The present protocol describes a microarray-based method for identification of phytoplasmas to 16Sr group level....

  6. New Course Design: Classification Schemes and Information Architecture.

    Science.gov (United States)

    Weinberg, Bella Hass

    2002-01-01

    Describes a course developed at St. John's University (New York) in the Division of Library and Information Science that relates traditional classification schemes to information architecture and Web sites. Highlights include functional aspects of information architecture, that is, the way content is structured; assignments; student reactions; and…

  7. A risk-scoring scheme for suicide attempts among patients with bipolar disorder in a Thai patient cohort

    Directory of Open Access Journals (Sweden)

    Patumanond J

    2012-04-01

    Full Text Available Chidchanok Ruengorn1,2, Kittipong Sanichwankul3, Wirat Niwatananun2, Suwat Mahatnirunkul3, Wanida Pumpaisalchai3, Jayanton Patumanond11Clinical Epidemiology Program, Faculty of Medicine, Chiang Mai University, Chiang Mai, Thailand; 2Department of Pharmaceutical Care, Faculty of Pharmacy, Chiang Mai University, Chiang Mai, Thailand; 3Suanprung Psychiatric Hospital, Chiang Mai, ThailandBackground: In Thailand, risk factors associated with suicide attempts in bipolar disorder (BD are rarely investigated, nor has a specific risk-scoring scheme to assist in the identification of BD patients at risk for attempting suicide been proposed.Objective: To develop a simple risk-scoring scheme to identify patients with BD who may be at risk for attempting suicide.Methods: Medical files of 489 patients diagnosed with BD at Suanprung Psychiatric Hospital between October 2006 and May 2009 were reviewed. Cases included BD patients hospitalized due to attempted suicide (n = 58, and seven controls were selected (per suicide case among BD in- and out-patients who did not attempt suicide, with patients being visited the same day or within 1 week of case study (n = 431. Broad sociodemographic and clinical factors were gathered and analyzed using multivariate logistic regression, to obtain a set of risk factors. Scores for each indicator were weighted, assigned, and summed to create a total risk score, which was divided into low, moderate, and high-risk suicide attempt groups.Results: Six statistically significant indicators associated with suicide attempts were included in the risk-scoring scheme: depression, psychotic symptom(s, number of previous suicide attempts, stressful life event(s, medication adherence, and BD treatment years. A total risk score (possible range -1.5 to 11.5 explained an 88.6% probability of suicide attempts based on the receiver operating characteristic (ROC analysis. Likelihood ratios of suicide attempts with low risk scores (below 2

  8. Simulating deep convection with a shallow convection scheme

    Directory of Open Access Journals (Sweden)

    C. Hohenegger

    2011-10-01

    Full Text Available Convective processes profoundly affect the global water and energy balance of our planet but remain a challenge for global climate modeling. Here we develop and investigate the suitability of a unified convection scheme, capable of handling both shallow and deep convection, to simulate cases of tropical oceanic convection, mid-latitude continental convection, and maritime shallow convection. To that aim, we employ large-eddy simulations (LES as a benchmark to test and refine a unified convection scheme implemented in the Single-column Community Atmosphere Model (SCAM. Our approach is motivated by previous cloud-resolving modeling studies, which have documented the gradual transition between shallow and deep convection and its possible importance for the simulated precipitation diurnal cycle.

    Analysis of the LES reveals that differences between shallow and deep convection, regarding cloud-base properties as well as entrainment/detrainment rates, can be related to the evaporation of precipitation. Parameterizing such effects and accordingly modifying the University of Washington shallow convection scheme, it is found that the new unified scheme can represent both shallow and deep convection as well as tropical and mid-latitude continental convection. Compared to the default SCAM version, the new scheme especially improves relative humidity, cloud cover and mass flux profiles. The new unified scheme also removes the well-known too early onset and peak of convective precipitation over mid-latitude continental areas.

  9. Identification of Multiple-Mode Linear Models Based on Particle Swarm Optimizer with Cyclic Network Mechanism

    Directory of Open Access Journals (Sweden)

    Tae-Hyoung Kim

    2017-01-01

    Full Text Available This paper studies the metaheuristic optimizer-based direct identification of a multiple-mode system consisting of a finite set of linear regression representations of subsystems. To this end, the concept of a multiple-mode linear regression model is first introduced, and its identification issues are established. A method for reducing the identification problem for multiple-mode models to an optimization problem is also described in detail. Then, to overcome the difficulties that arise because the formulated optimization problem is inherently ill-conditioned and nonconvex, the cyclic-network-topology-based constrained particle swarm optimizer (CNT-CPSO is introduced, and a concrete procedure for the CNT-CPSO-based identification methodology is developed. This scheme requires no prior knowledge of the mode transitions between subsystems and, unlike some conventional methods, can handle a large amount of data without difficulty during the identification process. This is one of the distinguishing features of the proposed method. The paper also considers an extension of the CNT-CPSO-based identification scheme that makes it possible to simultaneously obtain both the optimal parameters of the multiple submodels and a certain decision parameter involved in the mode transition criteria. Finally, an experimental setup using a DC motor system is established to demonstrate the practical usability of the proposed metaheuristic optimizer-based identification scheme for developing a multiple-mode linear regression model.

  10. Participation in the National Health Insurance Scheme Among ...

    African Journals Online (AJOL)

    Background: The National Health Insurance Scheme was established under Act 35 of 1999 by the Federal Government of Nigeria and is aimed at providing easy access to health care for all Nigerians at an affordable cost through various prepayment systems. It is totally committed to achieving universal coverage and ...

  11. A voting-based star identification algorithm utilizing local and global distribution

    Science.gov (United States)

    Fan, Qiaoyun; Zhong, Xuyang; Sun, Junhua

    2018-03-01

    A novel star identification algorithm based on voting scheme is presented in this paper. In the proposed algorithm, the global distribution and local distribution of sensor stars are fully utilized, and the stratified voting scheme is adopted to obtain the candidates for sensor stars. The database optimization is employed to reduce its memory requirement and improve the robustness of the proposed algorithm. The simulation shows that the proposed algorithm exhibits 99.81% identification rate with 2-pixel standard deviations of positional noises and 0.322-Mv magnitude noises. Compared with two similar algorithms, the proposed algorithm is more robust towards noise, and the average identification time and required memory is less. Furthermore, the real sky test shows that the proposed algorithm performs well on the real star images.

  12. Optimization of a middle atmosphere diagnostic scheme

    Science.gov (United States)

    Akmaev, Rashid A.

    1997-06-01

    A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.

  13. BSDB: A New Consistent Designation Scheme for Identifying Objects in Binary and Multiple Stars

    Directory of Open Access Journals (Sweden)

    Kovaleva D. A.

    2015-06-01

    Full Text Available The new consistent scheme for designation of objects in binary and multiple systems, BSDB, is described. It was developed in the frame of the Binary star DataBase, BDB (http://www.inasan.ru, due to necessity of a unified and consistent system for designation of objects in the database, and the name of the designation scheme was derived from that of the database. The BSDB scheme covers all types of observational data. Three classes of objects introduced within the BSDB nomenclature provide correct links between objects and data, what is especially important for complex multiple stellar systems. The final stage of establishing the BSDB scheme is compilation of the Identification List of Binaries, ILB, where all known objects in binary and multiple stars are presented with their BSDB identifiers along with identifiers according to major catalogues and lists.

  14. Human Posture Identification Using a MIMO Array

    Directory of Open Access Journals (Sweden)

    Dai Sasakawa

    2018-03-01

    Full Text Available The elderly are constantly in danger of falling and injuring themselves without anyone realizing it. A safety-monitoring system based on microwaves can ease these concerns. The authors have proposed safety-monitoring systems that use multiple-input multiple-output (MIMO radar to localize persons by capturing their biological activities such as respiration. However, our studies to date have focused on localization, which is easier to achieve than an estimation of human postures. This paper proposes a human posture identification scheme based on height and a Doppler radar cross section (RCS as estimated by a MIMO array. This scheme allows smart home applications to dispense with contact and wearable devices. Experiments demonstrate that this method can identify the supine position (i.e., after a fall with 100% accuracy, and the average identification rate is 95.0%.

  15. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  16. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  17. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-01

    This paper proposes adequate methods to improve the interference mitigation capability of a recently investigated switched-based interference reduction scheme in short-range open-access and over-loaded femtocells. It is assumed that the available orthogonal channels for the femtocell network are distributed among operating access points in close vicinity, where each of which knows its allocated channels a priori. For the case when the feedback links are capacity-limited and the available channels can be universally shared and simultaneously used, the paper presents enhanced schemes to identify a channel to serve the desired scheduled user by maintaining the interference power level within a tolerable range. They attempt to either complement the switched-based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those of the single-threshold switched-based scheme via numerical and simulation results. © 2012 IEEE.

  18. The Politico-Economic Challenges of Ghana’s National Health Insurance Scheme Implementation

    OpenAIRE

    Adam Fusheini

    2016-01-01

    Background National/social health insurance schemes have increasingly been seen in many low- and middle-income countries (LMICs) as a vehicle to universal health coverage (UHC) and a viable alternative funding mechanism for the health sector. Several countries, including Ghana, have thus introduced and implemented mandatory national health insurance schemes (NHIS) as part of reform efforts towards increasing access to health services. Ghana passed mandatory national health insurance (NHI)...

  19. Malfunction diagnosis and applications of stable adaptive schemes for a nuclear reactor system

    International Nuclear Information System (INIS)

    Fukuda, Toshio; Shibata, Heki.

    1979-01-01

    Malfunction diagnosis concerns a method to detect the abnormal phenomena during nuclear reactor operations, while stable adaptive schemes does the application of Model Reference Adaptive System (MRAS) to the nonlinear dynamics of a reactor for parameter identification and control. The new method for the malfunction diagnosis consists of the following ideas; an index defined as the sum of ratios of the square of a factor score to the contribution weight of the factor, which is evaluated by applying the multi-factor analysis technique to the data of the state of nuclear reactor systems like neutron flux, temperature, flow rate and so on. The excess of the index over some given threshold shows the reactor system would be in an abnormal state. Then a theory of optimal filtering by Kalman with the aid of the stochastic approximation is applied to estimate the neutron flux distribution at its abnormal state and subsequently the squared sum of difference between desirable and estimated flux distributions shows the spot at which the abnormal phenomena would have occurred in terms of the peak of its distribution. Parameter identification and adaptive control schemes are presented for a point reactor and a loosely-coupled-core reactor with internal feedbacks which lead to the nonlinearity of the overall system. Both schemes are shown stable with new representations of the systems, which correspond to the nonminimal system representation, in the vein of the MRAS via the Lyapunov's method. For the sake of the parameter identification, model parameters can be adjusted adaptively as soon as measurements start, while plant parameters can also adaptively be compensated through control input to reduce the output error between the model and the plant for the case of the adaptive control. Some experiments of parameter identification for the thermal-hydraulic system are carried out successfully using a simplified channel in which flow rate is varied in a binary form. (J.P.N.)

  20. An evaluation of a Books on Prescription scheme in a UK public library authority.

    Science.gov (United States)

    Furness, Rebecca; Casselden, Biddy

    2012-12-01

    This article discusses an evaluation of a Books on Prescription (BOP) scheme in a UK public library authority. The research was carried out by Rebecca Furness and submitted as a dissertation for the MSc Information and Library Management to Northumbria University. The dissertation was supervised by Biddy Casselden at Northumbria University and was awarded a distinction. The dissertation identified areas for development for BOP schemes and made specific recommendations that could make the schemes more accessible, enabling significant numbers of people to lead more fulfilling lives. Because this study focuses on mental health and the role that UK public libraries have in supporting well-being, it is a good illustration of the wide-ranging nature of subjects welcomed for the Dissertations into practice feature. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group.

  1. FEATURES OF THE SCHEMES OF CASH PAYMENTS AND BANKING OPERATIONS WITH MONEY LAUNDERING

    Directory of Open Access Journals (Sweden)

    Irina N. Mihailova

    2014-01-01

    Full Text Available The scientific article is devoted to problems of identification schemes origin of the property and money by making a wide range of transactions and financial operations in business and other economic activity, which is carried out by change of the nominal owner of the property (front companies. In most cases, these transactions have no economic sense. For the legislation of criminal possession of property transactions are documented. In the process of legalization of income obtained illegally are in the form of goods, funds, securities, property rights, which require constant perfection of methods for the detection of fraudulent schemes.

  2. ULTRA-SHARP nonoscillatory convection schemes for high-speed steady multidimensional flow

    Science.gov (United States)

    Leonard, B. P.; Mokhtari, Simin

    1990-01-01

    For convection-dominated flows, classical second-order methods are notoriously oscillatory and often unstable. For this reason, many computational fluid dynamicists have adopted various forms of (inherently stable) first-order upwinding over the past few decades. Although it is now well known that first-order convection schemes suffer from serious inaccuracies attributable to artificial viscosity or numerical diffusion under high convection conditions, these methods continue to enjoy widespread popularity for numerical heat transfer calculations, apparently due to a perceived lack of viable high accuracy alternatives. But alternatives are available. For example, nonoscillatory methods used in gasdynamics, including currently popular TVD schemes, can be easily adapted to multidimensional incompressible flow and convective transport. This, in itself, would be a major advance for numerical convective heat transfer, for example. But, as is shown, second-order TVD schemes form only a small, overly restrictive, subclass of a much more universal, and extremely simple, nonoscillatory flux-limiting strategy which can be applied to convection schemes of arbitrarily high order accuracy, while requiring only a simple tridiagonal ADI line-solver, as used in the majority of general purpose iterative codes for incompressible flow and numerical heat transfer. The new universal limiter and associated solution procedures form the so-called ULTRA-SHARP alternative for high resolution nonoscillatory multidimensional steady state high speed convective modelling.

  3. Revisiting the level scheme of the proton emitter 151Lu

    International Nuclear Information System (INIS)

    Wang, F.; Sun, B.H.; Liu, Z.; Scholey, C.; Eeckhaudt, S.; Grahn, T.; Greenlees, P.T.; Jones, P.; Julin, R.; Juutinen, S.; Kettelhut, S.; Leino, M.; Nyman, M.; Rahkila, P.; Saren, J.; Sorri, J.; Uusitalo, J.; Ashley, S.F.; Cullen, I.J.; Garnsworthy, A.B.; Gelletly, W.; Jones, G.A.; Pietri, S.; Podolyak, Z.; Steer, S.; Thompson, N.J.; Walker, P.M.; Williams, S.; Bianco, L.; Darby, I.G.; Joss, D.T.; Page, R.D.; Pakarinen, J.; Rigby, S.; Cullen, D.M.; Khan, S.; Kishada, A.; Gomez-Hornillos, M.B.; Simpson, J.; Jenkins, D.G.; Niikura, M.; Seweryniak, D.; Shizuma, Toshiyuki

    2015-01-01

    An experiment aiming to search for new isomers in the region of proton emitter 151 Lu was performed at the Accelerator Laboratory of the University of Jyväskylä (JYFL), by combining the high resolution γ-ray array JUROGAM, gas-filled RITU separator and GREAT detectors with the triggerless total data readout acquisition (TDR) system. In this proceeding, we revisit the level scheme of 151 Lu by using the proton-tagging technique. A level scheme consistent with the latest experimental results is obtained, and 3 additional levels are identified at high excitation energies. (author)

  4. The regional ground-based wind energy scheme of Pays-de-la-Loire: project, Assessment of the consultation on the regional wind energy project, final version, Prefect decree bearing approval of the regional ground-based wind energy scheme of Pays-de-la-Loire

    International Nuclear Information System (INIS)

    2012-08-01

    This document first presents the regional wind energy scheme (SRE) as a framework for ground-based wind energy development, and as the wind energy component of the regional climate air energy scheme (SRCAE), briefly presents the elaboration approach, and indicates the legal scope of this scheme. The next part outlines the high rate development of wind energy in the Pays-de-la-Loire region. The third part reports the identification, analysis and assessment of areas of interest for the development of wind energy. Finally, the objective of this development by 2020 is estimated

  5. Image Encryption Scheme Based on Balanced Two-Dimensional Cellular Automata

    Directory of Open Access Journals (Sweden)

    Xiaoyan Zhang

    2013-01-01

    Full Text Available Cellular automata (CA are simple models of computation which exhibit fascinatingly complex behavior. Due to the universality of CA model, it has been widely applied in traditional cryptography and image processing. The aim of this paper is to present a new image encryption scheme based on balanced two-dimensional cellular automata. In this scheme, a random image with the same size of the plain image to be encrypted is first generated by a pseudo-random number generator with a seed. Then, the random image is evoluted alternately with two balanced two-dimensional CA rules. At last, the cipher image is obtained by operating bitwise XOR on the final evolution image and the plain image. This proposed scheme possesses some advantages such as very large key space, high randomness, complex cryptographic structure, and pretty fast encryption/decryption speed. Simulation results obtained from some classical images at the USC-SIPI database demonstrate the strong performance of the proposed image encryption scheme.

  6. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  7. Perspectives of frontline health workers on Ghana's National Health Insurance Scheme before and after community engagement interventions

    NARCIS (Netherlands)

    Alhassan, Robert Kaba; Nketiah-Amponsah, Edward; Spieker, Nicole; Arhinful, Daniel Kojo; Rinke de Wit, Tobias F.

    2016-01-01

    Barely a decade after introduction of Ghana's National Health Insurance Scheme (NHIS), significant successes have been recorded in universal access to basic healthcare services. However, sustainability of the scheme is increasingly threatened by concerns on quality of health service delivery in

  8. Load Experiment of the vDACS Scheme in case of the 300 Clients

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-09-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 300.

  9. Adaptive lag synchronization and parameters adaptive lag identification of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Xu Yuhua, E-mail: yuhuaxu2004@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Department of Mathematics, Yunyang Teachers' College, Hubei, Shiyan 442000 (China); Zhou Wuneng, E-mail: wnzhou@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Key Laboratory of Wireless Sensor Network and Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050 (China); Fang Jian' an, E-mail: jafang@dhu.edu.c [College of Information Science and Technology, Donghua University, Shanghai 201620 (China); Sun Wen, E-mail: sunwen_2201@163.co [School of Mathematics and Information, Yangtze University, Hubei, Jingzhou 434023 (China)

    2010-07-26

    This Letter investigates the problem of adaptive lag synchronization and parameters adaptive lag identification of chaotic systems. In comparison with those of existing parameters identification schemes, the unknown parameters are identified by adaptive lag laws, and the delay time is also identified in this Letter. Numerical simulations are also given to show the effectiveness of the proposed method.

  10. A Coding Scheme to Analyse the Online Asynchronous Discussion Forums of University Students

    Science.gov (United States)

    Biasutti, Michele

    2017-01-01

    The current study describes the development of a content analysis coding scheme to examine transcripts of online asynchronous discussion groups in higher education. The theoretical framework comprises the theories regarding knowledge construction in computer-supported collaborative learning (CSCL) based on a sociocultural perspective. The coding…

  11. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  12. Steps to discern sustainability criteria for a certification scheme of bioethanol in Brazil: Approach and difficulties

    International Nuclear Information System (INIS)

    Delzeit, R.; Holm-Mueller, K.

    2009-01-01

    Taking Brazilian bioethanol as an example, this paper presents possible sustainability criteria for a certification scheme aimed to minimize negative socio-ecological impacts and to increase the sustainable production of biomass. We describe the methods that have led us to the identification of a first set of feasible sustainability criteria for Brazilian bioethanol and discuss issues to be considered when developing certification schemes for sustainability. General problems of a certification scheme lie in the inherent danger of introducing new non-tariff trade barriers and in the problems of including important higher scale issues like land conversion and food security. A certification system cannot replace a thorough analysis of policy impacts on sustainability issues. (author)

  13. Evaluating Labour Market Effects of Wage Subsidies for the Disabled -The Danish Flexjobs Scheme

    DEFF Research Database (Denmark)

    Datta Gupta, Nabanita; Larsen, Mona

    2010-01-01

    We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving the employm......We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving...... the employment prospects of the long-term disabled with partial working capacity. We find a substantial, positive employment effect of the scheme in the 1994-2001 period within the target group compared to a control group of closely matched ineligibles, but no discernable effects on the probability of disability...... exit. For the target group employment probability is raised by 33 pct. points after the scheme is introduced relative to a mean employment rate at baseline of 44%. One explanation for a strong employment entry effect concomitant with a non-existent disability exit effect could be that subsidized jobs...

  14. A Study on the Dependable and Secure Relaying Scheme under High Resistance Earth Faults on HV, EHV Line

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.D.; Han, K.N. [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1997-12-31

    This report contains following items for the purpose of investigating and analyzing characteristics of high impedance ground faults. - Reason and characteristics identification of HIF - Modeling of power system - Testing of protective relays using RTD(Real Time Digital Simulator) - Staged ground faults test - Development of new algorithm to detect HIF - Protective coordination schemes between different types of relays - HIF monitoring and relaying scheme and H/W prototyping. (author). 22 refs., 28 figs., 21 tabs.

  15. Evaluation of PBL schemes in WRF for high Arctic conditions

    DEFF Research Database (Denmark)

    Kirova-Galabova, Hristina; Batchvarova, Ekaterina; Gryning, Sven-Erik

    2015-01-01

    was examined through two configurations (25 vertical levels and 4km grid step, 42 vertical levels and 1.33 km grid step). WRF was run with two planetary boundary layer schemes: Mellor –Yamada – Janjic with local vertical closure and non – local Yonsei University scheme. Temporal evolution of planetary boundary...... for temperature, above 150 m for relative humidity and for all levels for wind speed. Direct comparison of model and measured data showed that vertical profiles of studied parameters were reconstructed by the model relatively better in cloudy sky conditions, compared to clear skies....

  16. A computerized scheme for lung nodule detection in multiprojection chest radiography

    International Nuclear Information System (INIS)

    Guo Wei; Li Qiang; Boyce, Sarah J.; McAdams, H. Page; Shiraishi, Junji; Doi, Kunio; Samei, Ehsan

    2012-01-01

    Purpose: Our previous study indicated that multiprojection chest radiography could significantly improve radiologists' performance for lung nodule detection in clinical practice. In this study, the authors further verify that multiprojection chest radiography can greatly improve the performance of a computer-aided diagnostic (CAD) scheme. Methods: Our database consisted of 59 subjects, including 43 subjects with 45 nodules and 16 subjects without nodules. The 45 nodules included 7 real and 38 simulated ones. The authors developed a conventional CAD scheme and a new fusion CAD scheme to detect lung nodules. The conventional CAD scheme consisted of four steps for (1) identification of initial nodule candidates inside lungs, (2) nodule candidate segmentation based on dynamic programming, (3) extraction of 33 features from nodule candidates, and (4) false positive reduction using a piecewise linear classifier. The conventional CAD scheme processed each of the three projection images of a subject independently and discarded the correlation information between the three images. The fusion CAD scheme included the four steps in the conventional CAD scheme and two additional steps for (5) registration of all candidates in the three images of a subject, and (6) integration of correlation information between the registered candidates in the three images. The integration step retained all candidates detected at least twice in the three images of a subject and removed those detected only once in the three images as false positives. A leave-one-subject-out testing method was used for evaluation of the performance levels of the two CAD schemes. Results: At the sensitivities of 70%, 65%, and 60%, our conventional CAD scheme reported 14.7, 11.3, and 8.6 false positives per image, respectively, whereas our fusion CAD scheme reported 3.9, 1.9, and 1.2 false positives per image, and 5.5, 2.8, and 1.7 false positives per patient, respectively. The low performance of the conventional

  17. On Some Incompatible Properties of Voting Schemes

    OpenAIRE

    Chevallier-Mames , Benoît; Fouque , Pierre-Alain; Pointcheval , David; Stern , Julien; Traoré , Jacques

    2010-01-01

    In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal veriability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes. Under usual assumptions and efficiency requirements, we show that a voting system that wants to publish the final list of th...

  18. Nonlinear System Identification Using Quasi-ARX RBFN Models with a Parameter-Classified Scheme

    Directory of Open Access Journals (Sweden)

    Lan Wang

    2017-01-01

    Full Text Available Quasi-linear autoregressive with exogenous inputs (Quasi-ARX models have received considerable attention for their usefulness in nonlinear system identification and control. In this paper, identification methods of quasi-ARX type models are reviewed and categorized in three main groups, and a two-step learning approach is proposed as an extension of the parameter-classified methods to identify the quasi-ARX radial basis function network (RBFN model. Firstly, a clustering method is utilized to provide statistical properties of the dataset for determining the parameters nonlinear to the model, which are interpreted meaningfully in the sense of interpolation parameters of a local linear model. Secondly, support vector regression is used to estimate the parameters linear to the model; meanwhile, an explicit kernel mapping is given in terms of the nonlinear parameter identification procedure, in which the model is transformed from the nonlinear-in-nature to the linear-in-parameter. Numerical and real cases are carried out finally to demonstrate the effectiveness and generalization ability of the proposed method.

  19. A New Pricing Scheme for Controlling Energy Storage Devices in Future Smart Grid

    OpenAIRE

    Zhu, Jingwei; Chen, Michael Z. Q.; Du, Baozhu

    2014-01-01

    Improvement of the overall efficiency of energy infrastructure is one of the main anticipated benefits of the deployment of smart grid technology. Advancement in energy storage technology and two-way communication in the electric network are indispensable components to achieve such a vision, while efficient pricing schemes and appropriate storage management are also essential. In this paper, we propose a universal pricing scheme which permits one to indirectly control the energy storage devic...

  20. Assessment of Climate Air Energy Regional Schemes in Burgundy and in Franche-Comte - Intermediate review on June 27, 2017. Burgundy Climate Air Energy Regional Scheme. Project, Scheme, Appendix to the SRCAE - Wind regional scheme of Burgundy, synthesis, opinion of the Burgundy CESER. Territorial Climate Energy Plan - Program of actions, Plenary session of the November 25, 2013. Climate Air Energy Regional Scheme - Franche-Comte SRCAE

    International Nuclear Information System (INIS)

    2011-09-01

    A first report proposes an assessment of the various aspects addressed by the Climate Air Energy Regional Schemes (SRCAE) of Burgundy and Franche-Comte: global aspects, and aspects related to adaptation to climate change, to air quality, to land planning, to the building sector, to mobility, to good transports, to agriculture, to forest, to industry and craft, to renewable energies, and to ecological responsibility. A synthetic presentation of the Burgundy scheme is proposed, and then an extended version which contains a description of the situation, an analysis of the regional potential, and a definition of orientations for the same above-mentioned aspects. A document more particularly addresses wind energy: role of wind energy in the energy mix of the region, role of small installations, wind energy potential, challenges and constraints (heritage and landscapes, natural environment, technical constraints), identification of areas of interest for wind energy projects, qualitative objectives. Documents published by the regional economic, social and environmental Council (CESER) of Burgundy are then proposed: a contribution to the Climate Air Energy Regional Scheme, a discussion and a presentation of a program of actions for the Climate Energy Territorial Plan (a large number of sheets of presentation of actions is proposed). The last document presents the Franche-Comte regional scheme: overview of regional knowledge on climate, air quality and environmental issues, challenges and potential per activity sector (transports and development, building, agriculture, industry, renewable energy production), definition of orientations and objectives for axes of action

  1. A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks

    Science.gov (United States)

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-01-01

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107

  2. Mammography image assessment; validity and reliability of current scheme

    International Nuclear Information System (INIS)

    Hill, C.; Robinson, L.

    2015-01-01

    Mammographers currently score their own images according to criteria set out by Regional Quality Assurance. The criteria used are based on the ‘Perfect, Good, Moderate, Inadequate’ (PGMI) marking criteria established by the National Health Service Breast Screening Programme (NHSBSP) in their Quality Assurance Guidelines of 2006 1 . This document discusses the validity and reliability of the current mammography image assessment scheme. Commencing with a critical review of the literature this document sets out to highlight problems with the national approach to the use of marking schemes. The findings suggest that ‘PGMI’ scheme is flawed in terms of reliability and validity and is not universally applied across the UK. There also appear to be differences in schemes used by trainees and qualified mammographers. Initial recommendations are to be made in collaboration with colleagues within the National Health Service Breast Screening Programme (NHSBSP), Higher Education Centres, College of Radiographers and the Royal College of Radiologists in order to identify a mammography image appraisal scheme that is fit for purpose. - Highlights: • Currently no robust evidence based marking tools in use for the assessment of images in mammography. • Is current system valid, reliable and robust? • How can the current image assessment tool be improved? • Should students and qualified mammographers use the same tool? • What marking criteria are available for image assessment?

  3. A data seamless interaction scheme between electric power secondary business systems

    Science.gov (United States)

    Ai, Wenkai; Qian, Feng

    2018-03-01

    At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.

  4. Evaluating Labour Market Effects of Wage Subsidies for the Disabled – the Danish Flexjob Scheme

    DEFF Research Database (Denmark)

    Datta Gupta, Nabanita; Larsen, Mona

    We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving the employm......We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving...... the employment prospects of the long-term disabled with partial working capacity. We find a substantial, positive employment effect of the scheme in the 1994-2001 period within the target group compared to a control group of closely matched ineligibles, but no discernable effects on the probability of disability...... exit. For the target group employment probability is raised by 33 pct. points after the scheme is introduced relative to a mean employment rate at baseline of 44%. One explanation for a strong employment entry effect concomitant with a non-existent disability exit effect could be that subsidized jobs...

  5. Identification / characterisation and authentication of microbial strains by MALDI-TOF ICMS

    OpenAIRE

    Santos, C.; Lima, Nelson

    2011-01-01

    The identification of species is an important goal in microbial taxonomy. Information about each microorganism (e.g. morphological description, physiological and biochemical properties, molecular biology sequencings, ecological roles, and societal risks or benefits) is key element in this process. Identifications can been a long and seemingly never-ended process with frequent revisions of the taxonomic schemes. The application of sound tolls to smooth the progress of identifica...

  6. Unnatural selection: talent identification and development in sport.

    Science.gov (United States)

    Abbott, Angela; Button, Chris; Pepping, Gert-Jan; Collins, Dave

    2005-01-01

    The early identification of talented individuals has become increasingly important across many performance domains. Current talent identification (TI) schemes in sport typically select on the basis of discrete, unidimensional measures at unstable periods in the athlete's development. In this article, the concept of talent is revised as a complex, dynamical system in which future behaviors emerge from an interaction of key performance determinants such as psychological behaviors, motor abilities, and physical characteristics. Key nonlinear dynamics concepts are related to TI approaches such as sensitivity to initial conditions, transitions, and exponential behavioral distributions. It is concluded that many TI models place an overemphasis on early identification rather than the development of potentially talented performers. A generic model of talent identification and development is proposed that addresses these issues and provides direction for future research.

  7. Determinants of enrollment of informal sector workers in cooperative based health scheme in Bangladesh

    Science.gov (United States)

    Sarker, Abdur Razzaque; Sultana, Marufa; Mahumud, Rashidul Alam; Ahmed, Sayem; Islam, Ziaul; Morton, Alec; Khan, Jahangir A. M.

    2017-01-01

    Background Providing access to affordable health care for the informal sector remains a considerable challenge for low income countries striving to make progress towards universal health coverage. The objective of the study is to identify the factors shaping the decision to enroll in a cooperative based health scheme for informal workers in Bangladesh and also help to identify the features of informal workers without health schemes and their likelihood of being insured. Methods Data were derived from a cross-sectional in-house survey within the catchment area of a cooperative based health scheme in Bangladesh during April–June 2014, covering a total of 784 households (458 members and 326 non-members). Multivariate logistic regression model was used to identify factors associated with cooperative based health scheme and explanatory variables. Findings This study found that a number of factors were significant determinants of health scheme participation including sex of household head, household composition, occupational category as well as involvement social financial safety net programs. Conclusion Findings from this study can be suggestive for policy-makers interested in scaling up health insurance for informal workers in Bangladesh. Shared funding from this large informal sector can generate new resources for healthcare, which is in line with the healthcare financing strategy of Bangladesh as well as the recommendation of the World Health Organization for developing social health insurance as part of the path to Universal Health Coverage. PMID:28750052

  8. Determinants of enrollment of informal sector workers in cooperative based health scheme in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Abdur Razzaque Sarker

    Full Text Available Providing access to affordable health care for the informal sector remains a considerable challenge for low income countries striving to make progress towards universal health coverage. The objective of the study is to identify the factors shaping the decision to enroll in a cooperative based health scheme for informal workers in Bangladesh and also help to identify the features of informal workers without health schemes and their likelihood of being insured.Data were derived from a cross-sectional in-house survey within the catchment area of a cooperative based health scheme in Bangladesh during April-June 2014, covering a total of 784 households (458 members and 326 non-members. Multivariate logistic regression model was used to identify factors associated with cooperative based health scheme and explanatory variables.This study found that a number of factors were significant determinants of health scheme participation including sex of household head, household composition, occupational category as well as involvement social financial safety net programs.Findings from this study can be suggestive for policy-makers interested in scaling up health insurance for informal workers in Bangladesh. Shared funding from this large informal sector can generate new resources for healthcare, which is in line with the healthcare financing strategy of Bangladesh as well as the recommendation of the World Health Organization for developing social health insurance as part of the path to Universal Health Coverage.

  9. Attitude towards technology, social media usage and grade-point average as predictors of global citizenship identification in Filipino University Students.

    Science.gov (United States)

    Lee, Romeo B; Baring, Rito; Maria, Madelene Sta; Reysen, Stephen

    2017-06-01

    We examine the influence of a positive attitude towards technology, number of social media network memberships and grade-point average (GPA) on global citizenship identification antecedents and outcomes. Students (N = 3628) at a university in the Philippines completed a survey assessing the above constructs. The results showed that attitude towards technology, number of social network site memberships and GPA-predicted global citizenship identification, and subsequent prosocial outcomes (e.g. intergroup helping, responsibility to act for the betterment of the world), through the perception that valued others prescribe a global citizen identity (normative environment) and perceived knowledge of the world and felt interconnectedness with others (global awareness). The results highlight the associations between technology and academic performance with a global identity and associated values. © 2015 International Union of Psychological Science.

  10. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  11. Impacts of Rotation Schemes on Ground-Dwelling Beneficial Arthropods.

    Science.gov (United States)

    Dunbar, Mike W; Gassmann, Aaron J; O'Neal, Matthew E

    2016-10-01

    Crop rotation alters agroecosystem diversity temporally, and increasing the number of crops in rotation schemes can increase crop yields and reduce reliance on pesticides. We hypothesized that increasing the number of crops in annual rotation schemes would positively affect ground-dwelling beneficial arthropod communities. During 2012 and 2013, pitfall traps were used to measure activity-density and diversity of ground-dwelling communities within three previously established, long-term crop rotation studies located in Wisconsin and Illinois. Rotation schemes sampled included continuous corn, a 2-yr annual rotation of corn and soybean, and a 3-yr annual rotation of corn, soybean, and wheat. Insects captured were identified to family, and non-insect arthropods were identified to class, order, or family, depending upon the taxa. Beneficial arthropods captured included natural enemies, granivores, and detritivores. The beneficial community from continuous corn plots was significantly more diverse compared with the community in the 2-yr rotation, whereas the community in the 3-yr rotation did not differ from either rotation scheme. The activity-density of the total community and any individual taxa did not differ among rotation schemes in either corn or soybean. Crop species within all three rotation schemes were annual crops, and are associated with agricultural practices that make infield habitat subject to anthropogenic disturbances and temporally unstable. Habitat instability and disturbance can limit the effectiveness and retention of beneficial arthropods, including natural enemies, granivores, and detritivores. Increasing non-crop and perennial species within landscapes in conjunction with more diverse rotation schemes may increase the effect of biological control of pests by natural enemies. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Performance of an optical identification and interrogation system

    Science.gov (United States)

    Venugopalan, A.; Ghosh, A. K.; Verma, P.; Cheng, S.

    2008-04-01

    A free space optics based identification and interrogation system has been designed. The applications of the proposed system lie primarily in areas which require a secure means of mutual identification and information exchange between optical readers and tags. Conventional RFIDs raise issues regarding security threats, electromagnetic interference and health safety. The security of RF-ID chips is low due to the wide spatial spread of radio waves. Malicious nodes can read data being transmitted on the network, if they are in the receiving range. The proposed system provides an alternative which utilizes the narrow paraxial beams of lasers and an RSA-based authentication scheme. These provide enhanced security to communication between a tag and the base station or reader. The optical reader can also perform remote identification and the tag can be read from a far off distance, given line of sight. The free space optical identification and interrogation system can be used for inventory management, security systems at airports, port security, communication with high security systems, etc. to name a few. The proposed system was implemented with low-cost, off-the-shelf components and its performance in terms of throughput and bit error rate has been measured and analyzed. The range of operation with a bit-error-rate lower than 10-9 was measured to be about 4.5 m. The security of the system is based on the strengths of the RSA encryption scheme implemented using more than 1024 bits.

  13. An examination of biracial college youths' family ethnic socialization, ethnic identity, and adjustment: do self-identification labels and university context matter?

    Science.gov (United States)

    Brittian, Aerika S; Umaña-Taylor, Adriana J; Derlan, Chelsea L

    2013-04-01

    This study examined family ethnic socialization, ethnic identity, and adjustment among Latino/White and Asian/White biracial college students (n = 507), with special attention to how ethnic self-identification and university ethnic composition informed the ethnic identity process. Findings indicated that family ethnic socialization was positively related to participants' ethnic identity exploration and resolution, but not ethnic identity affirmation. Furthermore, ethnic identity resolution and affirmation were associated with higher self-acceptance and self-esteem, and lower depressive symptoms. Importantly, university ethnic composition moderated the association between ethnic identity resolution and anxiety, such that resolution promoted adjustment in contexts that were relatively more ethnically diverse. University ethnic composition also moderated the association between ethnic identity affirmation and both self-esteem and self-acceptance, such that affirmation was associated with better adjustment but only in schools that were less ethnically diverse.

  14. An Examination of Biracial College Youths’ Family Ethnic Socialization, Ethnic Identity, and Adjustment: Do Self-Identification Labels and University Context Matter?

    Science.gov (United States)

    Brittian, Aerika S.; Umaña-Taylor, Adriana J.; Derlan, Chelsea L.

    2014-01-01

    This study examined family ethnic socialization, ethnic identity, and adjustment among Latino/White and Asian/White biracial college students (n = 507), with special attention to how ethnic self-identification and university ethnic composition informed the ethnic identity process. Findings indicated that family ethnic socialization was positively related to participants’ ethnic identity exploration and resolution, but not ethnic identity affirmation. Furthermore, ethnic identity resolution and affirmation were associated with higher self-acceptance and self-esteem, and lower depressive symptoms. Importantly, university ethnic composition moderated the association between ethnic identity resolution and anxiety, such that resolution promoted adjustment in contexts that were relatively more ethnically diverse. University ethnic composition also moderated the association between ethnic identity affirmation and both self-esteem and self-acceptance, such that affirmation was associated with better adjustment but only in schools that were less ethnically diverse. PMID:22905967

  15. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  16. Developing and modifying behavioral coding schemes in pediatric psychology: a practical guide.

    Science.gov (United States)

    Chorney, Jill MacLaren; McMurtry, C Meghan; Chambers, Christine T; Bakeman, Roger

    2015-01-01

    To provide a concise and practical guide to the development, modification, and use of behavioral coding schemes for observational data in pediatric psychology. This article provides a review of relevant literature and experience in developing and refining behavioral coding schemes. A step-by-step guide to developing and/or modifying behavioral coding schemes is provided. Major steps include refining a research question, developing or refining the coding manual, piloting and refining the coding manual, and implementing the coding scheme. Major tasks within each step are discussed, and pediatric psychology examples are provided throughout. Behavioral coding can be a complex and time-intensive process, but the approach is invaluable in allowing researchers to address clinically relevant research questions in ways that would not otherwise be possible. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. The Automated System for Identification of License Plates of Cars

    Directory of Open Access Journals (Sweden)

    FRATAVCHAN, V.

    2008-04-01

    Full Text Available The paper focuses on the automated traffic rule control system. It examines the basic scheme of the system, basic constituents, principles of constituent interactions, search methods of moving objects, localization, and identification of the license plate.

  18. Identification methods for structural health monitoring

    CERN Document Server

    Papadimitriou, Costas

    2016-01-01

    The papers in this volume provide an introduction to well known and established system identification methods for structural health monitoring and to more advanced, state-of-the-art tools, able to tackle the challenges associated with actual implementation. Starting with an overview on fundamental methods, introductory concepts are provided on the general framework of time and frequency domain, parametric and non-parametric methods, input-output or output only techniques. Cutting edge tools are introduced including, nonlinear system identification methods; Bayesian tools; and advanced modal identification techniques (such as the Kalman and particle filters, the fast Bayesian FFT method). Advanced computational tools for uncertainty quantification are discussed to provide a link between monitoring and structural integrity assessment. In addition, full scale applications and field deployments that illustrate the workings and effectiveness of the introduced monitoring schemes are demonstrated.

  19. Knowledge and Implementation of Tertiary Institutions' Social Health Insurance Programme (TISHIP) in Nigeria: a case study of Nnamdi Azikiwe University, Awka.

    Science.gov (United States)

    Anetoh, Maureen Ugonwa; Jibuaku, Chiamaka Henrietta; Nduka, Sunday Odunke; Uzodinma, Samuel Uchenna

    2017-01-01

    Tertiary Institutions' Social Health Insurance Programme (TISHIP) is an arm of the National Health Insurance Scheme (NHIS), which provides quality healthcare to students in Nigerian higher institutions. The success of this scheme depends on the students' knowledge and awareness of its existence as well as the level of its implementation by healthcare providers. This study was therefore designed to assess students' knowledge and attitude towards TISHIP and its implementation level among health workers in Nnamdi Azikiwe University Medical Centre. Using a stratified random sampling technique, 420 undergraduate students of Nnamdi Azikiwe University, Awka were assessed on their level of awareness and general assessment of TISHIP through an adapted and validated questionnaire instrument. The level of implementation of the scheme was then assessed among 50 randomly selected staff of the University Medical Center. Data collected were analyzed using Statistical Package for Social Sciences (SPSS) version 20 software. Whereas the students in general, showed a high level of TISHIP awareness, more than half of them (56.3%) have never benefited from the scheme with 52.8% showing dissatisfaction with the quality of care offered with the scheme. However, an overwhelming number of the students (87.9%) opined that the scheme should continue. On the other hand, the University Medical Centre staff responses showed a satisfactory scheme implementation. The study found satisfactory TISHIP awareness with poor attitude among Nnamdi Azikiwe University students. Furthermore, the University Medical Centre health workers showed a strong commitment to the objectives of the scheme.

  20. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    International Nuclear Information System (INIS)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra; Kalogeropoulou, Christina; Pratikakis, Ioannis; Costaridou, Lena

    2015-01-01

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  1. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    Energy Technology Data Exchange (ETDEWEB)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra [Department of Medical Physics, School of Medicine,University of Patras, Patras 26504 (Greece); Kalogeropoulou, Christina [Department of Radiology, School of Medicine, University of Patras, Patras 26504 (Greece); Pratikakis, Ioannis [Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi 67100 (Greece); Costaridou, Lena, E-mail: costarid@upatras.gr [Department of Medical Physics, School of Medicine, University of Patras, Patras 26504 (Greece)

    2015-08-15

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  2. Error-Detecting Identification Codes for Algebra Students.

    Science.gov (United States)

    Sutherland, David C.

    1990-01-01

    Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)

  3. Universal scheme to generate metal–insulator transition in disordered systems

    International Nuclear Information System (INIS)

    Guo, Ai-Min; Xiong, Shi-Jie; Xie, X C; Sun, Qing-feng

    2013-01-01

    We propose a scheme to generate metal–insulator transition in the random binary layer (RBL) model, which is constructed by randomly assigning two types of layers along the longitudinal direction. Based on a tight-binding Hamiltonian, the localization length is calculated for a variety of RBLs with different cross section geometries by using the transfer-matrix method. Both analytical and numerical results show that a band of extended states could appear in the quasi-one-dimensional RBLs and the systems behave as metals by properly tuning the model parameters, due to the existence of a completely ordered subband, leading to a metal–insulator transition in parameter space. Furthermore, the extended states are irrespective of the diagonal and off-diagonal disorder strengths. Our results can be generalized to two- and three-dimensional disordered systems with arbitrary layer structures, and may be realized in Bose–Einstein condensates. (paper)

  4. Immunity-based detection, identification, and evaluation of aircraft sub-system failures

    Science.gov (United States)

    Moncayo, Hever Y.

    This thesis describes the design, development, and flight-simulation testing of an integrated Artificial Immune System (AIS) for detection, identification, and evaluation of a wide variety of sensor, actuator, propulsion, and structural failures/damages including the prediction of the achievable states and other limitations on performance and handling qualities. The AIS scheme achieves high detection rate and low number of false alarms for all the failure categories considered. Data collected using a motion-based flight simulator are used to define the self for an extended sub-region of the flight envelope. The NASA IFCS F-15 research aircraft model is used and represents a supersonic fighter which include model following adaptive control laws based on non-linear dynamic inversion and artificial neural network augmentation. The flight simulation tests are designed to analyze and demonstrate the performance of the immunity-based aircraft failure detection, identification and evaluation (FDIE) scheme. A general robustness analysis is also presented by determining the achievable limits for a desired performance in the presence of atmospheric perturbations. For the purpose of this work, the integrated AIS scheme is implemented based on three main components. The first component performs the detection when one of the considered failures is present in the system. The second component consists in the identification of the failure category and the classification according to the failed element. During the third phase a general evaluation of the failure is performed with the estimation of the magnitude/severity of the failure and the prediction of its effect on reducing the flight envelope of the aircraft system. Solutions and alternatives to specific design issues of the AIS scheme, such as data clustering and empty space optimization, data fusion and duplication removal, definition of features, dimensionality reduction, and selection of cluster/detector shape are also

  5. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  6. An approximation theory for nonlinear partial differential equations with applications to identification and control

    Science.gov (United States)

    Banks, H. T.; Kunisch, K.

    1982-01-01

    Approximation results from linear semigroup theory are used to develop a general framework for convergence of approximation schemes in parameter estimation and optimal control problems for nonlinear partial differential equations. These ideas are used to establish theoretical convergence results for parameter identification using modal (eigenfunction) approximation techniques. Results from numerical investigations of these schemes for both hyperbolic and parabolic systems are given.

  7. Hospital utilization and out of pocket expenditure in public and private sectors under the universal government health insurance scheme in Chhattisgarh State, India: Lessons for universal health coverage.

    Science.gov (United States)

    Nandi, Sulakshana; Schneider, Helen; Dixit, Priyanka

    2017-01-01

    Research on impact of publicly financed health insurance has paid relatively little attention to the nature of healthcare provision the schemes engage. India's National Health Insurance Scheme or RSBY was made universal by Chhattisgarh State in 2012. In the State, public and private sectors provide hospital services in a context of extensive gender, social, economic and geographical inequities. This study examined enrolment, utilization (public and private) and out of pocket (OOP) expenditure for the insured and uninsured, in Chhattisgarh. The Chhattisgarh State Central sample (n = 6026 members) of the 2014 National Sample Survey (71st Round) on Health was extracted and analyzed. Variables of enrolment, hospitalization, out of pocket (OOP) expenditure and catastrophic expenditure were descriptively analyzed. Multivariate analyses of factors associated with enrolment, hospitalization (by sector) and OOP expenditure were conducted, taking into account gender, socio-economic status, residence, type of facility and ailment. Insurance coverage was 38.8%. Rates of hospitalization were 33/1000 population among the insured and 29/1000 among the uninsured. Of those insured and hospitalized, 67.2% utilized the public sector. Women, rural residents, Scheduled Tribes and poorer groups were more likely to utilize the public sector for hospitalizations. Although the insured were less likely to incur out of pocket (OOP) expenditure, 95.1% of insured private sector users and 66.0% of insured public sector users, still incurred costs. Median OOP payments in the private sector were eight times those in the public sector. Of households with at least one member hospitalized, 35.5% experienced catastrophic health expenditures (>10% monthly household consumption expenditure). The study finds that despite insurance coverage, the majority still incurred OOP expenditure. The public sector was nevertheless less expensive, and catered to the more vulnerable groups. It suggests the need to

  8. The Politico-Economic Challenges of Ghana's National Health Insurance Scheme Implementation.

    Science.gov (United States)

    Fusheini, Adam

    2016-04-27

    National/social health insurance schemes have increasingly been seen in many low- and middle-income countries (LMICs) as a vehicle to universal health coverage (UHC) and a viable alternative funding mechanism for the health sector. Several countries, including Ghana, have thus introduced and implemented mandatory national health insurance schemes (NHIS) as part of reform efforts towards increasing access to health services. Ghana passed mandatory national health insurance (NHI) legislation (ACT 650) in 2003 and commenced nationwide implementation in 2004. Several peer review studies and other research reports have since assessed the performance of the scheme with positive rating while challenges also noted. This paper contributes to the literature on economic and political implementation challenges based on empirical evidence from the perspectives of the different category of actors and institutions involved in the process. Qualitative in-depth interviews were held with 33 different category of participants in four selected district mutual health insurance schemes in Southern (two) and Northern (two) Ghana. This was to ascertain their views regarding the main challenges in the implementation process. The participants were selected through purposeful sampling, stakeholder mapping, and snowballing. Data was analysed using thematic grouping procedure. Participants identified political issues of over politicisation and political interference as main challenges. The main economic issues participants identified included low premiums or contributions; broad exemptions, poor gatekeeper enforcement system; and culture of curative and hospital-centric care. The study establishes that political and economic factors have influenced the implementation process and the degree to which the policy has been implemented as intended. Thus, we conclude that there is a synergy between implementation and politics; and achieving UHC under the NHIS requires political stewardship. Political

  9. Knowledge and Implementation of Tertiary Institutions’ Social Health Insurance Programme (TISHIP) in Nigeria: a case study of Nnamdi Azikiwe University, Awka

    Science.gov (United States)

    Anetoh, Maureen Ugonwa; Jibuaku, Chiamaka Henrietta; Nduka, Sunday Odunke; Uzodinma, Samuel Uchenna

    2017-01-01

    Introduction Tertiary Institutions’ Social Health Insurance Programme (TISHIP) is an arm of the National Health Insurance Scheme (NHIS), which provides quality healthcare to students in Nigerian higher institutions. The success of this scheme depends on the students’ knowledge and awareness of its existence as well as the level of its implementation by healthcare providers. This study was therefore designed to assess students’ knowledge and attitude towards TISHIP and its implementation level among health workers in Nnamdi Azikiwe University Medical Centre. Methods Using a stratified random sampling technique, 420 undergraduate students of Nnamdi Azikiwe University, Awka were assessed on their level of awareness and general assessment of TISHIP through an adapted and validated questionnaire instrument. The level of implementation of the scheme was then assessed among 50 randomly selected staff of the University Medical Center. Data collected were analyzed using Statistical Package for Social Sciences (SPSS) version 20 software. Results Whereas the students in general, showed a high level of TISHIP awareness, more than half of them (56.3%) have never benefited from the scheme with 52.8% showing dissatisfaction with the quality of care offered with the scheme. However, an overwhelming number of the students (87.9%) opined that the scheme should continue. On the other hand, the University Medical Centre staff responses showed a satisfactory scheme implementation. Conclusion The study found satisfactory TISHIP awareness with poor attitude among Nnamdi Azikiwe University students. Furthermore, the University Medical Centre health workers showed a strong commitment to the objectives of the scheme. PMID:29541317

  10. Inclusive B-meson hadroproduction in the general-mass variable-flavor-number scheme

    Energy Technology Data Exchange (ETDEWEB)

    Kniehl, B.A.; Kramer, G. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Schienbein, I. [Universite Joseph Fourier, Grenoble (France). Lab. de Physique Subatomique et de Cosmologie]|[CNRS/IN2P3, Inst. National Polytechnique de Grenoble (France); Spiesberger, H. [Johannes Gutenberg Univ., Mainz (Germany). Inst. fuer Physik

    2007-05-15

    We calculate the cross section for the inclusive hadroproduction of B mesons as a function of transverse momentum p{sub T} at next-to-leading order (NLO) in the general- mass variable-flavor-number scheme using realistic non-perturbative fragmentation functions that are obtained through a global fit to e{sup +}e{sup -} data from CERN LEP1 and SLAC SLC exploiting their universality and scaling violations. We find good agreement with recent p anti p data taken by the CDF Collaboration in run II at the Fermilab Tevatron. We also present comparisons with NLO results obtained in two other schemes. (orig.)

  11. The Impact of feedback and incentive schemes on performance

    OpenAIRE

    Bruun-Olsen, Alexandra M.; Engelsen Eian, Camilla

    2015-01-01

    Master's thesis in Business administration In this thesis we analyze how different feedback (objective and subjective), incentive schemes (fixed pay and performance pay), and the interaction between them impact performance. To answer our research question we conduct a lab experiment on students from the University of Stavanger. The experiment consists of subjects performing a combined coloring- and calculation task over three periods and receiving either objective or subjective feedback af...

  12. Dynamically protected cat-qubits: a new paradigm for universal quantum computation

    International Nuclear Information System (INIS)

    Mirrahimi, Mazyar; Leghtas, Zaki; Albert, Victor V; Touzard, Steven; Schoelkopf, Robert J; Jiang, Liang; Devoret, Michel H

    2014-01-01

    We present a new hardware-efficient paradigm for universal quantum computation which is based on encoding, protecting and manipulating quantum information in a quantum harmonic oscillator. This proposal exploits multi-photon driven dissipative processes to encode quantum information in logical bases composed of Schrödinger cat states. More precisely, we consider two schemes. In a first scheme, a two-photon driven dissipative process is used to stabilize a logical qubit basis of two-component Schrödinger cat states. While such a scheme ensures a protection of the logical qubit against the photon dephasing errors, the prominent error channel of single-photon loss induces bit-flip type errors that cannot be corrected. Therefore, we consider a second scheme based on a four-photon driven dissipative process which leads to the choice of four-component Schrödinger cat states as the logical qubit. Such a logical qubit can be protected against single-photon loss by continuous photon number parity measurements. Next, applying some specific Hamiltonians, we provide a set of universal quantum gates on the encoded qubits of each of the two schemes. In particular, we illustrate how these operations can be rendered fault-tolerant with respect to various decoherence channels of participating quantum systems. Finally, we also propose experimental schemes based on quantum superconducting circuits and inspired by methods used in Josephson parametric amplification, which should allow one to achieve these driven dissipative processes along with the Hamiltonians ensuring the universal operations in an efficient manner

  13. Dynamically protected cat-qubits: a new paradigm for universal quantum computation

    Science.gov (United States)

    Mirrahimi, Mazyar; Leghtas, Zaki; Albert, Victor V.; Touzard, Steven; Schoelkopf, Robert J.; Jiang, Liang; Devoret, Michel H.

    2014-04-01

    We present a new hardware-efficient paradigm for universal quantum computation which is based on encoding, protecting and manipulating quantum information in a quantum harmonic oscillator. This proposal exploits multi-photon driven dissipative processes to encode quantum information in logical bases composed of Schrödinger cat states. More precisely, we consider two schemes. In a first scheme, a two-photon driven dissipative process is used to stabilize a logical qubit basis of two-component Schrödinger cat states. While such a scheme ensures a protection of the logical qubit against the photon dephasing errors, the prominent error channel of single-photon loss induces bit-flip type errors that cannot be corrected. Therefore, we consider a second scheme based on a four-photon driven dissipative process which leads to the choice of four-component Schrödinger cat states as the logical qubit. Such a logical qubit can be protected against single-photon loss by continuous photon number parity measurements. Next, applying some specific Hamiltonians, we provide a set of universal quantum gates on the encoded qubits of each of the two schemes. In particular, we illustrate how these operations can be rendered fault-tolerant with respect to various decoherence channels of participating quantum systems. Finally, we also propose experimental schemes based on quantum superconducting circuits and inspired by methods used in Josephson parametric amplification, which should allow one to achieve these driven dissipative processes along with the Hamiltonians ensuring the universal operations in an efficient manner.

  14. Feasibility of Trace Alcohol Congener Detection and Identification Using Laser-Induced Breakdown Spectroscopy

    International Nuclear Information System (INIS)

    Zhang Jialiang; Wang Shangmin; Zhao Lixian; Liu Liying; Wang Dezhen

    2014-01-01

    In this paper, a feasible scheme is reported for the detection and identification of trace alcohol congeners that have identical elemental composition using laser-induced breakdown spectroscopy (LIBS). In the scheme, an intensive pulsed laser is used to break down trace alcohol samples and the optical emission spectra of the induced plasma are collected for the detection and identification of alcohol molecules. In order to prepare trace alcohol samples, pure ethanol or methanol is bubbled by argon carrier gas and then mixed into matrix gases. The key issue for the scheme is to constitute indices from the LIBS data of the alcohol samples. Two indices are found to be suitable for alcohol detection and identification. One is the emission intensity ratio (denoted as H/C) of the hydrogen line (653.3 nm) to the carbon line (247.9 nm) for identification and the other is the ratio of the carbon line (as C/Ar) or the hydrogen line (as H/Ar) to the argon lines (866.7 nm) for quantitative detection. The calibration experiment result shows that the index H/C is specific for alcohol congeners while almost being independent of alcohol concentration. In detail, the H/C keeps a specific constant of 34 and 23 respectively for ethanol and methanol. In the meanwhile, the C/Ar and H/Ar indices respond almost linearly to the alcohol concentration below 1300 ppm, and are therefore competent for concentration measurement. With the indices, trace alcohol concentration measurement achieves a limit of 140 ppm using a laser pulse energy of 300 mJ. (plasma technology)

  15. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  16. Evaluation of a pilot peer observation of teaching scheme for chair-side tutors at Glasgow University Dental School.

    Science.gov (United States)

    Cairns, A M; Bissell, V; Bovill, C

    2013-06-01

    To introduce and examine a pilot peer observation of teaching (POT) scheme within the Department of Paediatric Dentistry at Glasgow Dental School and its associated outreach centres. All tutors teaching paediatric dentistry were invited to be involved in evaluation of the POT scheme. Participants were randomly paired with a peer, who then observed their teaching and provided constructive feedback. For those consenting to be involved in the evaluation of the scheme, semi-structured, one-to-one interviews were carried out by the principal investigator. POT was found by all participants to be a beneficial process, reassuring those of their teaching styles and giving them ideas to adapt their teaching. POT is an effective method for engaging chair-side tutors in the reflection and development of their teaching practice via observations and scholarly discussion.

  17. Teaching the Z-Scheme of electron transport in photosynthesis: a perspective.

    Science.gov (United States)

    Mohapatra, Pradipta Kumar; Singh, Nihar Ranjan

    2015-01-01

    This paper deals with how Govindjee taught the Z-Scheme of electron transport in oxygenic photosynthesis at Ravenshaw University, Cuttack, Odisha, India, in 2014, in a unique and highly effective fashion-using students to act as molecules, representing the entire electron transport chain from water to nicotinamide adenine dinucleotide phosphate (NADP(+)). It culminated in a show by B.Sc. students in the garden of the Department of Botany, Ravenshaw University. The first author (PKM) personally acted as Ferredoxin NADP Reductase (FNR) catalyzing the reduction of NADP(+) to NADPH, taking electrons from reduced ferredoxin at the end of Photosystem I. On the other hand, the Q-cycle was played by M.Sc. students, who acted as molecules running this ingenious cycle that produces extra protons. An interesting event was when a student, acting as a herbicide, who was dressed like a devil (fierce looking, in black clothes with a sword; "Yamaraj: The God of Death", as he called himself), stopped all reactions by throwing out QB, the second plastoquinone molecule of Photosystem II, and that too aggressively, taking its position instead. The second author was the major organizer of the Z-scheme show. We provide here a basic background on the process, a bit on Govindjee's teaching, and some selected pictures from the drama played in March, 2014 at Ravenshaw University. Here, we also recognize the teacher Govindjee for his ingenious and fun-filled teaching methods that touched the hearts and the souls of the students as well as the teachers of Ravenshaw University. He was rated as one of the most-admired teachers of plant biology at our university.

  18. Analysis of a Relaxation Scheme for a Nonlinear Schrödinger Equation Occurring in Plasma Physics

    KAUST Repository

    Oelz, Dietmar; Trabelsi, Saber

    2014-01-01

    This paper is devoted to the analysis of a relaxation-type numerical scheme for a nonlinear Schrödinger equation arising in plasma physics. The scheme is shown to be preservative in the sense that it preserves mass and energy. We prove the well-posedness of the semidiscretized system and prove convergence to the solution of the time-continuous model. © 2014 © Vilnius Gediminas Technical University, 2014.

  19. Analysis of a Relaxation Scheme for a Nonlinear Schrödinger Equation Occurring in Plasma Physics

    KAUST Repository

    Oelz, Dietmar

    2014-03-15

    This paper is devoted to the analysis of a relaxation-type numerical scheme for a nonlinear Schrödinger equation arising in plasma physics. The scheme is shown to be preservative in the sense that it preserves mass and energy. We prove the well-posedness of the semidiscretized system and prove convergence to the solution of the time-continuous model. © 2014 © Vilnius Gediminas Technical University, 2014.

  20. Essays on evaluating a community based health insurance scheme in rural Ethiopia

    NARCIS (Netherlands)

    A.D. Mebratie (Anagaw)

    2015-01-01

    markdownabstract__Abstract__ Since the late 1990s, in a move away from user fees for health care and with the aim of creating universal access, several low and middle income countries have set up community-based health insurance (CBHI) schemes. Following this approach, in June 2011, with the

  1. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    that the derivation provides explicit constructions for finding the exchange couplings in the physical basis needed to implement any arbitrary 1-qubit gate. These constructions lead to spintronic encodings of quantum logic that are more efficient than those of a previously published scheme that utilizes a universal but fixed set of gates.

  2. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  3. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  4. A Framework For Efficient Homomorphic Universally Composable Commitments

    DEFF Research Database (Denmark)

    David, Bernardo Machado

    primitives and protocols while retaining security guarantees. Moreover, commitments with homomorphic properties enable significantly more efficient constructions of protocols for applications such as zero knowledge proofs, two-party computation through garbled circuits and multiparty computation. However......, achieving universal composability for commitment schemes often sacrifices both concrete and asymptotic efficiency, specially if homomorphic properties are required. In this thesis we bridge the gap between stand alone and universally composable commitment schemes, for which we achieve optimal efficiency...... related to a statistical security parameter as a setup. The rest of our constructions leverage secret sharing and coding theory techniques, including a novel method for verifying that a large number of strings are codewords of a given linear code with linear complexity....

  5. Extensive Listening in a Colombian University: Process, Product, and Perceptions

    Science.gov (United States)

    Mayora, Carlos A.

    2017-01-01

    The current paper reports an experience implementing a small-scale narrow listening scheme (one of the varieties of extensive listening) with intermediate learners of English as a foreign language in a Colombian university. The paper presents (a) how the scheme was designed and implemented, including materials and procedures (the process); (b) how…

  6. Genome-wide screen for universal individual identification SNPs based on the HapMap and 1000 Genomes databases.

    Science.gov (United States)

    Huang, Erwen; Liu, Changhui; Zheng, Jingjing; Han, Xiaolong; Du, Weian; Huang, Yuanjian; Li, Chengshi; Wang, Xiaoguang; Tong, Dayue; Ou, Xueling; Sun, Hongyu; Zeng, Zhaoshu; Liu, Chao

    2018-04-03

    Differences among SNP panels for individual identification in SNP-selecting and populations led to few common SNPs, compromising their universal applicability. To screen all universal SNPs, we performed a genome-wide SNP mining in multiple populations based on HapMap and 1000Genomes databases. SNPs with high minor allele frequencies (MAF) in 37 populations were selected. With MAF from ≥0.35 to ≥0.43, the number of selected SNPs decreased from 2769 to 0. A total of 117 SNPs with MAF ≥0.39 have no linkage disequilibrium with each other in every population. For 116 of the 117 SNPs, cumulative match probability (CMP) ranged from 2.01 × 10-48 to 1.93 × 10-50 and cumulative exclusion probability (CEP) ranged from 0.9999999996653 to 0.9999999999945. In 134 tested Han samples, 110 of the 117 SNPs remained within high MAF and conformed to Hardy-Weinberg equilibrium, with CMP = 4.70 × 10-47 and CEP = 0.999999999862. By analyzing the same number of autosomal SNPs as in the HID-Ion AmpliSeq Identity Panel, i.e. 90 randomized out of the 110 SNPs, our panel yielded preferable CMP and CEP. Taken together, the 110-SNPs panel is advantageous for forensic test, and this study provided plenty of highly informative SNPs for compiling final universal panels.

  7. Ranganathan : A Universal Librarian

    Directory of Open Access Journals (Sweden)

    Abulfazale M. Fazle Kabir

    2003-06-01

    Full Text Available In formulating Five Laws of Library Science Ranganathan has made a lasting and fundamental contribution to the philosophy of library patron service. His Colon Classification has provided a scheme for hierarchical design of faceted subject classification. For such valuable contribution to the profession he has been acclaimed as a universal librarian.

  8. Utilization of health-care schemes: A ground reality of Indian scenario

    Directory of Open Access Journals (Sweden)

    Aditi Sharma

    2018-01-01

    Full Text Available Health-care system in a society must be built around the term of equity so that each individual should have equal opportunities for maintaining good health, but human societies are characterized by unevenness at every aspect, and it has even not spared the health-care system. Despite great improvements in the oral health status of population across the world, health problems continue to be a major public health concern. India's health system faces the ongoing challenge of responding to the needs of the most disadvantaged groups of the society. Thus, to reduce inequalities in health and ensuring equity in oral health care, India as one of the developing countries in the world have taken steps at center as well as state level to bridge the gap between poor and rich in terms of health care. These schemes are built to touch the lives of the remotest people in the country. The government is boosting its strategies and augmenting its reach mechanisms to ensure that not a soul is dispossessed of any benefits, which arise from the virtue of this scheme. The present review concludes that though these schemes appear to be pro-poor and are inclusive of disadvantaged minorities, the scheme suffers from adverse selection. These schemes have the potential to play an important role in India's move toward universal health coverage.

  9. Model-Based Fault Diagnosis Techniques Design Schemes, Algorithms and Tools

    CERN Document Server

    Ding, Steven X

    2013-01-01

    Guaranteeing a high system performance over a wide operating range is an important issue surrounding the design of automatic control systems with successively increasing complexity. As a key technology in the search for a solution, advanced fault detection and identification (FDI) is receiving considerable attention. This book introduces basic model-based FDI schemes, advanced analysis and design algorithms, and mathematical and control-theoretic tools. This second edition of Model-Based Fault Diagnosis Techniques contains: ·         new material on fault isolation and identification, and fault detection in feedback control loops; ·         extended and revised treatment of systematic threshold determination for systems with both deterministic unknown inputs and stochastic noises; addition of the continuously-stirred tank heater as a representative process-industrial benchmark; and ·         enhanced discussion of residual evaluation in stochastic processes. Model-based Fault Diagno...

  10. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  11. Identification of Staphylococcus species with the API STAPH-IDENT system.

    Science.gov (United States)

    Kloos, W E; Wolfshohl, J F

    1982-01-01

    The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosidase activity, aerobic acid formation from D-(+)-mannose, D-mannitol, D-(+)-trehalose, and salicin, and utilization of arginine. Reactions of cultures were determined after 5 h of incubation at 35 degrees C. Results indicated a high degree of congruence (greater than 90%) between the expedient API system and conventional methods for most species. The addition of a test for novobiocin susceptibility to the API system increased the accuracy of identification of S. saprophyticus, S. cohnii, and S. hominis, significantly. Several strains of S. hominis, S. haemolyticus, and S. warneri which were difficult to separate with the Kloos and Schleifer simplified scheme were accurately resolved by the API system. PMID:6752190

  12. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  13. Comparison of wavelet based denoising schemes for gear condition monitoring: An Artificial Neural Network based Approach

    Science.gov (United States)

    Ahmed, Rounaq; Srinivasa Pai, P.; Sriram, N. S.; Bhat, Vasudeva

    2018-02-01

    Vibration Analysis has been extensively used in recent past for gear fault diagnosis. The vibration signals extracted is usually contaminated with noise and may lead to wrong interpretation of results. The denoising of extracted vibration signals helps the fault diagnosis by giving meaningful results. Wavelet Transform (WT) increases signal to noise ratio (SNR), reduces root mean square error (RMSE) and is effective to denoise the gear vibration signals. The extracted signals have to be denoised by selecting a proper denoising scheme in order to prevent the loss of signal information along with noise. An approach has been made in this work to show the effectiveness of Principal Component Analysis (PCA) to denoise gear vibration signal. In this regard three selected wavelet based denoising schemes namely PCA, Empirical Mode Decomposition (EMD), Neighcoeff Coefficient (NC), has been compared with Adaptive Threshold (AT) an extensively used wavelet based denoising scheme for gear vibration signal. The vibration signals acquired from a customized gear test rig were denoised by above mentioned four denoising schemes. The fault identification capability as well as SNR, Kurtosis and RMSE for the four denoising schemes have been compared. Features extracted from the denoised signals have been used to train and test artificial neural network (ANN) models. The performances of the four denoising schemes have been evaluated based on the performance of the ANN models. The best denoising scheme has been identified, based on the classification accuracy results. PCA is effective in all the regards as a best denoising scheme.

  14. A qualitative study of DRG coding practice in hospitals under the Thai Universal Coverage scheme.

    Science.gov (United States)

    Pongpirul, Krit; Walker, Damian G; Winch, Peter J; Robinson, Courtland

    2011-04-08

    In the Thai Universal Coverage health insurance scheme, hospital providers are paid for their inpatient care using Diagnosis Related Group-based retrospective payment, for which quality of the diagnosis and procedure codes is crucial. However, there has been limited understandings on which health care professions are involved and how the diagnosis and procedure coding is actually done within hospital settings. The objective of this study is to detail hospital coding structure and process, and to describe the roles of key hospital staff, and other related internal dynamics in Thai hospitals that affect quality of data submitted for inpatient care reimbursement. Research involved qualitative semi-structured interview with 43 participants at 10 hospitals chosen to represent a range of hospital sizes (small/medium/large), location (urban/rural), and type (public/private). Hospital Coding Practice has structural and process components. While the structural component includes human resources, hospital committee, and information technology infrastructure, the process component comprises all activities from patient discharge to submission of the diagnosis and procedure codes. At least eight health care professional disciplines are involved in the coding process which comprises seven major steps, each of which involves different hospital staff: 1) Discharge Summarization, 2) Completeness Checking, 3) Diagnosis and Procedure Coding, 4) Code Checking, 5) Relative Weight Challenging, 6) Coding Report, and 7) Internal Audit. The hospital coding practice can be affected by at least five main factors: 1) Internal Dynamics, 2) Management Context, 3) Financial Dependency, 4) Resource and Capacity, and 5) External Factors. Hospital coding practice comprises both structural and process components, involves many health care professional disciplines, and is greatly varied across hospitals as a result of five main factors.

  15. Health-financing reforms in southeast Asia: challenges in achieving universal coverage.

    Science.gov (United States)

    Tangcharoensathien, Viroj; Patcharanarumol, Walaiporn; Ir, Por; Aljunid, Syed Mohamed; Mukti, Ali Ghufron; Akkhavong, Kongsap; Banzon, Eduardo; Huong, Dang Boi; Thabrany, Hasbullah; Mills, Anne

    2011-03-05

    In this sixth paper of the Series, we review health-financing reforms in seven countries in southeast Asia that have sought to reduce dependence on out-of-pocket payments, increase pooled health finance, and expand service use as steps towards universal coverage. Laos and Cambodia, both resource-poor countries, have mostly relied on donor-supported health equity funds to reach the poor, and reliable funding and appropriate identification of the eligible poor are two major challenges for nationwide expansion. For Thailand, the Philippines, Indonesia, and Vietnam, social health insurance financed by payroll tax is commonly used for formal sector employees (excluding Malaysia), with varying outcomes in terms of financial protection. Alternative payment methods have different implications for provider behaviour and financial protection. Two alternative approaches for financial protection of the non-poor outside the formal sector have emerged-contributory arrangements and tax-financed schemes-with different abilities to achieve high population coverage rapidly. Fiscal space and mobilisation of payroll contributions are both important in accelerating financial protection. Expanding coverage of good-quality services and ensuring adequate human resources are also important to achieve universal coverage. As health-financing reform is complex, institutional capacity to generate evidence and inform policy is essential and should be strengthened. Copyright © 2011 Elsevier Ltd. All rights reserved.

  16. Intercomparison of Martian Lower Atmosphere Simulated Using Different Planetary Boundary Layer Parameterization Schemes

    Science.gov (United States)

    Natarajan, Murali; Fairlie, T. Duncan; Dwyer Cianciolo, Alicia; Smith, Michael D.

    2015-01-01

    We use the mesoscale modeling capability of Mars Weather Research and Forecasting (MarsWRF) model to study the sensitivity of the simulated Martian lower atmosphere to differences in the parameterization of the planetary boundary layer (PBL). Characterization of the Martian atmosphere and realistic representation of processes such as mixing of tracers like dust depend on how well the model reproduces the evolution of the PBL structure. MarsWRF is based on the NCAR WRF model and it retains some of the PBL schemes available in the earth version. Published studies have examined the performance of different PBL schemes in NCAR WRF with the help of observations. Currently such assessments are not feasible for Martian atmospheric models due to lack of observations. It is of interest though to study the sensitivity of the model to PBL parameterization. Typically, for standard Martian atmospheric simulations, we have used the Medium Range Forecast (MRF) PBL scheme, which considers a correction term to the vertical gradients to incorporate nonlocal effects. For this study, we have also used two other parameterizations, a non-local closure scheme called Yonsei University (YSU) PBL scheme and a turbulent kinetic energy closure scheme called Mellor- Yamada-Janjic (MYJ) PBL scheme. We will present intercomparisons of the near surface temperature profiles, boundary layer heights, and wind obtained from the different simulations. We plan to use available temperature observations from Mini TES instrument onboard the rovers Spirit and Opportunity in evaluating the model results.

  17. Interacting universes and the cosmological constant

    International Nuclear Information System (INIS)

    Alonso-Serrano, A.; Bastos, C.; Bertolami, O.; Robles-Pérez, S.

    2013-01-01

    In this Letter it is studied the effects that an interaction scheme among universes can have in the values of their cosmological constants. In the case of two interacting universes, the value of the cosmological constant of one of the universes becomes very close to zero at the expense of an increasing value of the cosmological constant of the partner universe. In the more general case of a chain of N interacting universes with periodic boundary conditions, the spectrum of the Hamiltonian splits into a large number of levels, each of them associated with a particular value of the cosmological constant, that can be occupied by single universes revealing a collective behavior that plainly shows that the multiverse is much more than the mere sum of its parts

  18. Interacting universes and the cosmological constant

    Energy Technology Data Exchange (ETDEWEB)

    Alonso-Serrano, A. [Centro de Física “Miguel Catalán”, Instituto de Física Fundamental, Consejo Superior de Investigaciones Científicas, Serrano 121, 28006 Madrid (Spain); Estación Ecológica de Biocosmología, Pedro de Alvarado 14, 06411 Medellín (Spain); Bastos, C. [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Avenida Rovisco Pais 1, 1049-001 Lisboa (Portugal); Bertolami, O. [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Avenida Rovisco Pais 1, 1049-001 Lisboa (Portugal); Departamento de Física e Astronomia, Faculdade de Ciências da Universidade do Porto, Rua do Campo Alegre 687, 4169-007 Porto (Portugal); Robles-Pérez, S., E-mail: salvarp@imaff.cfmac.csic.es [Centro de Física “Miguel Catalán”, Instituto de Física Fundamental, Consejo Superior de Investigaciones Científicas, Serrano 121, 28006 Madrid (Spain); Estación Ecológica de Biocosmología, Pedro de Alvarado 14, 06411 Medellín (Spain); Física Teórica, Universidad del País Vasco, Apartado 644, 48080 Bilbao (Spain)

    2013-02-12

    In this Letter it is studied the effects that an interaction scheme among universes can have in the values of their cosmological constants. In the case of two interacting universes, the value of the cosmological constant of one of the universes becomes very close to zero at the expense of an increasing value of the cosmological constant of the partner universe. In the more general case of a chain of N interacting universes with periodic boundary conditions, the spectrum of the Hamiltonian splits into a large number of levels, each of them associated with a particular value of the cosmological constant, that can be occupied by single universes revealing a collective behavior that plainly shows that the multiverse is much more than the mere sum of its parts.

  19. The Perception of Generic Capabilities and Learning Environment among Undergraduate Nursing Students after the Implementation of a Senior Intake Scheme

    Science.gov (United States)

    Chan, Carmen W. H.; Leung, Doris Y. P.; Lee, Diana T. F.; Chair, Sek Ying; Ip, Wan Yim; Sit, Janet W. H.

    2018-01-01

    Hong Kong has introduced a senior intake admission scheme which is similar to the US model of credit transfer from community college programmes to university bachelor programmes. The study aimed to assess the outcomes, in terms of generic capabilities, of introducing a senior intake articulation scheme to a bachelor of nursing curriculum in Hong…

  20. Local thermal equilibrium and ideal gas Stephani universes

    OpenAIRE

    Coll, Bartolomé; Ferrando, Joan Josep

    2004-01-01

    The Stephani universes that can be interpreted as an ideal gas evolving in local thermal equilibrium are determined. Five classes of thermodynamic schemes are admissible, which give rise to five classes of regular models and three classes of singular models. No Stephani universes exist representing an exact solution to a classical ideal gas (one for which the internal energy is proportional to the temperature). But some Stephani universes may approximate a classical ideal gas at first order i...

  1. Hospital utilization and out of pocket expenditure in public and private sectors under the universal government health insurance scheme in Chhattisgarh State, India: Lessons for universal health coverage.

    Directory of Open Access Journals (Sweden)

    Sulakshana Nandi

    Full Text Available Research on impact of publicly financed health insurance has paid relatively little attention to the nature of healthcare provision the schemes engage. India's National Health Insurance Scheme or RSBY was made universal by Chhattisgarh State in 2012. In the State, public and private sectors provide hospital services in a context of extensive gender, social, economic and geographical inequities. This study examined enrolment, utilization (public and private and out of pocket (OOP expenditure for the insured and uninsured, in Chhattisgarh. The Chhattisgarh State Central sample (n = 6026 members of the 2014 National Sample Survey (71st Round on Health was extracted and analyzed. Variables of enrolment, hospitalization, out of pocket (OOP expenditure and catastrophic expenditure were descriptively analyzed. Multivariate analyses of factors associated with enrolment, hospitalization (by sector and OOP expenditure were conducted, taking into account gender, socio-economic status, residence, type of facility and ailment. Insurance coverage was 38.8%. Rates of hospitalization were 33/1000 population among the insured and 29/1000 among the uninsured. Of those insured and hospitalized, 67.2% utilized the public sector. Women, rural residents, Scheduled Tribes and poorer groups were more likely to utilize the public sector for hospitalizations. Although the insured were less likely to incur out of pocket (OOP expenditure, 95.1% of insured private sector users and 66.0% of insured public sector users, still incurred costs. Median OOP payments in the private sector were eight times those in the public sector. Of households with at least one member hospitalized, 35.5% experienced catastrophic health expenditures (>10% monthly household consumption expenditure. The study finds that despite insurance coverage, the majority still incurred OOP expenditure. The public sector was nevertheless less expensive, and catered to the more vulnerable groups. It suggests

  2. A molecular scheme for Yersinia enterocolitica patho-serotyping derived from genome-wide analysis.

    Science.gov (United States)

    Garzetti, Debora; Susen, Rosa; Fruth, Angelika; Tietze, Erhard; Heesemann, Jürgen; Rakin, Alexander

    2014-05-01

    Yersinia enterocolitica is a food-borne, gastro-intestinal pathogen with world-wide distribution. Only 11 serotypes have been isolated from patients, with O:3, O:9, O:8 and O:5,27 being the serotypes most commonly associated with human yersiniosis. Serotype is an important characteristic of Y. enterocolitica strains, allowing differentiation for epidemiology, diagnosis and phylogeny studies. Conventional serotyping, performed by slide agglutination, is a tedious and laborious procedure whose interpretation tends to be subjective, leading to poor reproducibility. Here we present a PCR-based typing scheme for molecular identification and patho-serotyping of Y. enterocolitica. Genome-wide comparison of Y. enterocolitica sequences allowed analysis of the O-antigen gene clusters of different serotypes, uncovering their formerly unknown genomic locations, and selection of targets for serotype-specific amplification. Two multiplex PCRs and one additional PCR were designed and tested on various reference strains and isolates from different origins. Our genotypic assay proved to be highly specific for identification of Y. enterocolitica species, discrimination between virulent and non-virulent strains, distinguishing the main human-related serotypes, and typing of conventionally untypeable strains. This genotyping scheme could be applied in microbiology laboratories as an alternative or complementary method to the traditional phenotypic assays, providing data for epidemiological studies. Copyright © 2013 Elsevier GmbH. All rights reserved.

  3. Development of Mycoplasma synoviae (MS) core genome multilocus sequence typing (cgMLST) scheme.

    Science.gov (United States)

    Ghanem, Mostafa; El-Gazzar, Mohamed

    2018-05-01

    Mycoplasma synoviae (MS) is a poultry pathogen with reported increased prevalence and virulence in recent years. MS strain identification is essential for prevention, control efforts and epidemiological outbreak investigations. Multiple multilocus based sequence typing schemes have been developed for MS, yet the resolution of these schemes could be limited for outbreak investigation. The cost of whole genome sequencing became close to that of sequencing the seven MLST targets; however, there is no standardized method for typing MS strains based on whole genome sequences. In this paper, we propose a core genome multilocus sequence typing (cgMLST) scheme as a standardized and reproducible method for typing MS based whole genome sequences. A diverse set of 25 MS whole genome sequences were used to identify 302 core genome genes as cgMLST targets (35.5% of MS genome) and 44 whole genome sequences of MS isolates from six countries in four continents were used for typing applying this scheme. cgMLST based phylogenetic trees displayed a high degree of agreement with core genome SNP based analysis and available epidemiological information. cgMLST allowed evaluation of two conventional MLST schemes of MS. The high discriminatory power of cgMLST allowed differentiation between samples of the same conventional MLST type. cgMLST represents a standardized, accurate, highly discriminatory, and reproducible method for differentiation between MS isolates. Like conventional MLST, it provides stable and expandable nomenclature, allowing for comparing and sharing the typing results between different laboratories worldwide. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  4. The Why, What, and Impact of GPA at Oxford Brookes University

    Science.gov (United States)

    Andrews, Matthew

    2016-01-01

    This paper examines the introduction at Oxford Brookes University of a Grade Point Average (GPA) scheme alongside the traditional honours degree classification. It considers the reasons for the introduction of GPA, the way in which the scheme was implemented, and offers an insight into the impact of GPA at Brookes. Finally, the paper considers…

  5. Universal quantum computation by discontinuous quantum walk

    International Nuclear Information System (INIS)

    Underwood, Michael S.; Feder, David L.

    2010-01-01

    Quantum walks are the quantum-mechanical analog of random walks, in which a quantum ''walker'' evolves between initial and final states by traversing the edges of a graph, either in discrete steps from node to node or via continuous evolution under the Hamiltonian furnished by the adjacency matrix of the graph. We present a hybrid scheme for universal quantum computation in which a quantum walker takes discrete steps of continuous evolution. This ''discontinuous'' quantum walk employs perfect quantum-state transfer between two nodes of specific subgraphs chosen to implement a universal gate set, thereby ensuring unitary evolution without requiring the introduction of an ancillary coin space. The run time is linear in the number of simulated qubits and gates. The scheme allows multiple runs of the algorithm to be executed almost simultaneously by starting walkers one time step apart.

  6. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  7. Health financing for universal coverage and health system performance: concepts and implications for policy.

    Science.gov (United States)

    Kutzin, Joseph

    2013-08-01

    Unless the concept is clearly understood, "universal coverage" (or universal health coverage, UHC) can be used to justify practically any health financing reform or scheme. This paper unpacks the definition of health financing for universal coverage as used in the World Health Organization's World health report 2010 to show how UHC embodies specific health system goals and intermediate objectives and, broadly, how health financing reforms can influence these. All countries seek to improve equity in the use of health services, service quality and financial protection for their populations. Hence, the pursuit of UHC is relevant to every country. Health financing policy is an integral part of efforts to move towards UHC, but for health financing policy to be aligned with the pursuit of UHC, health system reforms need to be aimed explicitly at improving coverage and the intermediate objectives linked to it, namely, efficiency, equity in health resource distribution and transparency and accountability. The unit of analysis for goals and objectives must be the population and health system as a whole. What matters is not how a particular financing scheme affects its individual members, but rather, how it influences progress towards UHC at the population level. Concern only with specific schemes is incompatible with a universal coverage approach and may even undermine UHC, particularly in terms of equity. Conversely, if a scheme is fully oriented towards system-level goals and objectives, it can further progress towards UHC. Policy and policy analysis need to shift from the scheme to the system level.

  8. A uniform quantitative stiff stability estimate for BDF schemes

    Directory of Open Access Journals (Sweden)

    Winfried Auzinger

    2006-01-01

    Full Text Available The concepts of stability regions, \\(A\\- and \\(A(\\alpha\\-stability - albeit based on scalar models - turned out to be essential for the identification of implicit methods suitable for the integration of stiff ODEs. However, for multistep methods, knowledge of the stability region provides no information on the quantitative stability behavior of the scheme. In this paper we fill this gap for the important class of Backward Differentiation Formulas (BDF. Quantitative stability bounds are derived which are uniformly valid in the stability region of the method. Our analysis is based on a study of the separation of the characteristic roots and a special similarity decomposition of the associated companion matrix.

  9. University Reactor Matching Grants Program

    International Nuclear Information System (INIS)

    John Valentine; Farzad Rahnema; Said Abdel-Khalik

    2003-01-01

    During the 2002 Fiscal year, funds from the DOE matching grant program, along with matching funds from the industrial sponsors, have been used to support research in the area of thermal-hydraulics. Both experimental and numerical research projects have been performed. Experimental research focused on two areas: (1) Identification of the root cause mechanism for axial offset anomaly in pressurized water reactors under prototypical reactor conditions, and (2) Fluid dynamic aspects of thin liquid film protection schemes for inertial fusion reactor chambers. Numerical research focused on two areas: (1) Multi-fluid modeling of both two-phase and two-component flows for steam conditioning and mist cooling applications, and (2) Modeling of bounded Rayleigh-Taylor instability with interfacial mass transfer and fluid injection through a porous wall simulating the ''wetted wall'' protection scheme in inertial fusion reactor chambers. Details of activities in these areas are given

  10. A qualitative study of DRG coding practice in hospitals under the Thai Universal Coverage Scheme

    Directory of Open Access Journals (Sweden)

    Winch Peter J

    2011-04-01

    Full Text Available Abstract Background In the Thai Universal Coverage health insurance scheme, hospital providers are paid for their inpatient care using Diagnosis Related Group-based retrospective payment, for which quality of the diagnosis and procedure codes is crucial. However, there has been limited understandings on which health care professions are involved and how the diagnosis and procedure coding is actually done within hospital settings. The objective of this study is to detail hospital coding structure and process, and to describe the roles of key hospital staff, and other related internal dynamics in Thai hospitals that affect quality of data submitted for inpatient care reimbursement. Methods Research involved qualitative semi-structured interview with 43 participants at 10 hospitals chosen to represent a range of hospital sizes (small/medium/large, location (urban/rural, and type (public/private. Results Hospital Coding Practice has structural and process components. While the structural component includes human resources, hospital committee, and information technology infrastructure, the process component comprises all activities from patient discharge to submission of the diagnosis and procedure codes. At least eight health care professional disciplines are involved in the coding process which comprises seven major steps, each of which involves different hospital staff: 1 Discharge Summarization, 2 Completeness Checking, 3 Diagnosis and Procedure Coding, 4 Code Checking, 5 Relative Weight Challenging, 6 Coding Report, and 7 Internal Audit. The hospital coding practice can be affected by at least five main factors: 1 Internal Dynamics, 2 Management Context, 3 Financial Dependency, 4 Resource and Capacity, and 5 External Factors. Conclusions Hospital coding practice comprises both structural and process components, involves many health care professional disciplines, and is greatly varied across hospitals as a result of five main factors.

  11. Compressive System Identification in the Linear Time-Invariant framework

    KAUST Repository

    Toth, Roland

    2011-12-01

    Selection of an efficient model parametrization (model order, delay, etc.) has crucial importance in parametric system identification. It navigates a trade-off between representation capabilities of the model (structural bias) and effects of over-parametrization (variance increase of the estimates). There exists many approaches to this widely studied problem in terms of statistical regularization methods and information criteria. In this paper, an alternative ℓ 1 regularization scheme is proposed for estimation of sparse linear-regression models based on recent results in compressive sensing. It is shown that the proposed scheme provides consistent estimation of sparse models in terms of the so-called oracle property, it is computationally attractive for large-scale over-parameterized models and it is applicable in case of small data sets, i.e., underdetermined estimation problems. The performance of the approach w.r.t. other regularization schemes is demonstrated in an extensive Monte Carlo study. © 2011 IEEE.

  12. Radiating Kerr particle in Einstein universe

    International Nuclear Information System (INIS)

    Vaidya, P.C.; Patel, L.K.

    1989-01-01

    A generalized Kerr-NUT type metric is considered in connection with Einstein field equations corresponding to perfect fluid plus a pure radiation field. A general scheme for obtaining the exact solutions of these field equations is developed. Two physically meaningful particular cases are investigated in detail. One gives the field of a radiating Kerr particle embedded in the Einstein universe. The other solution may probably represent a deSitter-like universe pervaded by a pure radiation field. (author). 7 refs

  13. High signal to noise ratio THz spectroscopy with ASOPS and signal processing schemes for mapping and controlling molecular and bulk relaxation processes

    International Nuclear Information System (INIS)

    Hadjiloucas, S; Walker, G C; Bowen, J W; Becerra, V M; Zafiropoulos, A; Galvao, R K H

    2009-01-01

    Asynchronous Optical Sampling has the potential to improve signal to noise ratio in THz transient sperctrometry. The design of an inexpensive control scheme for synchronising two femtosecond pulse frequency comb generators at an offset frequency of 20 kHz is discussed. The suitability of a range of signal processing schemes adopted from the Systems Identification and Control Theory community for further processing recorded THz transients in the time and frequency domain are outlined. Finally, possibilities for femtosecond pulse shaping using genetic algorithms are mentioned.

  14. High signal to noise ratio THz spectroscopy with ASOPS and signal processing schemes for mapping and controlling molecular and bulk relaxation processes

    Energy Technology Data Exchange (ETDEWEB)

    Hadjiloucas, S; Walker, G C; Bowen, J W; Becerra, V M [Cybernetics, School of Systems Engineering, University of Reading, RG6 6AY (United Kingdom); Zafiropoulos, A [Biosystems Engineering Department, School of Agricultural Technology, Technological Educational Institute of Larissa, 411 10, Larissa (Greece); Galvao, R K H, E-mail: s.hadjiloucas@reading.ac.u [Divisao de Engenharia Eletronica, Instituto Tecnologico de Aeronautica, Sao Jose dos Campos, SP, 12228-900 Brazil (Brazil)

    2009-08-01

    Asynchronous Optical Sampling has the potential to improve signal to noise ratio in THz transient sperctrometry. The design of an inexpensive control scheme for synchronising two femtosecond pulse frequency comb generators at an offset frequency of 20 kHz is discussed. The suitability of a range of signal processing schemes adopted from the Systems Identification and Control Theory community for further processing recorded THz transients in the time and frequency domain are outlined. Finally, possibilities for femtosecond pulse shaping using genetic algorithms are mentioned.

  15. Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-03-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase of the third phase for the last goal, we perform the functional evaluation of the cloud type virtual PBNM, which can be used by plural organizations.

  16. How automated image analysis techniques help scientists in species identification and classification?

    Science.gov (United States)

    Yousef Kalafi, Elham; Town, Christopher; Kaur Dhillon, Sarinder

    2017-09-04

    Identification of taxonomy at a specific level is time consuming and reliant upon expert ecologists. Hence the demand for automated species identification increased over the last two decades. Automation of data classification is primarily focussed on images, incorporating and analysing image data has recently become easier due to developments in computational technology. Research efforts in identification of species include specimens' image processing, extraction of identical features, followed by classifying them into correct categories. In this paper, we discuss recent automated species identification systems, categorizing and evaluating their methods. We reviewed and compared different methods in step by step scheme of automated identification and classification systems of species images. The selection of methods is influenced by many variables such as level of classification, number of training data and complexity of images. The aim of writing this paper is to provide researchers and scientists an extensive background study on work related to automated species identification, focusing on pattern recognition techniques in building such systems for biodiversity studies.

  17. A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud.

    Science.gov (United States)

    Seenivasagam, V; Velumani, R

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  18. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

    Directory of Open Access Journals (Sweden)

    V. Seenivasagam

    2013-01-01

    Full Text Available Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT—Singular Value Decomposition (SVD domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu’s invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  19. The Universe, Time, Eternity and Infinity

    Directory of Open Access Journals (Sweden)

    Lolaev T. P.

    2013-04-01

    Full Text Available The conceptions of «universe», «eternity», «time» and «infinity» belong to the list of the most fundamental and complex characteristics of the matter. The concepts of "universe", "eternity", "time" and "infinity" is defined in article in fundamentally new interpretation. This was made possible thanks to the identification by the author the nature of time, and formulation and theoretically and experimentally justification of the Law of the Universe functioning.

  20. HYBRID SYSTEM BASED FUZZY-PID CONTROL SCHEMES FOR UNPREDICTABLE PROCESS

    Directory of Open Access Journals (Sweden)

    M.K. Tan

    2011-07-01

    Full Text Available In general, the primary aim of polymerization industry is to enhance the process operation in order to obtain high quality and purity product. However, a sudden and large amount of heat will be released rapidly during the mixing process of two reactants, i.e. phenol and formalin due to its exothermic behavior. The unpredictable heat will cause deviation of process temperature and hence affect the quality of the product. Therefore, it is vital to control the process temperature during the polymerization. In the modern industry, fuzzy logic is commonly used to auto-tune PID controller to control the process temperature. However, this method needs an experienced operator to fine tune the fuzzy membership function and universe of discourse via trial and error approach. Hence, the setting of fuzzy inference system might not be accurate due to the human errors. Besides that, control of the process can be challenging due to the rapid changes in the plant parameters which will increase the process complexity. This paper proposes an optimization scheme using hybrid of Q-learning (QL and genetic algorithm (GA to optimize the fuzzy membership function in order to allow the conventional fuzzy-PID controller to control the process temperature more effectively. The performances of the proposed optimization scheme are compared with the existing fuzzy-PID scheme. The results show that the proposed optimization scheme is able to control the process temperature more effectively even if disturbance is introduced.

  1. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  2. A Mini-Review of Track And Field’s Talent-Identification Models in Iran and Some Designated Countries

    OpenAIRE

    Ebrahim Ghasemzadeh Mirkolaee; Seyed Mohammad Hossein Razavi; Saeed Amirnejad

    2013-01-01

    Talent identification and training the athletes of the basic levels in track and field requires codifying a proper model like any other system so that any duplication is prevented as well as knowing the right path. The federation of track and field started to codify the national talent-identification scheme in track and field in 1385. Hence, the present studies track-and-field talent-identification patterns in some designated countries and compare them with the codified pattern in Iran. The r...

  3. Development of a Hazard Classification Scheme for Substances Used in the Fraudulent Adulteration of Foods.

    Science.gov (United States)

    Everstine, Karen; Abt, Eileen; McColl, Diane; Popping, Bert; Morrison-Rowe, Sara; Lane, Richard W; Scimeca, Joseph; Winter, Carl; Ebert, Andrew; Moore, Jeffrey C; Chin, Henry B

    2018-01-01

    Food fraud, the intentional misrepresentation of the true identity of a food product or ingredient for economic gain, is a threat to consumer confidence and public health and has received increased attention from both regulators and the food industry. Following updates to food safety certification standards and publication of new U.S. regulatory requirements, we undertook a project to (i) develop a scheme to classify food fraud-related adulterants based on their potential health hazard and (ii) apply this scheme to the adulterants in a database of 2,970 food fraud records. The classification scheme was developed by a panel of experts in food safety and toxicology from the food industry, academia, and the U.S. Food and Drug Administration. Categories and subcategories were created through an iterative process of proposal, review, and validation using a subset of substances known to be associated with the fraudulent adulteration of foods. Once developed, the scheme was applied to the adulterants in the database. The resulting scheme included three broad categories: 1, potentially hazardous adulterants; 2, adulterants that are unlikely to be hazardous; and 3, unclassifiable adulterants. Categories 1 and 2 consisted of seven subcategories intended to further define the range of hazard potential for adulterants. Application of the scheme to the 1,294 adulterants in the database resulted in 45% of adulterants classified in category 1 (potentially hazardous). Twenty-seven percent of the 1,294 adulterants had a history of causing consumer illness or death, were associated with safety-related regulatory action, or were classified as allergens. These results reinforce the importance of including a consideration of food fraud-related adulterants in food safety systems. This classification scheme supports food fraud mitigation efforts and hazard identification as required in the U.S. Food Safety Modernization Act Preventive Controls Rules.

  4. [Changes in body weight of the university students at university].

    Science.gov (United States)

    Soto Ruiz, María Nelia; Aguinaga Ontonso, Inés; Canga Armayor, Navidad; Guillén-Grima, Francisco; Hermoso de Mendoza, Juana; Serrano Monzo, Inmaculada; Marín Fernández, Blanca

    2015-06-01

    One of the strategies for the prevention of the obesity is the identification of critical periods of gain weight. Some studies confirm gain weight during the university period. The purpose of the present study was to determine the changes in the body weight of the university students in Navarre. Prospective cohort study. Public University of Navarre and the University of Navarre, in Pamplona. Study examined weight change among 452 students attending at university in Pamplona, during first and third course. Four hundred and fifty two students completed the questionnaire. Weight and height were measures and body mass index was calculated. The mean body weight increased 0,600 kg, 1,8 kg for males and no change in body weight was observed in female. 44,7 % of students gained weight (60,8 % of men and 36,8 % of women), and the gain weight was of 3,4 kg. University years are a critical factor for the gain weight, particularly males. Consideration of this, is necessary the development of effective weight gain prevention strategies during the university. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  5. Strategic purchasing and health system efficiency: A comparison of two financing schemes in Thailand.

    Science.gov (United States)

    Patcharanarumol, Walaiporn; Panichkriangkrai, Warisa; Sommanuttaweechai, Angkana; Hanson, Kara; Wanwong, Yaowaluk; Tangcharoensathien, Viroj

    2018-01-01

    Strategic purchasing is an essential health financing function. This paper compares the strategic purchasing practices of Thailand's two tax-financed health insurance schemes, the Universal Coverage Scheme (UCS) and the Civil Servant Medical Benefit Scheme (CSMBS), and identifies factors contributing to successful universal health coverage outcomes by analysing the relationships between the purchaser and government, providers and members. The study uses a cross-sectional mixed-methods design, including document review and interviews with 56 key informants. The Comptroller General Department (CGD) of Ministry of Finance manages CSMBS as one among civil servant welfare programmes. Their purchasing is passive. Fee for service payment for outpatient care has resulted in rapid cost escalation and overspending of their annual budget. In contrast, National Health Security Office (NHSO) manages purchasing for UCS, which undertakes a range of strategic purchasing actions, including applying closed ended provider payment, promoting primary healthcare's gate keeping functions, exercising collective purchasing power and engaging views of members in decision making process. This difference in purchasing arrangements resulted in expenditure per CSMBS member being 4 times higher than UCS in 2014. The governance of the purchaser organization, the design of the purchasing arrangements including incentives and use of information, and the institutional capacities to implement purchasing functions are essential for effective strategic purchasing which can improve health system efficiency as a whole.

  6. The Alcohol Use Disorders Identification Scale (AUDIT) normative scores for a multiracial sample of Rhodes University residence students.

    Science.gov (United States)

    Young, Charles; Mayson, Tamara

    2010-06-01

    The objective of this research is to obtain accurate drinking norms for students living in the university residences in preparation for future social norms interventions that would allow individual students to compare their drinking to an appropriate reference group. Random cluster sampling was used to obtain data from 318 residence students who completed the Alcohol Use Disorders Identification Test (AUDIT), a brief, reliable and valid screening measure designed by the World Health Organisation (Babor et al. 2001). The Cronbach alpha coefficient of 0.83 reported for this multicultural sample is high, suggesting that the AUDIT may be reliably used in this and similar contexts. Normative scores are reported in the form of percentiles. Comparisons between the portions of students drinking safely and hazardously according to race and gender indicate that while male students are drinking no more hazardously than female students, white students drink far more hazardously than black students. These differences suggest that both race- and gender-specific norms would be essential for an effective social norms intervention in this multicultural South African context. Finally, the racialised drinking patterns might reflect an informal segregation of social space at Rhodes University.

  7. On the universality of quark jet fragmentation

    International Nuclear Information System (INIS)

    Dias de Deus, J.; Jadach, S.

    1977-01-01

    Universality of inclusive fragmentation density functions in lepton induced processes (ep, γp, e + e - ) and purely hadronic processes is discussed from the point of view of the Topological Expansion/Dual Unitarization Scheme. It is shown that planar, single jet dominated processes have universal inclusive distributions and average multiplicities. In multi-jet processes, treated in a simple approximation, is inversely proportional to the number N of jets and the magnitude of the seagull effect increases as N 2 . (Auth.)

  8. A New Pricing Scheme for Controlling Energy Storage Devices in Future Smart Grid

    Directory of Open Access Journals (Sweden)

    Jingwei Zhu

    2014-01-01

    Full Text Available Improvement of the overall efficiency of energy infrastructure is one of the main anticipated benefits of the deployment of smart grid technology. Advancement in energy storage technology and two-way communication in the electric network are indispensable components to achieve such a vision, while efficient pricing schemes and appropriate storage management are also essential. In this paper, we propose a universal pricing scheme which permits one to indirectly control the energy storage devices in the grid to achieve a more desirable aggregate demand profile that meets a particular target of the grid operator such as energy generation cost minimization and carbon emission reduction. Such a pricing scheme can potentially be applied to control the behavior of energy storage devices installed for integration of intermittent renewable energy sources that have permission to grid connection and will have broader applications as an increasing number of novel and low-cost energy storage technologies emerge.

  9. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  10. Reconstructive schemes for variational iteration method within Yang-Laplace transform with application to fractal heat conduction problem

    Directory of Open Access Journals (Sweden)

    Liu Chun-Feng

    2013-01-01

    Full Text Available A reconstructive scheme for variational iteration method using the Yang-Laplace transform is proposed and developed with the Yang-Laplace transform. The identification of fractal Lagrange multiplier is investigated by the Yang-Laplace transform. The method is exemplified by a fractal heat conduction equation with local fractional derivative. The results developed are valid for a compact solution domain with high accuracy.

  11. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  12. 40 CFR 261.9 - Requirements for Universal Waste.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Requirements for Universal Waste. 261.9 Section 261.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) IDENTIFICATION AND LISTING OF HAZARDOUS WASTE General § 261.9 Requirements for Universal Waste...

  13. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  14. Identification of prokaryotic and eukaryotic signal peptides and prediction of their cleavage sites

    DEFF Research Database (Denmark)

    Nielsen, Henrik; Engelbrecht, Jacob; Brunak, Søren

    1997-01-01

    We have developed a new method for the identification of signal peptides and their cleavage based on neural networks trained on separate sets of prokaryotic and eukaryotic sequence. The method performs significantly better than previous prediction schemes and can easily be applied on genome...

  15. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  16. From Three-Photon Greenberger-Horne-Zeilinger States to Ballistic Universal Quantum Computation.

    Science.gov (United States)

    Gimeno-Segovia, Mercedes; Shadbolt, Pete; Browne, Dan E; Rudolph, Terry

    2015-07-10

    Single photons, manipulated using integrated linear optics, constitute a promising platform for universal quantum computation. A series of increasingly efficient proposals have shown linear-optical quantum computing to be formally scalable. However, existing schemes typically require extensive adaptive switching, which is experimentally challenging and noisy, thousands of photon sources per renormalized qubit, and/or large quantum memories for repeat-until-success strategies. Our work overcomes all these problems. We present a scheme to construct a cluster state universal for quantum computation, which uses no adaptive switching, no large memories, and which is at least an order of magnitude more resource efficient than previous passive schemes. Unlike previous proposals, it is constructed entirely from loss-detecting gates and offers a robustness to photon loss. Even without the use of an active loss-tolerant encoding, our scheme naturally tolerates a total loss rate ∼1.6% in the photons detected in the gates. This scheme uses only 3 Greenberger-Horne-Zeilinger states as a resource, together with a passive linear-optical network. We fully describe and model the iterative process of cluster generation, including photon loss and gate failure. This demonstrates that building a linear-optical quantum computer needs to be less challenging than previously thought.

  17. Improving the secrecy rate by turning foes to allies: An auction scheme

    Science.gov (United States)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  18. Physical renormalization schemes and asymptotic safety in quantum gravity

    Science.gov (United States)

    Falls, Kevin

    2017-12-01

    The methods of the renormalization group and the ɛ -expansion are applied to quantum gravity revealing the existence of an asymptotically safe fixed point in spacetime dimensions higher than two. To facilitate this, physical renormalization schemes are exploited where the renormalization group flow equations take a form which is independent of the parameterisation of the physical degrees of freedom (i.e. the gauge fixing condition and the choice of field variables). Instead the flow equation depends on the anomalous dimensions of reference observables. In the presence of spacetime boundaries we find that the required balance between the Einstein-Hilbert action and Gibbons-Hawking-York boundary term is preserved by the beta functions. Exploiting the ɛ -expansion near two dimensions we consider Einstein gravity coupled to matter. Scheme independence is generically obscured by the loop-expansion due to breaking of two-dimensional Weyl invariance. In schemes which preserve two-dimensional Weyl invariance we avoid the loop expansion and find a unique ultraviolet (UV) fixed point. At this fixed point the anomalous dimensions are large and one must resum all loop orders to obtain the critical exponents. Performing the resummation a set of universal scaling dimensions are found. These scaling dimensions show that only a finite number of matter interactions are relevant. This is a strong indication that quantum gravity is renormalizable.

  19. Real-time identification of the resistive-wall-mode in DIII-D with Kalman filter ELM discrimination

    International Nuclear Information System (INIS)

    Edgell, D.H.; Fransson, C.M.; Humphreys, D.A.; Ferron, J.R.; Garofalo, A.M.; Kim, J.S.; La Haye, R.J.; Okabayashi, M.; Reimerdes, H.; Strait, E.J.; Turnbull, A.D.

    2004-01-01

    The resistive-wall-mode (RWM) is a major performance-limiting instability in present-day tokamaks. Active control and stabilization of the mode will almost certainly be essential for the success of advanced tokamaks and for the economic viability of tokamak fusion reactors. High performance tokamak plasmas often experience edge-localized-modes (ELMs) which can interfere with RWM identification and control. If the RWM control scheme reacts to an ELM the RWM may be driven unstable instead of controlled. An algorithm for real-time identification of the RWM with discrimination of ELMs in the DIII-D tokamak has been developed using a combination of matched filter and Kalman filter methods. The algorithm has been implemented in DIII-D's real-time plasma control system (PCS) and is available to drive active mode control schemes

  20. A new processing scheme for ultra-high resolution direct infusion mass spectrometry data

    Science.gov (United States)

    Zielinski, Arthur T.; Kourtchev, Ivan; Bortolini, Claudio; Fuller, Stephen J.; Giorio, Chiara; Popoola, Olalekan A. M.; Bogialli, Sara; Tapparo, Andrea; Jones, Roderic L.; Kalberer, Markus

    2018-04-01

    High resolution, high accuracy mass spectrometry is widely used to characterise environmental or biological samples with highly complex composition enabling the identification of chemical composition of often unknown compounds. Despite instrumental advancements, the accurate molecular assignment of compounds acquired in high resolution mass spectra remains time consuming and requires automated algorithms, especially for samples covering a wide mass range and large numbers of compounds. A new processing scheme is introduced implementing filtering methods based on element assignment, instrumental error, and blank subtraction. Optional post-processing incorporates common ion selection across replicate measurements and shoulder ion removal. The scheme allows both positive and negative direct infusion electrospray ionisation (ESI) and atmospheric pressure photoionisation (APPI) acquisition with the same programs. An example application to atmospheric organic aerosol samples using an Orbitrap mass spectrometer is reported for both ionisation techniques resulting in final spectra with 0.8% and 8.4% of the peaks retained from the raw spectra for APPI positive and ESI negative acquisition, respectively.

  1. Assessment of some high-order finite difference schemes on the scalar conservation law with periodical conditions

    Directory of Open Access Journals (Sweden)

    Alina BOGOI

    2016-12-01

    Full Text Available Supersonic/hypersonic flows with strong shocks need special treatment in Computational Fluid Dynamics (CFD in order to accurately capture the discontinuity location and his magnitude. To avoid numerical instabilities in the presence of discontinuities, the numerical schemes must generate low dissipation and low dispersion error. Consequently, the algorithms used to calculate the time and space-derivatives, should exhibit a low amplitude and phase error. This paper focuses on the comparison of the numerical results obtained by simulations with some high resolution numerical schemes applied on linear and non-linear one-dimensional conservation low. The analytical solutions are provided for all benchmark tests considering smooth periodical conditions. All the schemes converge to the proper weak solution for linear flux and smooth initial conditions. However, when the flux is non-linear, the discontinuities may develop from smooth initial conditions and the shock must be correctly captured. All the schemes accurately identify the shock position, with the price of the numerical oscillation in the vicinity of the sudden variation. We believe that the identification of this pure numerical behavior, without physical relevance, in 1D case is extremely useful to avoid problems related to the stability and convergence of the solution in the general 3D case.

  2. Interfacing external quantum devices to a universal quantum computer.

    Directory of Open Access Journals (Sweden)

    Antonio A Lagana

    Full Text Available We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer.

  3. Level-set techniques for facies identification in reservoir modeling

    Science.gov (United States)

    Iglesias, Marco A.; McLaughlin, Dennis

    2011-03-01

    In this paper we investigate the application of level-set techniques for facies identification in reservoir models. The identification of facies is a geometrical inverse ill-posed problem that we formulate in terms of shape optimization. The goal is to find a region (a geologic facies) that minimizes the misfit between predicted and measured data from an oil-water reservoir. In order to address the shape optimization problem, we present a novel application of the level-set iterative framework developed by Burger in (2002 Interfaces Free Bound. 5 301-29 2004 Inverse Problems 20 259-82) for inverse obstacle problems. The optimization is constrained by (the reservoir model) a nonlinear large-scale system of PDEs that describes the reservoir dynamics. We reformulate this reservoir model in a weak (integral) form whose shape derivative can be formally computed from standard results of shape calculus. At each iteration of the scheme, the current estimate of the shape derivative is utilized to define a velocity in the level-set equation. The proper selection of this velocity ensures that the new shape decreases the cost functional. We present results of facies identification where the velocity is computed with the gradient-based (GB) approach of Burger (2002) and the Levenberg-Marquardt (LM) technique of Burger (2004). While an adjoint formulation allows the straightforward application of the GB approach, the LM technique requires the computation of the large-scale Karush-Kuhn-Tucker system that arises at each iteration of the scheme. We efficiently solve this system by means of the representer method. We present some synthetic experiments to show and compare the capabilities and limitations of the proposed implementations of level-set techniques for the identification of geologic facies.

  4. Level-set techniques for facies identification in reservoir modeling

    International Nuclear Information System (INIS)

    Iglesias, Marco A; McLaughlin, Dennis

    2011-01-01

    In this paper we investigate the application of level-set techniques for facies identification in reservoir models. The identification of facies is a geometrical inverse ill-posed problem that we formulate in terms of shape optimization. The goal is to find a region (a geologic facies) that minimizes the misfit between predicted and measured data from an oil–water reservoir. In order to address the shape optimization problem, we present a novel application of the level-set iterative framework developed by Burger in (2002 Interfaces Free Bound. 5 301–29; 2004 Inverse Problems 20 259–82) for inverse obstacle problems. The optimization is constrained by (the reservoir model) a nonlinear large-scale system of PDEs that describes the reservoir dynamics. We reformulate this reservoir model in a weak (integral) form whose shape derivative can be formally computed from standard results of shape calculus. At each iteration of the scheme, the current estimate of the shape derivative is utilized to define a velocity in the level-set equation. The proper selection of this velocity ensures that the new shape decreases the cost functional. We present results of facies identification where the velocity is computed with the gradient-based (GB) approach of Burger (2002) and the Levenberg–Marquardt (LM) technique of Burger (2004). While an adjoint formulation allows the straightforward application of the GB approach, the LM technique requires the computation of the large-scale Karush–Kuhn–Tucker system that arises at each iteration of the scheme. We efficiently solve this system by means of the representer method. We present some synthetic experiments to show and compare the capabilities and limitations of the proposed implementations of level-set techniques for the identification of geologic facies

  5. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  6. Students' Perception of the National Open University of Nigeria ...

    African Journals Online (AJOL)

    Nekky Umera

    Hence the need for distance education (National Open University of Nigeria) ... students was used and with a single hypothesis formulated, a t-test analysis .... whether the students' apprehension to NOUN scheme is influenced by sex.

  7. Prospects of HA-Based Universal Influenza Vaccine

    Directory of Open Access Journals (Sweden)

    Anwar M. Hashem

    2015-01-01

    Full Text Available Current influenza vaccines afford substantial protection in humans by inducing strain-specific neutralizing antibodies (Abs. Most of these Abs target highly variable immunodominant epitopes in the globular domain of the viral hemagglutinin (HA. Therefore, current vaccines may not be able to induce heterosubtypic immunity against the divergent influenza subtypes. The identification of broadly neutralizing Abs (BnAbs against influenza HA using recent technological advancements in antibody libraries, hybridoma, and isolation of single Ab-secreting plasma cells has increased the interest in developing a universal influenza vaccine as it could provide life-long protection. While these BnAbs can serve as a source for passive immunotherapy, their identification represents an important step towards the design of such a universal vaccine. This review describes the recent advances and approaches used in the development of universal influenza vaccine based on highly conserved HA regions identified by BnAbs.

  8. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  9. Parameter identification based synchronization for a class of chaotic systems with offset vectors

    International Nuclear Information System (INIS)

    Chen Cailian; Feng Gang; Guan Xinping

    2004-01-01

    Based on a parameter identification scheme, a novel synchronization method is presented for a class of chaotic systems with offset vectors which can be represented by the so-called T-S fuzzy model. It is shown that the slave system can synchronize the master system and the unknown parameters of the master system can be identified simultaneously. The delayed feedback technique is also developed in order to reduce the energy and time required for the identification and synchronization. Numerical simulations demonstrate the effectiveness of the proposed method

  10. World-Wide Web: The Information Universe.

    Science.gov (United States)

    Berners-Lee, Tim; And Others

    1992-01-01

    Describes the World-Wide Web (W3) project, which is designed to create a global information universe using techniques of hypertext, information retrieval, and wide area networking. Discussion covers the W3 data model, W3 architecture, the document naming scheme, protocols, document formats, comparison with other systems, experience with the W3…

  11. Los Alamos Scientific Laboratory electronic vehicle identification system

    International Nuclear Information System (INIS)

    Landt, J.A.; Bobbett, R.E.; Koelle, A.R.; Salazar, P.H.

    1980-01-01

    A three-digit electronic identification system is described. Digits may be decimal (1000 combinations) or hexidecimal (8192 combinations). Battery-powered transponders are interrogated with a lower-power (1 W) radio signal. Line-of-sight interrogations up to 33 m (100 ft) are possible. Successful interrogations up to 7 m (20 ft) are possible for concealed transponders (that is, in the engine compartment). Vehicles moving at high rates of speed can be interrogated. This system provides data in a computer-compatible RS232 format. The system can be used for other applications with little or no modification. A similar system is in present use for identification and temperature monitoring of livestock. No unforeseen problems exist for expanding the coding scheme to identify larger numbers of objects

  12. Structural Time Domain Identification (STDI) Toolbox for Use with MATLAB

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Andersen, P.; Brincker, Rune

    1997-01-01

    The Structural Time Domain Identification (STDI) toolbox for use with MATLABTM is developed at Aalborg University, Denmark, based on the system identification research performed during recent years. By now, a reliable set of functions offers a wide spectrum of services for all the important steps...

  13. Structural Time Domain Identification (STDI) Toolbox for Use with MATLAB

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Andersen, P.; Brincker, Rune

    The Structural Time Domain Identification (STDI) toolbox for use with MATLABTM is developed at Aalborg University, Denmark, based on the system identification research performed during recent years. By now, a reliable set of functions offers a wide spectrum of services for all the important steps...

  14. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  15. Identification of natural images and computer-generated graphics based on statistical and textural features.

    Science.gov (United States)

    Peng, Fei; Li, Jiao-ting; Long, Min

    2015-03-01

    To discriminate the acquisition pipelines of digital images, a novel scheme for the identification of natural images and computer-generated graphics is proposed based on statistical and textural features. First, the differences between them are investigated from the view of statistics and texture, and 31 dimensions of feature are acquired for identification. Then, LIBSVM is used for the classification. Finally, the experimental results are presented. The results show that it can achieve an identification accuracy of 97.89% for computer-generated graphics, and an identification accuracy of 97.75% for natural images. The analyses also demonstrate the proposed method has excellent performance, compared with some existing methods based only on statistical features or other features. The method has a great potential to be implemented for the identification of natural images and computer-generated graphics. © 2014 American Academy of Forensic Sciences.

  16. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  17. Preserving anonymity in e-voting system using voter non-repudiation oriented scheme

    Science.gov (United States)

    Hamid, Isredza Rahmi A.; Radzi, Siti Nafishah Md; Rahman, Nurul Hidayah Ab; Wen, Chuah Chai; Abdullah, Nurul Azma

    2017-10-01

    The voting system has been developed from traditional paper ballot to electronic voting (e-voting). The e-voting system has high potential to be widely used in election event. However, the e-voting system still does not meet the most important security properties which are voter's authenticity and non-repudiation. This is because voters can simply vote again by entering other people's identification number. In this project, an electronic voting using voter non-repudiation oriented scheme will be developed. This system contains ten modules which are log in, vote session, voter, candidate, open session, voting results, user account, initial score, logs and reset vote count. In order to ensure there would be no non-repudiation issue, a voter non-repudiation oriented scheme concept will be adapted and implemented in the system. This system will be built using Microsoft Visual Studio 2013 which only can be accessed using personal computers at the voting center. This project will be beneficial for future use in order to overcome non-repudiation issue.

  18. Core Genome Multilocus Sequence Typing for Identification of Globally Distributed Clonal Groups and Differentiation of Outbreak Strains of Listeria monocytogenes.

    Science.gov (United States)

    Chen, Yi; Gonzalez-Escalona, Narjol; Hammack, Thomas S; Allard, Marc W; Strain, Errol A; Brown, Eric W

    2016-10-15

    Many listeriosis outbreaks are caused by a few globally distributed clonal groups, designated clonal complexes or epidemic clones, of Listeria monocytogenes, several of which have been defined by classic multilocus sequence typing (MLST) schemes targeting 6 to 8 housekeeping or virulence genes. We have developed and evaluated core genome MLST (cgMLST) schemes and applied them to isolates from multiple clonal groups, including those associated with 39 listeriosis outbreaks. The cgMLST clusters were congruent with MLST-defined clonal groups, which had various degrees of diversity at the whole-genome level. Notably, cgMLST could distinguish among outbreak strains and epidemiologically unrelated strains of the same clonal group, which could not be achieved using classic MLST schemes. The precise selection of cgMLST gene targets may not be critical for the general identification of clonal groups and outbreak strains. cgMLST analyses further identified outbreak strains, including those associated with recent outbreaks linked to contaminated French-style cheese, Hispanic-style cheese, stone fruit, caramel apple, ice cream, and packaged leafy green salad, as belonging to major clonal groups. We further developed lineage-specific cgMLST schemes, which can include accessory genes when core genomes do not possess sufficient diversity, and this provided additional resolution over species-specific cgMLST. Analyses of isolates from different common-source listeriosis outbreaks revealed various degrees of diversity, indicating that the numbers of allelic differences should always be combined with cgMLST clustering and epidemiological evidence to define a listeriosis outbreak. Classic multilocus sequence typing (MLST) schemes targeting internal fragments of 6 to 8 genes that define clonal complexes or epidemic clones have been widely employed to study L. monocytogenes biodiversity and its relation to pathogenicity potential and epidemiology. We demonstrated that core genome MLST

  19. Universal Basic Education and Achievement of Millennium ...

    African Journals Online (AJOL)

    For this reason, targets have been set, and projects, programmes and schemes instituted to achieve zero level of illiteracy. One of such is maximizing access to quality education in all nooks and crannies of Nigeria. This is where the Universal Basic Education (UBE) and Millennium Development Goals (MDGs) stand out ...

  20. Managing Medical Education at the University of Pennsylvania.

    Science.gov (United States)

    Burg, Fredric D.; And Others

    1986-01-01

    The approach used by the University of Pennsylvania School of Medicine for developing management systems that promote change and encourage innovation is described. The major elements of this scheme are: centralization of administrative functions, communication networks, consensus among constituencies, teaching performance in promotion process, and…

  1. Catalog of gamma-rays unplaced in radioactive decay schemes

    International Nuclear Information System (INIS)

    Narita, Tsutomu; Kitao, Kensuke.

    1991-03-01

    A catalog is made for gamma-rays emitted in decay of radioactive nuclides but not placed in their decay schemes. It consists of two tables. In Table 1, the number of these unplaced gamma-ray components by a nuclide is given together with the fraction of total intensity of these gamma-rays to that of all observed gamma-rays. In Table 2, the unplaced gamma-rays are arranged in order of increasing energy. Each line of this table contains the gamma-ray energy, intensity, nuclide identification, and energies and intensities of the most prominent gamma-rays from the decay of the radionuclides. This catalog is a compilation from Evaluated Nuclear Structure Data File (ENSDF) maintained by National Nuclear Data Center at Brookhaven National Laboratory, of at February 1990. (author)

  2. Universal screening for Lynch syndrome in endometrial cancers: frequency of germline mutations and identification of patients with Lynch-like syndrome.

    Science.gov (United States)

    Dillon, Jessica L; Gonzalez, Jorge L; DeMars, Leslie; Bloch, Katarzyna J; Tafe, Laura J

    2017-12-01

    Lynch syndrome (LS) is an inherited clinical syndrome characterized by a high risk of colorectal, endometrial (lifetime risk of up to 60%), ovarian, and urinary tract cancers. The diagnosis is confirmed by identification of germline mutations in the DNA mismatch repair genes MLH1, PMS2, MSH2, MSH6, or EPCAM. In 2015, our institution implemented universal screening of endometrial cancer (EC) hysterectomy specimens by mismatch repair immunohistochemistry (IHC) with reflex MLH1 promoter hypermethylation analysis for tumors with loss of MLH1/PMS2 expression. Patients with tumors negative for MLH1 methylation and those with a loss of the heterodimer pair MSH2 and MSH6, or isolated loss of either PMS2 or MSH6 were referred to the Familial Cancer Program for genetic counseling and consideration of germline testing. Between May 2015 to Dec 2016, 233 EC patients were screened by IHC for LS with a median age of 63 years. Sixty tumors (27%) had abnormal IHC staining results. Fifty-one (22%) harbored heterodimeric loss of MLH1 and PMS2, 49 of which showed MLH1 promoter methylation (1 failure, 1 negative). One showed loss of MLH1/PMS2 and MSH6, 2 showed loss of MSH2/MSH6, and 6 had isolated loss of MSH6 only. Ten patients underwent genetic counseling, and germline testing was performed in 8; LS was confirmed in 5 patients (2.1%). In addition, 3 patients with negative germline testing and presumed Lynch-like syndrome were identified and offered additional somatic testing. Universal screening for LS in EC patients has yielded positive results for identification of patients at risk for this inherited syndrome. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Designing an Health Insurance Scheme for Government Employees in Bangladesh: A Concept Paper

    OpenAIRE

    Hamid, Syed Abdul

    2014-01-01

    Introducing compulsory health insurance for government employees bears immense importance for stepping towards universal healthcare coverage in Bangladesh. Lack of scientific study on designing such scheme, in the Bangladesh context, motivates this paper. The study aims at designing a comprehensive insurance package simultaneously covering health, life and accident related disability risks of the public employees, where the health component would extend to all dependent family members. ...

  4. A MUSIC-Based Algorithm for Blind User Identification in Multiuser DS-CDMA

    Directory of Open Access Journals (Sweden)

    M. Reza Soleymani

    2005-04-01

    Full Text Available A blind scheme based on multiple-signal classification (MUSIC algorithm for user identification in a synchronous multiuser code-division multiple-access (CDMA system is suggested. The scheme is blind in the sense that it does not require prior knowledge of the spreading codes. Spreading codes and users' power are acquired by the scheme. Eigenvalue decomposition (EVD is performed on the received signal, and then all the valid possible signature sequences are projected onto the subspaces. However, as a result of this process, some false solutions are also produced and the ambiguity seems unresolvable. Our approach is to apply a transformation derived from the results of the subspace decomposition on the received signal and then to inspect their statistics. It is shown that the second-order statistics of the transformed signal provides a reliable means for removing the false solutions.

  5. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  6. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  7. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  8. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  9. Validation of the Alcohol Use Disorders Identification Test in university students: AUDIT and AUDIT-C.

    Science.gov (United States)

    García Carretero, Miguel Ángel; Novalbos Ruiz, José Pedro; Martínez Delgado, José Manuel; O'Ferrall González, Cristina

    2016-03-02

    The aim of this study was to determine the psychometric properties of the Alcohol Use Disorders Identification Test (AUDIT and AUDIT-C) in order to detect problems related to the consumption of alcohol in the university population. The sample consisted of 1309 students.A Weekly Alcohol Consumption Diary was used as a gold standard; Cronbach's Alpha, the Kappa index, Spearman's correlation coefficient and exploratory factor analysis were applied for diagnostic reliability and validity, with ROC curves used to establish the different cut-off points. Binge Drinking (BD) episodes were found in 3.9% of men and 4.0% of women with otherwise low-risk drinking patterns. AUDIT identified 20.1% as high-risk drinkers and 6.4% as drinkers with physical-psychological problems and probable alcohol dependence.Cronbach's alpha of 0.75 demonstrates good internal consistency. The best cut-off points for high-risk drinking students were 8 for males and 6 for females. As for problem drinkers and probable ADS, 13 was the best cut-off point for both sexes. In relation to AUDIT-C, 5 and 4 were the best cut-off points for males and females with high-risk patterns, respectively. The criterion validity of AUDIT and AUDIT-C to detect binge drinking episodes was found to have a moderate K value. The results obtained show that AUDIT has good psychometric properties to detect early alcohol abuse disorders in university students; however, it is recommended that the cut-off point be reduced to 8 in men. AUDIT-C improves its predictive value by raising the cut-off point by one unit. Items 2 and 3 should be reviewed to increase its predictive value for BD.

  10. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  11. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  12. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  13. Evaluation of a PCR assay for identification and differentiation of Campylobacter fetus subspecies

    DEFF Research Database (Denmark)

    Hum, S.; Quinn, K.; Brunner, J.

    1997-01-01

    methods were attributed to methodological differences used in various laboratories. Conclusion Our results indicate that misidentification of C fetus in routine diagnostic laboratories may be relatively common. The PCR assay evaluated gave rapid and reproducible results and is thus a valuable adjunctive......Objective To evaluate a polymerase chain reaction assay for identification of Campylobacter fetus and differentiation of the defined subspecies. Design Characterisation of bacterial strains by traditional phenotyping, polymerase chain reaction, a probabilistic identification scheme...... by traditional phenotypic methods and the PCR assay was found to be 80.8%. The polymerase chain reaction proved to be a reliable technique for the species and subspecies identification of C fetus; equivocal results were obtained in only two instances. Initial misidentifications by conventional phenotyping...

  14. Identification and Classification of Earthworm Species in Guyana

    OpenAIRE

    Preeta Saywack; Abdullah Adil Ansari

    2011-01-01

    Earthworms are very important organisms, they are both environmentally and economically beneficial and hence their correct identification and classification is very vital. Taxonomy aims to classify organisms based on their similarities and differences. The present study was carried out during the year 2006-2007 at University of Guyana, Georgetown focusing on identification and classification of local earthworm species of Guyana and comparison with a known non-native species (California red). ...

  15. Negative employee corporate brand identification: A case study of a prominent Malaysian University corporate brand

    OpenAIRE

    Syed alwi, SF; Balmer, JMT; CheHa, N; Yen, D

    2014-01-01

    The purpose of this paper is to investigate negative employee corporate brand identification towards a business school in Malaysia. The research marshals the nascent literature of corporate brand identification (Balmer and Liao 2007; Balmer, Liao and Wang 2008) which marked new ground by drawing on social identity theory in corporate branding contexts. Corporate brand identification is relatively new concept but has been recognized as very important facet of corporate marketing (Balmer and Li...

  16. Modeling and identification of ARMG models for stochastic processes: application to on-line computation of the power spectral density

    International Nuclear Information System (INIS)

    Zwingelstein, Gilles; Thabet, Gabriel.

    1977-01-01

    Control algorithms for components of nuclear power plants are currently based on external diagnostic methods. Modeling and identification techniques for autoregressive moving average models (ARMA) for stochastic processes are described. The identified models provide a means of estimating the power spectral density with improved accuracy and computer time compared with the classical methods. They are particularly will suited for on-line estimation of the power spectral density. The observable stochastic process y (t) is modeled assuming that it is the output of a linear filter driven by Gaussian while noise w (t). Two identification schemes were tested to find the orders m and n of the ARMA (m,n) models and to estimate the parameters of the recursion equation relating the input and output signals. The first scheme consists in transforming the ARMA model to an autoregressive model. The parameters of this AR model are obtained using least squares estimation techniques. The second scheme consists in finding the parameters of the ARMA by nonlinear programming techniques. The power spectral density of y(t) is instantaneously deduced from these ARMA models [fr

  17. Factors That Influence Enrolment and Retention in Ghana' National Health Insurance Scheme.

    Science.gov (United States)

    Kotoh, Agnes Millicent; Aryeetey, Genevieve Cecilia; Van der Geest, Sjaak

    2017-10-17

    The government of Ghana introduced the National Health Insurance Scheme (NHIS) in 2004 with the goal of achieving universal coverage within 5 years. Evidence, however, shows that expanding NHIS coverage and especially retaining members have remained a challenge. A multilevel perspective was employed as a conceptual framework and methodological tool to examine why enrolment and retention in the NHIS remains low. A household survey was conducted after 20 months educational and promotional activities aimed at improving enrolment and retention rates in 15 communities in the Central and Eastern Regions (ERs) of Ghana. Observation, indepth interviews and informal conversations were used to collect qualitative data. Forty key informants (community members, health providers and district health insurance schemes' [DHISs] staff) purposely selected from two casestudy communities in the Central Region (CR) were interviewed. Several community members, health providers and DHISs' staff were also engaged in informal conversations in the other five communities in the region. Also, four staff of the Ministry of Health (MoH), Ghana Health Service (GHS) and National Health Insurance Authority (NHIA) were engaged in in-depth interviews. Descriptive statistics was used to analyse quantitative data. Qualitative data was analysed using thematic content analysis. The results show that factors that influence enrolment and retention in the NHIS are multi-dimensional and cut across all stakeholders. People enrolled and renewed their membership because of NHIS' benefits and health providers' positive behaviour. Barriers to enrolment and retention included: poverty, traditional risk-sharing arrangements influence people to enrol or renew their membership only when they need healthcare, dissatisfaction about health providers' behaviour and service delivery challenges. Given the multi-dimensional nature of barriers to enrolment and retention, we suggest that the NHIA should engage DHISs, health

  18. Validation of a simple evaporation-transpiration scheme (SETS) to estimate evaporation using micro-lysimeter measurements

    Science.gov (United States)

    Ghazanfari, Sadegh; Pande, Saket; Savenije, Hubert

    2014-05-01

    Several methods exist to estimate E and T. The Penman-Montieth or Priestly-Taylor methods along with the Jarvis scheme for estimating vegetation resistance are commonly used to estimate these fluxes as a function of land cover, atmospheric forcing and soil moisture content. In this study, a simple evaporation transpiration method is developed based on MOSAIC Land Surface Model that explicitly accounts for soil moisture. Soil evaporation and transpiration estimated by SETS is validated on a single column of soil profile with measured evaporation data from three micro-lysimeters located at Ferdowsi University of Mashhad synoptic station, Iran, for the year 2005. SETS is run using both implicit and explicit computational schemes. Results show that the implicit scheme estimates the vapor flux close to that by the explicit scheme. The mean difference between the implicit and explicit scheme is -0.03 mm/day. The paired T-test of mean difference (p-Value = 0.042 and t-Value = 2.04) shows that there is no significant difference between the two methods. The sum of soil evaporation and transpiration from SETS is also compared with P-M equation and micro-lysimeters measurements. The SETS predicts the actual evaporation with a lower bias (= 1.24mm/day) than P-M (= 1.82 mm/day) and with R2 value of 0.82.

  19. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  20. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  1. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  2. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  3. Characterization of Micrococcaceae strains isolated from the human urogenital tract by the conventional scheme and a micromethod.

    OpenAIRE

    Baldellon, C; Mégraud, F

    1985-01-01

    Two hundred and twelve Micrococcaceae isolates were obtained from 82 men with nongonococcal urethritis, 24 women with vaginitis, and 54 girls with vulvovaginitis. Identification and biotyping of these strains were carried out by using the simplified scheme of Kloos and Schleifer (W. E. Kloos and K. H. Schleifer, J. Clin. Microbiol. 1:82-88, 1975) and the commercially available API Staph test (DMS Staph Trac). Staphylococcus epidermidis occurred in about half of these isolates. There was no st...

  4. On-line identification of hybrid systems using an adaptive growing and pruning RBF neural network

    DEFF Research Database (Denmark)

    Alizadeh, Tohid

    2008-01-01

    This paper introduces an adaptive growing and pruning radial basis function (GAP-RBF) neural network for on-line identification of hybrid systems. The main idea is to identify a global nonlinear model that can predict the continuous outputs of hybrid systems. In the proposed approach, GAP......-RBF neural network uses a modified unscented kalman filter (UKF) with forgetting factor scheme as the required on-line learning algorithm. The effectiveness of the resulting identification approach is tested and evaluated on a simulated benchmark hybrid system....

  5. University Technology Transfer

    Directory of Open Access Journals (Sweden)

    Mike Cox

    2004-09-01

    Full Text Available This article describes the experiences and general observations of the author at Heriot-Watt University and concerns the transfer of university technology for the purposes of commercialisation. Full commercial exploitation of a university invention generally requires transferring that technology into the industrial arena, usually either by formation of a new company or licensing into an existing company. Commercialisation activities need to be carried out in unison with the prime activities of the university of research and teaching. Responsibility for commercialising university inventions generally rests with a specific group within the university, typically referred to as the technology transfer group. Each technology transfer should be considered individually and appropriate arrangements made for that particular invention. In general, this transfer process involves four stages: identification, evaluation, protection and exploitation. Considerations under these general headings are outlined from a university viewpoint. A phased approach is generally preferred where possible for the evaluation, protection and exploitation of an invention to balance risk with potential reward. Evaluation of the potential opportunity for a university invention involves essentially the same considerations as for an industrial invention. However, there are a range of commercial exploitation routes and potential deals so that only general guidelines can be given. Naturally, the final deal achieved is that which can be negotiated. The potential rewards for the university and inventor are both financial (via licensing income and equity realisation and non-financial.

  6. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  7. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  8. Stepwise identification of HLA-A*0201-restricted CD8+ T-cell epitope peptides from herpes simplex virus type 1 genome boosted by a StepRank scheme.

    Science.gov (United States)

    Bi, Jianjun; Song, Rengang; Yang, Huilan; Li, Bingling; Fan, Jianyong; Liu, Zhongrong; Long, Chaoqin

    2011-01-01

    Identification of immunodominant epitopes is the first step in the rational design of peptide vaccines aimed at T-cell immunity. To date, however, it is yet a great challenge for accurately predicting the potent epitope peptides from a pool of large-scale candidates with an efficient manner. In this study, a method that we named StepRank has been developed for the reliable and rapid prediction of binding capabilities/affinities between proteins and genome-wide peptides. In this procedure, instead of single strategy used in most traditional epitope identification algorithms, four steps with different purposes and thus different computational demands are employed in turn to screen the large-scale peptide candidates that are normally generated from, for example, pathogenic genome. The steps 1 and 2 aim at qualitative exclusion of typical nonbinders by using empirical rule and linear statistical approach, while the steps 3 and 4 focus on quantitative examination and prediction of the interaction energy profile and binding affinity of peptide to target protein via quantitative structure-activity relationship (QSAR) and structure-based free energy analysis. We exemplify this method through its application to binding predictions of the peptide segments derived from the 76 known open-reading frames (ORFs) of herpes simplex virus type 1 (HSV-1) genome with or without affinity to human major histocompatibility complex class I (MHC I) molecule HLA-A*0201, and find that the predictive results are well compatible with the classical anchor residue theory and perfectly match for the extended motif pattern of MHC I-binding peptides. The putative epitopes are further confirmed by comparisons with 11 experimentally measured HLA-A*0201-restrcited peptides from the HSV-1 glycoproteins D and K. We expect that this well-designed scheme can be applied in the computational screening of other viral genomes as well.

  9. Phenotypic identification of Porphyromonas gingivalis validated with matrix-assisted laser desorption/ionization time-of-flight mass spectrometry

    NARCIS (Netherlands)

    Rams, Thomas E; Sautter, Jacqueline D; Getreu, Adam; van Winkelhoff, Arie J

    OBJECTIVE: Porphyromonas gingivalis is a major bacterial pathogen in human periodontitis. This study used matrix-assisted laser desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry to assess the accuracy of a rapid phenotypic identification scheme for detection of cultivable P.

  10. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  11. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  12. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  13. Identification and estimation of non-Gaussian structural vector autoregressions

    DEFF Research Database (Denmark)

    Lanne, Markku; Meitz, Mika; Saikkonen, Pentti

    -Gaussian components is, without any additional restrictions, identified and leads to (essentially) unique impulse responses. We also introduce an identification scheme under which the maximum likelihood estimator of the non-Gaussian SVAR model is consistent and asymptotically normally distributed. As a consequence......, additional economic identifying restrictions can be tested. In an empirical application, we find a negative impact of a contractionary monetary policy shock on financial markets, and clearly reject the commonly employed recursive identifying restrictions....

  14. Adaptive Voltage Stability Protection Based on Load Identification Using Phasor Measurement Units

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2011-01-01

    collapse. In this paper, the online load identification using measurement-based approach based on Phasor Measurement Units (PMU) was proposed to evaluate the proximity to voltage instability in order to prevent voltage collapse. In the scenarios of disturbances, the proximity to voltage collapse...... scheme based on PMUs is promising, as it prevented the voltage collapse and minimized the load shedding area....

  15. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  16. Two different PCR approaches for universal diagnosis of brown rot and identification of Monilinia spp. in stone fruit trees.

    Science.gov (United States)

    Gell, I; Cubero, J; Melgarejo, P

    2007-12-01

    To design a protocol for the universal diagnosis of brown rot by polymerase chain reaction (PCR) in plant material and subsequently Monilinia spp. identification. Primers for discrimination of Monilinia spp. from other fungal genera by PCR were designed following a ribosomal DNA analysis. Discrimination among species of Monilinia was subsequently achieved by developing primers using SCAR (Sequence Characterised Amplified Region) markers obtained after a random amplified polymorphic DNA study. In addition, an internal control (IC) based on the utilization of a mimic plasmid was designed to be used in the diagnostic protocol of brown rot to recognize false negatives due to the inhibition of PCR. The four sets of primers designed allowed detection and discrimination of all Monilinia spp. causing brown rot in fruit trees. Addition of an IC in each PCR reaction performed increased the reliability of the diagnostic protocol. The detection protocol presented here, that combined a set of universal primers and the inclusion of the plasmid pGMON as an IC for diagnosis of all Monilinia spp., and three sets of primers to discriminate the most important species of Monilinia, could be an useful and valuable tool for epidemiological studies. The method developed could be used in programmes to avoid the spread and introduction of this serious disease in new areas.

  17. Identification and antifungal susceptibility of Candida species isolated from the urine of patients in a university hospital in Brazil

    Directory of Open Access Journals (Sweden)

    Gláucia Moreira Espíndola Lima

    2017-12-01

    Full Text Available ABSTRACT The aim of this study was to identify Candida spp. isolated from candiduria episodes at a tertiary hospital in the Midwest region of Brazil, and to determine their susceptibility profiles to antifungal compounds. From May 2011 to April 2012, Candida spp. isolated from 106 adult patients with candiduria admitted to the University Hospital of the Federal University of Mato Grosso do Sul were evaluated. Both, species identification and susceptibility testing with fluconazole-FLC, voriconazole-VRC, and amphotericin B-AmB were carried out using the Vitek 2. To discriminate species of the C. parapsilosis complex, a RAPD-PCR technique using the RPO2 primer was performed. From the total of 106 isolates, 42 (39.6% C. albicans and 64 (60.4% Candida non-albicans (CNA - 33 C. tropicalis, 18 C. glabrata, 5 C. krusei, 4 C. parapsilosis sensu stricto, 2 C. kefyr, 1 C. lusitaniae, and 1 C. guilliermondii were identified. All isolates were susceptible to AmB and VRC, whereas all C. glabrata isolates presented either resistance (5.6% or dose-dependent susceptibility (94.4% to FLC. The study of Candida spp. and their resistance profiles may help in tailoring more efficient therapeutic strategies for candiduria.

  18. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  19. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  20. The Use of Meteosat Second Generation Satellite Data Within A New Type of Solar Irradiance Calculation Scheme

    Science.gov (United States)

    Mueller, R. W.; Beyer, H. G.; Cros, S.; Dagestad, K. F.; Dumortier, D.; Ineichen, P.; Hammer, A.; Heinemann, D.; Kuhlemann, R.; Olseth, J. A.; Piernavieja, G.; Reise, C.; Schroedter, M.; Skartveit, A.; Wald, L.

    1-University of Oldenburg, 2-University of Appl. Sciences Magdeburg, 3-Ecole des Mines de Paris, 4-University of Bergen, 5-Ecole Nationale des Travaux Publics de l'Etat, 6-University of Geneva, 7-Instituto Tecnologico de Canarias, 8-Fraunhofer Institute for Solar Energy Systems, 9-German Aerospace Center Geostationary satellites such as Meteosat provide cloud information with a high spatial and temporal resolution. Such satellites are therefore not only useful for weather fore- casting, but also for the estimation of solar irradiance since the knowledge of the light reflected by clouds is the basis for the calculation of the transmitted light. Additionally an the knowledge of atmospheric parameters involved in scattering and absorption of the sunlight is necessary for an accurate calculation of the solar irradiance. An accurate estimation of the downward solar irradiance is not only of particular im- portance for the assessment of the radiative forcing of the climate system, but also necessary for an efficient planning and operation of solar energy systems. Currently, most of the operational calculation schemes for solar irradiance are semi- empirical. They use cloud information from the current Meteosat satellite and clima- tologies of atmospheric parameters e.g. turbidity (aerosols and water vapor). The Me- teosat Second Generation satellites (MSG, to be launched in 2002) will provide not only a higher spatial and temporal resolution, but also the potential for the retrieval of atmospheric parameters such as ozone, water vapor and with restrictions aerosols. With this more detailed knowledge about atmospheric parameters it is evident to set up a new calculation scheme based on radiative transfer models using the retrieved atmospheric parameters as input. Unfortunately the possibility of deriving aerosol in- formation from MSG data is limited. As a cosequence the use of data from additional satellite instruments ( e.g. GOME/ATSR-2) is neeeded. Within this

  1. Scheme for radiography/tomography with a low-brilliance neutron source at the CPHS

    International Nuclear Information System (INIS)

    Huang Zhifeng; Xiao Yongshun; Zhang Ran; Li Yuanji; Han Xiaoxue; Shao Beibei; Wang Xuewu; Wei Jie; Loong, C.-K.

    2011-01-01

    A cold neutron radiography/tomography instrument was designed and will soon undergo construction at the Compact Pulsed Hadron Source (CPHS) of Tsinghua University, China. In this paper, we report the physical design of the instrument and propose a scheme to implement several techniques at a later phase to enhance the utilization of the flux on larger samples. This includes code-aperture, grating-based imaging, prompt gamma-ray analysis and 3D emission CT.

  2. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  3. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  4. Synchronization of chaotic systems and identification of nonlinear systems by using recurrent hierarchical type-2 fuzzy neural networks.

    Science.gov (United States)

    Mohammadzadeh, Ardashir; Ghaemi, Sehraneh

    2015-09-01

    This paper proposes a novel approach for training of proposed recurrent hierarchical interval type-2 fuzzy neural networks (RHT2FNN) based on the square-root cubature Kalman filters (SCKF). The SCKF algorithm is used to adjust the premise part of the type-2 FNN and the weights of defuzzification and the feedback weights. The recurrence property in the proposed network is the output feeding of each membership function to itself. The proposed RHT2FNN is employed in the sliding mode control scheme for the synchronization of chaotic systems. Unknown functions in the sliding mode control approach are estimated by RHT2FNN. Another application of the proposed RHT2FNN is the identification of dynamic nonlinear systems. The effectiveness of the proposed network and its learning algorithm is verified by several simulation examples. Furthermore, the universal approximation of RHT2FNNs is also shown. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  5. A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

    Directory of Open Access Journals (Sweden)

    Zhonglin Chen

    2018-01-01

    Full Text Available The ultradense network (UDN is one of the most promising technologies in the fifth generation (5G to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC scheme; the scheme solves the security problem among the access points (APs in a dynamic APs group (APG and between the AP and user equipment (UE. We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  7. Identification of subjects for social responsibility education at universities and the present activity at the university of Tokyo.

    Science.gov (United States)

    Karima, Risuke; Oshima, Yoshito; Yamamoto, Kazuo

    2006-01-01

    The management of corporate social responsibility (CSR) has recently become a critical concern for companies in advanced countries. For universities, there is a requirement to contribute to the promotion of CSR, resulting in graduates who have sufficient cognition of and a good attitude towards CSR. In addition, universities have social responsibilities, which can be called "University Social Responsibility (USR)." On the basis of the concepts of the guidelines for CSR in the "Green Paper," which was presented by the European Committee (EC) in 2001, we provide a perspective here on what factors dictate the establishment of education programs for social responsibilities at universities. These factors include an outline of the concepts and the significance of CSR, social ethics and the morals of higher education and research, compliances, human resource management, human rights, safety and health in academic settings, and various concerns regarding environmental safety and preservation. Additionally, through the concept postulated here for social responsible education, in this paper, we introduce the present activity at the University of Tokyo (UT) in terms of the education program for CSR and USR, proposing that the future establishment of university-wide education programs based on the concept of CSR and the value of sustainability is required at UT.

  8. Customized lifting multiwavelet packet information entropy for equipment condition identification

    International Nuclear Information System (INIS)

    Chen, Jinglong; Zi, Yanyang; He, Zhengjia; Chen, Xuefeng; Zuo, Ming J; Yuan, Jing

    2013-01-01

    Condition identification of mechanical equipment from vibration measurement data is significant to avoid economic loss caused by unscheduled breakdowns and catastrophic accidents. However, this task still faces challenges due to the complexity of equipment and the harsh environment. This paper provides a possibility for equipment condition identification by proposing a method called customized lifting multiwavelet packet information entropy. Benefiting from the properties of multi-resolution analysis and multiple wavelet basis functions, the multiwavelet method has advantages in characterizing non-stationary vibration signals. In order to realize the accurate detection and identification of the condition features, a customized lifting multiwavelet packet is constructed via a multiwavelet lifting scheme. Then the vibration signal from the mechanical equipment is processed by the customized lifting multiwavelet packet transform. The relative energy in each frequency band of the multiwavelet packet transform coefficients that equals a percentage of the whole signal energy is taken as the probability. The normalized information entropy is obtained based on the relative energy to describe the condition of a mechanical system. The proposed method is applied to the condition identification of a rolling mill and a demountable disk–drum aero-engine. The results support the feasibility of the proposed method in equipment condition identification. (paper)

  9. First test of a BAE transducing scheme on a Resonant Gravitational-Wave Antenna

    International Nuclear Information System (INIS)

    Bonifazi, P.; Vaselli, V.; Visco, M.

    1997-01-01

    The authors present the results obtained with a resonant capacitive transducer, suitable for Back Action Evasion (BAE) measurements, coupled for the first time to a gravitational-wave antenna. This scheme was developed in collaboration with the Group of the University of Rome La Sapienza. The antenna is a 270 kg aluminum 5056 alloy cylinder, with a resonant frequency of 1805 Hz, operating at 4.2 K in the ALTAIR cryostat, located in Frascati (Italy) at the IFSI-CNR laboratory. The apparatus was able to work for periods as long as days, both in up-conversion and BAE configurations, with good stability. The behaviour of the system is in reasonable agreement with a proposed model of a double harmonic oscillator in a BAE readout scheme. The limits on the sensitivity of this set-up are discussed as well as the possible future improvements

  10. Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games

    Science.gov (United States)

    Kozma, William; Lazos, Loukas

    We address the problem of identifying misbehaving nodes that refuse to forward packets in wireless multi-hop networks. We map the process of locating the misbehaving nodes to the classic Rényi-Ulam game of 20 questions. Compared to previous methods, our mapping allows the evaluation of node behavior on a per-packet basis, without the need for energy-expensive overhearing techniques or intensive acknowledgment schemes. Furthermore, it copes with colluding adversaries that coordinate their behavioral patterns to avoid identification and frame honest nodes. We show via simulations that our algorithms reduce the communication overhead for identifying misbehaving nodes by at least one order of magnitude compared to other methods, while increasing the identification delay logarithmically with the path size.

  11. An automatic microseismic or acoustic emission arrival identification scheme with deep recurrent neural networks

    Science.gov (United States)

    Zheng, Jing; Lu, Jiren; Peng, Suping; Jiang, Tianqi

    2018-02-01

    The conventional arrival pick-up algorithms cannot avoid the manual modification of the parameters for the simultaneous identification of multiple events under different signal-to-noise ratios (SNRs). Therefore, in order to automatically obtain the arrivals of multiple events with high precision under different SNRs, in this study an algorithm was proposed which had the ability to pick up the arrival of microseismic or acoustic emission events based on deep recurrent neural networks. The arrival identification was performed using two important steps, which included a training phase and a testing phase. The training process was mathematically modelled by deep recurrent neural networks using Long Short-Term Memory architecture. During the testing phase, the learned weights were utilized to identify the arrivals through the microseismic/acoustic emission data sets. The data sets were obtained by rock physics experiments of the acoustic emission. In order to obtain the data sets under different SNRs, this study added random noise to the raw experiments' data sets. The results showed that the outcome of the proposed method was able to attain an above 80 per cent hit-rate at SNR 0 dB, and an approximately 70 per cent hit-rate at SNR -5 dB, with an absolute error in 10 sampling points. These results indicated that the proposed method had high selection precision and robustness.

  12. Combining Multiple Features for Text-Independent Writer Identification and Verification

    OpenAIRE

    Bulacu , Marius; Schomaker , Lambert

    2006-01-01

    http://www.suvisoft.com; In recent years, we proposed a number of new and very effective features for automatic writer identification and verification. They are probability distribution functions (PDFs) extracted from the handwriting images and characterize writer individuality independently of the textual content of the written samples. In this paper, we perform an extensive analysis of feature combinations. In our fusion scheme, the final unique distance between two handwritten samples is c...

  13. Modeling, Identification and Control at Telemark University College

    Directory of Open Access Journals (Sweden)

    Bernt Lie

    2009-07-01

    Full Text Available Master studies in process automation started in 1989 at what soon became Telemark University College, and the 20 year anniversary marks the start of our own PhD degree in Process, Energy and Automation Engineering. The paper gives an overview of research activities related to control engineering at Department of Electrical Engineering, Information Technology and Cybernetics.

  14. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  15. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  16. Hybrid Scheme for Modeling Local Field Potentials from Point-Neuron Networks.

    Science.gov (United States)

    Hagen, Espen; Dahmen, David; Stavrinou, Maria L; Lindén, Henrik; Tetzlaff, Tom; van Albada, Sacha J; Grün, Sonja; Diesmann, Markus; Einevoll, Gaute T

    2016-12-01

    With rapidly advancing multi-electrode recording technology, the local field potential (LFP) has again become a popular measure of neuronal activity in both research and clinical applications. Proper understanding of the LFP requires detailed mathematical modeling incorporating the anatomical and electrophysiological features of neurons near the recording electrode, as well as synaptic inputs from the entire network. Here we propose a hybrid modeling scheme combining efficient point-neuron network models with biophysical principles underlying LFP generation by real neurons. The LFP predictions rely on populations of network-equivalent multicompartment neuron models with layer-specific synaptic connectivity, can be used with an arbitrary number of point-neuron network populations, and allows for a full separation of simulated network dynamics and LFPs. We apply the scheme to a full-scale cortical network model for a ∼1 mm 2 patch of primary visual cortex, predict laminar LFPs for different network states, assess the relative LFP contribution from different laminar populations, and investigate effects of input correlations and neuron density on the LFP. The generic nature of the hybrid scheme and its public implementation in hybridLFPy form the basis for LFP predictions from other and larger point-neuron network models, as well as extensions of the current application with additional biological detail. © The Author 2016. Published by Oxford University Press.

  17. Brute-Force Approach for Mass Spectrometry-Based Variant Peptide Identification in Proteogenomics without Personalized Genomic Data

    Science.gov (United States)

    Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.

    2018-02-01

    In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.

  18. Blind sequential lineup administration reduces both false identifications and confidence in those false identifications.

    Science.gov (United States)

    Charman, Steve D; Quiroz, Vanessa

    2016-10-01

    One of the most recommended procedures proposed by eyewitness experts is the use of double-blind lineups, in which the administrator does not know the identity of the suspect in the lineup. But despite the near universality of this recommendation, there is surprisingly little empirical research to support the claim that nonblind administration inflates false identifications. What little research has been conducted has shown conflicting findings with regard to the conditions under which nonblind administration affects false identifications, as well as its effects on witness confidence. The current study attempts to elucidate this effect. Student-participants (n = 312) were randomly assigned to play the role of either a lineup administrator (who were either told the identity of the suspect in the lineup or not) or a mock crime witness. Following unbiased instructions, administrators presented either a target-present or target-absent sequential lineup to the witness while being surreptitiously videorecorded. Nonblind administration significantly inflated false, but not correct, identifications, and significantly inflated witness confidence in those false identifications. Video recordings indicated that nonblind administrators were significantly more likely than blind administrators to smile (a) while the witness was viewing a photograph of the suspect, and (b) after a suspect identification. Results provide stronger support for the use of blind lineup administration by broadening the conditions under which nonblind administration is shown to inflate false identifications. Possible reconciliations for conflicting findings in the literature are discussed. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  19. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  20. 77 FR 56212 - Federal Acquisition Regulation; Information Collection; Use of Data Universal Numbering System...

    Science.gov (United States)

    2012-09-12

    ...; Information Collection; Use of Data Universal Numbering System (DUNS) as Primary Contractor Identification... ``Information Collection 9000-0145, Use of Data Universal Numbering System (DUNS) as Primary Contractor... extension of a previously approved information collection requirement concerning use of the Data Universal...

  1. Radar Emission Sources Identification Based on Hierarchical Agglomerative Clustering for Large Data Sets

    Directory of Open Access Journals (Sweden)

    Janusz Dudczyk

    2016-01-01

    Full Text Available More advanced recognition methods, which may recognize particular copies of radars of the same type, are called identification. The identification process of radar devices is a more specialized task which requires methods based on the analysis of distinctive features. These features are distinguished from the signals coming from the identified devices. Such a process is called Specific Emitter Identification (SEI. The identification of radar emission sources with the use of classic techniques based on the statistical analysis of basic measurable parameters of a signal such as Radio Frequency, Amplitude, Pulse Width, or Pulse Repetition Interval is not sufficient for SEI problems. This paper presents the method of hierarchical data clustering which is used in the process of radar identification. The Hierarchical Agglomerative Clustering Algorithm (HACA based on Generalized Agglomerative Scheme (GAS implemented and used in the research method is parameterized; therefore, it is possible to compare the results. The results of clustering are presented in dendrograms in this paper. The received results of grouping and identification based on HACA are compared with other SEI methods in order to assess the degree of their usefulness and effectiveness for systems of ESM/ELINT class.

  2. Slovak Dependency Treebank in Universal Dependencies

    Directory of Open Access Journals (Sweden)

    Zeman Daniel

    2017-12-01

    Full Text Available We describe a conversion of the syntactically annotated part of the Slovak National Corpus into the annotation scheme known as Universal Dependencies. Only a small subset of the data has been converted so far; yet it is the first Slovak treebank that is publicly available for research. We list a number of research projects in which the dataset has been used so far, including the first parsing results.

  3. College Students' Perceptions of University Identification and Football Game Day Attire

    Science.gov (United States)

    Crosby, Melanie; Kim, Soyoung; Hathcote, Jan

    2006-01-01

    The purpose of this study was to determine the rationale behind football game day attire and to establish whether organizational identification, perceived organizational prestige, and game day participation influenced clothing choice. By identifying the game day clothing habits of female college students attending Division I-A schools throughout…

  4. Identification of chaotic systems by neural network with hybrid learning algorithm

    International Nuclear Information System (INIS)

    Pan, S.-T.; Lai, C.-C.

    2008-01-01

    Based on the genetic algorithm (GA) and steepest descent method (SDM), this paper proposes a hybrid algorithm for the learning of neural networks to identify chaotic systems. The systems in question are the logistic map and the Duffing equation. Different identification schemes are used to identify both the logistic map and the Duffing equation, respectively. Simulation results show that our hybrid algorithm is more efficient than that of other methods

  5. Construction of a universal quantum computer

    International Nuclear Information System (INIS)

    Lagana, Antonio A.; Lohe, M. A.; Smekal, Lorenz von

    2009-01-01

    We construct a universal quantum computer following Deutsch's original proposal of a universal quantum Turing machine (UQTM). Like Deutsch's UQTM, our machine can emulate any classical Turing machine and can execute any algorithm that can be implemented in the quantum gate array framework but under the control of a quantum program, and hence is universal. We present the architecture of the machine, which consists of a memory tape and a processor and describe the observables that comprise the registers of the processor and the instruction set, which includes a set of operations that can approximate any unitary operation to any desired accuracy and hence is quantum computationally universal. We present the unitary evolution operators that act on the machine to achieve universal computation and discuss each of them in detail and specify and discuss explicit program halting and concatenation schemes. We define and describe a set of primitive programs in order to demonstrate the universal nature of the machine. These primitive programs facilitate the implementation of more complex algorithms and we demonstrate their use by presenting a program that computes the NAND function, thereby also showing that the machine can compute any classically computable function.

  6. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  7. A study of the spreading scheme for viral marketing based on a complex network model

    Science.gov (United States)

    Yang, Jianmei; Yao, Canzhong; Ma, Weicheng; Chen, Guanrong

    2010-02-01

    Buzzword-based viral marketing, known also as digital word-of-mouth marketing, is a marketing mode attached to some carriers on the Internet, which can rapidly copy marketing information at a low cost. Viral marketing actually uses a pre-existing social network where, however, the scale of the pre-existing network is believed to be so large and so random, so that its theoretical analysis is intractable and unmanageable. There are very few reports in the literature on how to design a spreading scheme for viral marketing on real social networks according to the traditional marketing theory or the relatively new network marketing theory. Complex network theory provides a new model for the study of large-scale complex systems, using the latest developments of graph theory and computing techniques. From this perspective, the present paper extends the complex network theory and modeling into the research of general viral marketing and develops a specific spreading scheme for viral marking and an approach to design the scheme based on a real complex network on the QQ instant messaging system. This approach is shown to be rather universal and can be further extended to the design of various spreading schemes for viral marketing based on different instant messaging systems.

  8. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  9. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  10. Upport vector machines for nonlinear kernel ARMA system identification.

    Science.gov (United States)

    Martínez-Ramón, Manel; Rojo-Alvarez, José Luis; Camps-Valls, Gustavo; Muñioz-Marí, Jordi; Navia-Vázquez, Angel; Soria-Olivas, Emilio; Figueiras-Vidal, Aníbal R

    2006-11-01

    Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA2K) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based system identification nonlinear models is presented, based on the use of composite Mercer's kernels. This general class can improve model flexibility by emphasizing the input-output cross information (SVM-ARMA4K), which leads to straightforward and natural combinations of implicit and explicit ARMA models (SVR-ARMA2K and SVR-ARMA4K). Capabilities of these different SVM-based system identification schemes are illustrated with two benchmark problems.

  11. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  12. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  13. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  14. Universal Greenberger-Horne-Zeilinger-state analyzer based on two-photon polarization parity detection

    International Nuclear Information System (INIS)

    Qian Jun; Feng Xunli; Gong Shangqing

    2005-01-01

    We present a universal analyzer for the three-particle Greenberger-Horne-Zeilinger (GHZ) states with quantum nondemolition parity detectors and linear-optics elements. In our scheme, all of the three-photon GHZ states can be discriminated with nearly unity probability in the regime of weak nonlinearity feasible at the present state of the art experimentally. We also show that our scheme can be easily extended to the analysis of the multi-particle GHZ states

  15. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  16. A key heterogeneous structure of fractal networks based on inverse renormalization scheme

    Science.gov (United States)

    Bai, Yanan; Huang, Ning; Sun, Lina

    2018-06-01

    Self-similarity property of complex networks was found by the application of renormalization group theory. Based on this theory, network topologies can be classified into universality classes in the space of configurations. In return, through inverse renormalization scheme, a given primitive structure can grow into a pure fractal network, then adding different types of shortcuts, it exhibits different characteristics of complex networks. However, the effect of primitive structure on networks structural property has received less attention. In this paper, we introduce a degree variance index to measure the dispersion of nodes degree in the primitive structure, and investigate the effect of the primitive structure on network structural property quantified by network efficiency. Numerical simulations and theoretical analysis show a primitive structure is a key heterogeneous structure of generated networks based on inverse renormalization scheme, whether or not adding shortcuts, and the network efficiency is positively correlated with degree variance of the primitive structure.

  17. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  18. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  19. Is universal coverage via social health insurance financially feasible ...

    African Journals Online (AJOL)

    SHI would take up an increasing proportion of total health expenditure over the simulation period and become the dominant health financing mechanism. In principle, and on the basis of the assumed policy variables, universal coverage could be reached within 6 years through the implementation of an SHI scheme based ...

  20. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  1. RBF Neural Network Approach for Identification and Control of DC Motors

    Directory of Open Access Journals (Sweden)

    EA Feilat

    2012-12-01

    Full Text Available In this paper, a neural network approach for the identification and control of a separately excited direct (DC motor (SEDCM driving a centrifugal pump load is applied. In this application, two radial basis function neural networks (RBFNN are used: The first is a RBFNN identifier trained offline to emulate the dynamic performance of the DC motor-load system. The second is a RBFNN controller, which is trained to make the motor speed follow a selected reference signal. Two RBFNN control schemes are proposed using direct inverse and internal model control schemes. The performance of the RBFNN identifier and controller is investigated in terms of step response, sharp changes in speed trajectory, and sudden load change, as well as changes in motor parameters. The performance of RBFNN in system identification and control has been compared with the performance of the well-known back-propagation neural network (BPNN. The simulation results show that both of the BPNN and RBFNN controllers exhibit excellent dynamic response, adapt well to changes in speed trajectory and load connected to the motor, and adapt to the variations of motor parameters. Furthermore, the simulation results show that the step response of RBFNN internal model and direct inverse controllers are identical.

  2. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  3. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  4. Detection and Identification of Loss of Efficiency Faults of Flight Actuators

    Directory of Open Access Journals (Sweden)

    Ossmann Daniel

    2015-03-01

    Full Text Available We propose linear parameter-varying (LPV model-based approaches to the synthesis of robust fault detection and diagnosis (FDD systems for loss of efficiency (LOE faults of flight actuators. The proposed methods are applicable to several types of parametric (or multiplicative LOE faults such as actuator disconnection, surface damage, actuator power loss or stall loads. For the detection of these parametric faults, advanced LPV-model detection techniques are proposed, which implicitly provide fault identification information. Fast detection of intermittent stall loads (seen as nuisances, rather than faults is important in enhancing the performance of various fault detection schemes dealing with large input signals. For this case, a dedicated fast identification algorithm is devised. The developed FDD systems are tested on a nonlinear actuator model which is implemented in a full nonlinear aircraft simulation model. This enables the validation of the FDD system’s detection and identification characteristics under realistic conditions.

  5. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  6. Innovation by coercion: Emerging institutionalization of university-industry collaborations in Russia.

    Science.gov (United States)

    Bychkova, Olga

    2016-08-01

    This article explores the emerging institutionalization of collaborative university-industry networks in Russia. The Russian government has attempted to use a top-down public policy scheme to stimulate and promote network-building in the R&D sector. In order to understand the initial organizational responses that universities and companies select while structuring collaborations, the article utilizes conceptual perspectives from institutional theory, especially drawing on arguments from strategic choice, network-building, and network failure studies.

  7. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  8. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  9. Review of the Umthombo Youth Development Foundation scholarship scheme, 1999–2013

    Science.gov (United States)

    MacGregor, Gavin; Campbell, Laura

    2015-01-01

    Introduction Staffing of rural and remote facilities is a challenge throughout the world. Umthombo Youth Development Foundation (UYDF) has been running a rurally based scholarship scheme since 1999. The aim of this review is to present data on the number of students selected, their progress, graduation and work placement from inception of the scheme until 2013. Methods Data were extracted from the UYDF data base using a data collection template to ensure all important information was captured. Results Since 1999, 430 rural students across 15 health disciplines have been supported by UYDF. The annual pass rate has been greater than 89%, and less than 10% of students have been excluded from university. All graduates have spent time working in rural areas (excluding the 32 currently doing internships) and 72% (52/73) of those with no work-back obligation continue to work in rural areas. Discussion and conclusion The UYDF model is built around local selection, compulsory academic and peer mentoring and social support, comprehensive financial support and experiential holiday work. The results are encouraging and highlight the fact that rural students can succeed at university and will come back and work in rural areas. With 46% of the South African population situated rurally, greater thought and effort must be put into the recruitment and training of rural scholars as a possible solution to the staffing of rural healthcare facilities. The UYDF provides a model which could be replicated in other parts of South Africa. PMID:26245594

  10. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  11. Library Support for Covenant University's Core Value of Capacity ...

    African Journals Online (AJOL)

    ... and creation of spiritual and leadership development section among others as some of the roles of the library in supporting the Covenant University core value of capacity building. The paper concluded by noting that it is necessary for individuals and organizations to accord capacity building a pride of place in the scheme ...

  12. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  13. Utilisation of a peer assisted learning scheme in an undergraduate diagnostic radiography module

    International Nuclear Information System (INIS)

    Meertens, R.

    2016-01-01

    Background: Peer to peer support programmes involve students supporting each other in either an educational, social and/or pastoral way. This is now common place in higher education institutes and has been proven to decrease student attrition and improve grades. Aim: To evaluate a peer assisted learning scheme (PALS) within the University of Exeter undergraduate programme, where final year (stage 3) students held extra-curricular teaching sessions in an on-campus X-ray room throughout the academic term to support a first year (stage 1) module introducing basic projectional radiographic examinations, radiation safety, patient care and radiographic equipment. PALS sessions were unstructured and as such could involve roleplaying radiographic examinations, revisiting lecture material and/or discussing hospital placement or pastoral issues. Methods: Brookfield's four lenses of critical reflection were used. 16 of 63 stage 1 students and 9 of 29 stage 3 students were electronically surveyed upon completion of the PALS sessions. Relevant colleagues and educational specialists were also informally interviewed. These were put in context with autobiographical reflections and the existing literature base on PALS. Results: All agreed that the sessions provided a good environment for stage 1 students to improve their practical skills, revise lecture content, and gain confidence for upcoming clinical placements. Stage 3 students gained experience teaching students, an essential role of a graduate radiographer's job. Improvements around recruiting stage 3 peer leaders, sustainability, timetabling and session structure were explored. Conclusion: The PALS proved to be a successful initiative within the undergraduate programme and will be continued into the future. - Highlights: • Peer Assisted Learning Schemes are an established part of higher education. • Peer Assisted Learning Schemes can reduce student attrition and improve grades. • Peer Assisted Learning

  14. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  15. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  16. A Robust Multimodal Bio metric Authentication Scheme with Voice and Face Recognition

    International Nuclear Information System (INIS)

    Kasban, H.

    2017-01-01

    This paper proposes a multimodal biometric scheme for human authentication based on fusion of voice and face recognition. For voice recognition, three categories of features (statistical coefficients, cepstral coefficients and voice timbre) are used and compared. The voice identification modality is carried out using Gaussian Mixture Model (GMM). For face recognition, three recognition methods (Eigenface, Linear Discriminate Analysis (LDA), and Gabor filter) are used and compared. The combination of voice and face biometrics systems into a single multimodal biometrics system is performed using features fusion and scores fusion. This study shows that the best results are obtained using all the features (cepstral coefficients, statistical coefficients and voice timbre features) for voice recognition, LDA face recognition method and scores fusion for the multimodal biometrics system

  17. Indigenous Angiosperm biodiversity of Olabisi Onabanjo University ...

    African Journals Online (AJOL)

    The conservation of the genetic variability of the indigenous angiosperm community is a sine qua non. A survey of indigenous angiosperm biodiversity of the Olabisi Onabanjo University permanent site was undertaken. Plants collected were dried, poisoned and mounted on herbarium sheets, proper identification and ...

  18. Fault detection and identification for a class of continuous piecewise affine systems with unknown subsystems and partitions

    NARCIS (Netherlands)

    Le quang, Thuan; Baldi, S.

    2018-01-01

    This paper establishes a novel online fault detection and identification strategy for a class of continuous piecewise affine (PWA) systems, namely, bimodal and trimodal PWA systems. The main contributions with respect to the state-of-the-art are the recursive nature of the proposed scheme and the

  19. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  20. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  1. Towards Universal Health Coverage via Social Health Insurance in China: Systemic Fragmentation, Reform Imperatives, and Policy Alternatives.

    Science.gov (United States)

    He, Alex Jingwei; Wu, Shaolong

    2017-12-01

    China's remarkable progress in building a comprehensive social health insurance (SHI) system was swift and impressive. Yet the country's decentralized and incremental approach towards universal coverage has created a fragmented SHI system under which a series of structural deficiencies have emerged with negative impacts. First, contingent on local conditions and financing capacity, benefit packages vary considerably across schemes, leading to systematic inequity. Second, the existence of multiple schemes, complicated by massive migration, has resulted in weak portability of SHI, creating further barriers to access. Third, many individuals are enrolled on multiple schemes, which causes inefficient use of government subsidies. Moral hazard and adverse selection are not effectively managed. The Chinese government announced its blueprint for integrating the urban and rural resident schemes in early 2016, paving the way for the ultimate consolidation of all SHI schemes and equal benefits for all. This article proposes three policy alternatives to inform the consolidation: (1) a single-pool system at the prefectural level with significant government subsidies, (2) a dual-pool system at the prefectural level with risk-equalization mechanisms, and (3) a household approach without merging existing pools. Vertical integration to the provincial level is unlikely to happen in the near future. Two caveats are raised to inform this transition towards universal health coverage.

  2. Modelling the implications of moving towards universal coverage in Tanzania.

    Science.gov (United States)

    Borghi, Josephine; Mtei, Gemini; Ally, Mariam

    2012-03-01

    A model was developed to assess the impact of possible moves towards universal coverage in Tanzania over a 15-year time frame. Three scenarios were considered: maintaining the current situation ('the status quo'); expanded health insurance coverage (the estimated maximum achievable coverage in the absence of premium subsidies, coverage restricted to those who can pay); universal coverage to all (government revenues used to pay the premiums for the poor). The model estimated the costs of delivering public health services and all health services to the population as a proportion of Gross Domestic Product (GDP), and forecast revenue from user fees and insurance premiums. Under the status quo, financial protection is provided to 10% of the population through health insurance schemes, with the remaining population benefiting from subsidized user charges in public facilities. Seventy-six per cent of the population would benefit from financial protection through health insurance under the expanded coverage scenario, and 100% of the population would receive such protection through a mix of insurance cover and government funding under the universal coverage scenario. The expanded and universal coverage scenarios have a significant effect on utilization levels, especially for public outpatient care. Universal coverage would require an initial doubling in the proportion of GDP going to the public health system. Government health expenditure would increase to 18% of total government expenditure. The results are sensitive to the cost of health system strengthening, the level of real GDP growth, provider reimbursement rates and administrative costs. Promoting greater cross-subsidization between insurance schemes would provide sufficient resources to finance universal coverage. Alternately, greater tax funding for health could be generated through an increase in the rate of Value-Added Tax (VAT) or expanding the income tax base. The feasibility and sustainability of efforts to

  3. Renormalization-scheme-invariant QCD and QED: The method of effective charges

    International Nuclear Information System (INIS)

    Grunberg, G.

    1984-01-01

    We review, extend, and give some further applications of a method recently suggested to solve the renormalization-scheme-dependence problem in perturbative field theories. The use of a coupling constant as a universal expansion parameter is abandoned. Instead, to each physical quantity depending on a single scale variable is associated an effective charge, whose corresponding Stueckelberg--Peterman--Gell-Mann--Low function is identified as the proper object on which perturbation theory applies. Integration of the corresponding renormalization-group equations yields renormalization-scheme-invariant results free of any ambiguity related to the definition of the kinematical variable, or that of the scale parameter Λ, even though the theory is not solved to all orders. As a by-product, a renormalization-group improvement of the usual series is achieved. Extension of these methods to operators leads to the introduction of renormalization-group-invariant Green's function and Wilson coefficients, directly related to effective charges. The case of nonzero fermion masses is discussed, both for fixed masses and running masses in mass-independent renormalization schemes. The importance of the scale-invariant mass m is emphasized. Applications are given to deep-inelastic phenomena, where the use of renormalization-group-invariant coefficient functions allows to perform the factorization without having to introduce a factorization scale. The Sudakov form factor of the electron in QED is discussed as an example of an extension of the method to problems involving several momentum scales

  4. Weed Identification and Control in Vegetable Crops.

    Science.gov (United States)

    Ferretti, Peter A., Comp.

    This agriculture extension service publication from Pennsylvania State University examines weed control and identification in vegetable crops. Contents include: (1) Types of weeds; (2) Reducing losses caused by weeds, general control methods and home garden weed control; (3) How herbicides are used; (4) Specific weeds in vegetable plantings; and…

  5. The Politico-Economic Challenges of Ghana’s National Health Insurance Scheme Implementation

    Directory of Open Access Journals (Sweden)

    Adam Fusheini

    2016-09-01

    Full Text Available Background National/social health insurance schemes have increasingly been seen in many low- and middle-income countries (LMICs as a vehicle to universal health coverage (UHC and a viable alternative funding mechanism for the health sector. Several countries, including Ghana, have thus introduced and implemented mandatory national health insurance schemes (NHIS as part of reform efforts towards increasing access to health services. Ghana passed mandatory national health insurance (NHI legislation (ACT 650 in 2003 and commenced nationwide implementation in 2004. Several peer review studies and other research reports have since assessed the performance of the scheme with positive rating while challenges also noted. This paper contributes to the literature on economic and political implementation challenges based on empirical evidence from the perspectives of the different category of actors and institutions involved in the process. Methods Qualitative in-depth interviews were held with 33 different category of participants in four selected district mutual health insurance schemes in Southern (two and Northern (two Ghana. This was to ascertain their views regarding the main challenges in the implementation process. The participants were selected through purposeful sampling, stakeholder mapping, and snowballing. Data was analysed using thematic grouping procedure. Results Participants identified political issues of over politicisation and political interference as main challenges. The main economic issues participants identified included low premiums or contributions; broad exemptions, poor gatekeeper enforcement system; and culture of curative and hospital-centric care. Conclusion The study establishes that political and economic factors have influenced the implementation process and the degree to which the policy has been implemented as intended. Thus, we conclude that there is a synergy between implementation and politics; and achieving UHC under

  6. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  7. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  8. Resourse Allocation and Pricing Principles for a University Computer Centre. Working Paper Series Number 6819.

    Science.gov (United States)

    Possen, Uri M.; And Others

    As an introduction, this paper presents a statement of the objectives of the university computing center (UCC) from the viewpoint of the university, the government, the typical user, and the UCC itself. The operating and financial structure of a UCC are described. Three main types of budgeting schemes are discussed: time allocation, pseudo-dollar,…

  9. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  10. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  11. Introducing RFID at Middlesex University Learning Resources

    Science.gov (United States)

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  12. An Explication and Test of Communication Network Content and Multiplexity as Predictors of Organizational Identification.

    Science.gov (United States)

    Bullis, Connie; Bach, Betsy Wackernagel

    1991-01-01

    Examines the relationship between identification and communication using organizational identification (OI) as a theoretical framework for studying communication networks among incoming graduate students in three university departments of communication. Concludes that, irrespective of initial OI, stronger initial multiplexity predicts the growth…

  13. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  14. Research on university culture construction in the view of ecological idea

    Directory of Open Access Journals (Sweden)

    Wang Xinggang

    2016-01-01

    Full Text Available With the progress of times, our spiritual pursuit becomes higher and higher, and it is especially true among modern youth. Therefore, establishment of university culture has gradually become the focus of attention. This paper firstly quantized university culture construction into four parts: material culture construction, spiritual culture construction, system culture construction, and behavioral culture construction. It then analogized each part as one population in ecological system; established multi-population ecological model; and analyzed the interactional relations between each part. At last, this paper reached conclusions based on multi-population ecological model and analyzed the correlations among various factors of university culture construction, so as to obtain a comprehensive, scientific and healthy scheme for university culture construction.

  15. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  16. Practice-Oriented Research: The Extended Function of Dutch Universities of Applied Sciences

    NARCIS (Netherlands)

    de Weert, Egbert; Leijnse, Frans; Kyvik, Svein; Lepori, Benedetto

    2010-01-01

    This chapter seeks to analyse the legitimate research claims of Dutch universities of applied sciences. It subsequently analyses how the research function has been conceived in national policies, the emerging funding schemes for research, strategies developed by these institutions regarding

  17. Two Decades of Planning in Latin American Universities: Trends and Perspectives.

    Science.gov (United States)

    Escala, Miguel J.

    The paper provides a framework for identifying trends in planning in Latin American universities for the last 20 years. Identification of the planning trends is based on two main dimensions: the purpose of the relationship between universities and the external environment (organization-centered versus society-centered), and the degree by which the…

  18. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  19. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  20. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  1. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  2. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  3. A Genetic Algorithms Based Approach for Identification of Escherichia coli Fed-batch Fermentation

    Directory of Open Access Journals (Sweden)

    Olympia Roeva

    2004-10-01

    Full Text Available This paper presents the use of genetic algorithms for identification of Escherichia coli fed-batch fermentation process. Genetic algorithms are a directed random search technique, based on the mechanics of natural selection and natural genetics, which can find the global optimal solution in complex multidimensional search space. The dynamic behavior of considered process has known nonlinear structure, described with a system of deterministic nonlinear differential equations according to the mass balance. The parameters of the model are estimated using genetic algorithms. Simulation examples for demonstration of the effectiveness and robustness of the proposed identification scheme are included. As a result, the model accurately predicts the process of cultivation of E. coli.

  4. System identification through nonstationary data using Time-Frequency Blind Source Separation

    Science.gov (United States)

    Guo, Yanlin; Kareem, Ahsan

    2016-06-01

    Classical output-only system identification (SI) methods are based on the assumption of stationarity of the system response. However, measured response of buildings and bridges is usually non-stationary due to strong winds (e.g. typhoon, and thunder storm etc.), earthquakes and time-varying vehicle motions. Accordingly, the response data may have time-varying frequency contents and/or overlapping of modal frequencies due to non-stationary colored excitation. This renders traditional methods problematic for modal separation and identification. To address these challenges, a new SI technique based on Time-Frequency Blind Source Separation (TFBSS) is proposed. By selectively utilizing "effective" information in local regions of the time-frequency plane, where only one mode contributes to energy, the proposed technique can successfully identify mode shapes and recover modal responses from the non-stationary response where the traditional SI methods often encounter difficulties. This technique can also handle response with closely spaced modes which is a well-known challenge for the identification of large-scale structures. Based on the separated modal responses, frequency and damping can be easily identified using SI methods based on a single degree of freedom (SDOF) system. In addition to the exclusive advantage of handling non-stationary data and closely spaced modes, the proposed technique also benefits from the absence of the end effects and low sensitivity to noise in modal separation. The efficacy of the proposed technique is demonstrated using several simulation based studies, and compared to the popular Second-Order Blind Identification (SOBI) scheme. It is also noted that even some non-stationary response data can be analyzed by the stationary method SOBI. This paper also delineates non-stationary cases where SOBI and the proposed scheme perform comparably and highlights cases where the proposed approach is more advantageous. Finally, the performance of the

  5. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  6. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  7. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  10. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  11. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1998-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed

  12. A unified framework for evaluating the risk of re-identification of text de-identification tools.

    Science.gov (United States)

    Scaiano, Martin; Middleton, Grant; Arbuckle, Luk; Kolhatkar, Varada; Peyton, Liam; Dowling, Moira; Gipson, Debbie S; El Emam, Khaled

    2016-10-01

    It has become regular practice to de-identify unstructured medical text for use in research using automatic methods, the goal of which is to remove patient identifying information to minimize re-identification risk. The metrics commonly used to determine if these systems are performing well do not accurately reflect the risk of a patient being re-identified. We therefore developed a framework for measuring the risk of re-identification associated with textual data releases. We apply the proposed evaluation framework to a data set from the University of Michigan Medical School. Our risk assessment results are then compared with those that would be obtained using a typical contemporary micro-average evaluation of recall in order to illustrate the difference between the proposed evaluation framework and the current baseline method. We demonstrate how this framework compares against common measures of the re-identification risk associated with an automated text de-identification process. For the probability of re-identification using our evaluation framework we obtained a mean value for direct identifiers of 0.0074 and a mean value for quasi-identifiers of 0.0022. The 95% confidence interval for these estimates were below the relevant thresholds. The threshold for direct identifier risk was based on previously used approaches in the literature. The threshold for quasi-identifiers was determined based on the context of the data release following commonly used de-identification criteria for structured data. Our framework attempts to correct for poorly distributed evaluation corpora, accounts for the data release context, and avoids the often optimistic assumptions that are made using the more traditional evaluation approach. It therefore provides a more realistic estimate of the true probability of re-identification. This framework should be used as a basis for computing re-identification risk in order to more realistically evaluate future text de-identification tools

  13. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  14. A PSO Driven Intelligent Model Updating and Parameter Identification Scheme for Cable-Damper System

    Directory of Open Access Journals (Sweden)

    Danhui Dan

    2015-01-01

    Full Text Available The precise measurement of the cable force is very important for monitoring and evaluating the operation status of cable structures such as cable-stayed bridges. The cable system should be installed with lateral dampers to reduce the vibration, which affects the precise measurement of the cable force and other cable parameters. This paper suggests a cable model updating calculation scheme driven by the particle swarm optimization (PSO algorithm. By establishing a finite element model considering the static geometric nonlinearity and stress-stiffening effect firstly, an automatically finite element method model updating powered by PSO algorithm is proposed, with the aims to identify the cable force and relevant parameters of cable-damper system precisely. Both numerical case studies and full-scale cable tests indicated that, after two rounds of updating process, the algorithm can accurately identify the cable force, moment of inertia, and damping coefficient of the cable-damper system.

  15. Identification of IncA/C Plasmid Replication and Maintenance Genes and Development of a Plasmid Multilocus Sequence Typing Scheme.

    Science.gov (United States)

    Hancock, Steven J; Phan, Minh-Duy; Peters, Kate M; Forde, Brian M; Chong, Teik Min; Yin, Wai-Fong; Chan, Kok-Gan; Paterson, David L; Walsh, Timothy R; Beatson, Scott A; Schembri, Mark A

    2017-02-01

    Plasmids of incompatibility group A/C (IncA/C) are becoming increasingly prevalent within pathogenic Enterobacteriaceae They are associated with the dissemination of multiple clinically relevant resistance genes, including bla CMY and bla NDM Current typing methods for IncA/C plasmids offer limited resolution. In this study, we present the complete sequence of a bla NDM-1 -positive IncA/C plasmid, pMS6198A, isolated from a multidrug-resistant uropathogenic Escherichia coli strain. Hypersaturated transposon mutagenesis, coupled with transposon-directed insertion site sequencing (TraDIS), was employed to identify conserved genetic elements required for replication and maintenance of pMS6198A. Our analysis of TraDIS data identified roles for the replicon, including repA, a toxin-antitoxin system; two putative partitioning genes, parAB; and a putative gene, 053 Construction of mini-IncA/C plasmids and examination of their stability within E. coli confirmed that the region encompassing 053 contributes to the stable maintenance of IncA/C plasmids. Subsequently, the four major maintenance genes (repA, parAB, and 053) were used to construct a new plasmid multilocus sequence typing (PMLST) scheme for IncA/C plasmids. Application of this scheme to a database of 82 IncA/C plasmids identified 11 unique sequence types (STs), with two dominant STs. The majority of bla NDM -positive plasmids examined (15/17; 88%) fall into ST1, suggesting acquisition and subsequent expansion of this bla NDM -containing plasmid lineage. The IncA/C PMLST scheme represents a standardized tool to identify, track, and analyze the dissemination of important IncA/C plasmid lineages, particularly in the context of epidemiological studies. Copyright © 2017 American Society for Microbiology.

  16. Target identification using Zernike moments and neural networks

    Science.gov (United States)

    Azimi-Sadjadi, Mahmood R.; Jamshidi, Arta A.; Nevis, Andrew J.

    2001-10-01

    The development of an underwater target identification algorithm capable of identifying various types of underwater targets, such as mines, under different environmental conditions pose many technical problems. Some of the contributing factors are: targets have diverse sizes, shapes and reflectivity properties. Target emplacement environment is variable; targets may be proud or partially buried. Environmental properties vary significantly from one location to another. Bottom features such as sand, rocks, corals, and vegetation can conceal a target whether it is partially buried or proud. Competing clutter with responses that closely resemble those of the targets may lead to false positives. All the problems mentioned above contribute to overly difficult and challenging conditions that could lead to unreliable algorithm performance with existing methods. In this paper, we developed and tested a shape-dependent feature extraction scheme that provides features invariant to rotation, size scaling and translation; properties that are extremely useful for any target classification problem. The developed schemes were tested on an electro-optical imagery data set collected under different environmental conditions with variable background, range and target types. The electro-optic data set was collected using a Laser Line Scan (LLS) sensor by the Coastal Systems Station (CSS), located in Panama City, Florida. The performance of the developed scheme and its robustness to distortion, rotation, scaling and translation was also studied.

  17. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  18. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  19. A Semi-Analytical Methodology for Multiwell Productivity Index of Well-Industry-Production-Scheme in Tight Oil Reservoirs

    Directory of Open Access Journals (Sweden)

    Guangfeng Liu

    2018-04-01

    Full Text Available Recently, the well-industry-production-scheme (WIPS has attracted more and more attention to improve tight oil recovery. However, multi-well pressure interference (MWPI induced by well-industry-production-scheme (WIPS strongly challenges the traditional transient pressure analysis methods, which focus on single multi-fractured horizontal wells (SMFHWs without MWPI. Therefore, a semi-analytical methodology for multiwell productivity index (MPI was proposed to study well performance of WIPS scheme in tight reservoir. To facilitate methodology development, the conceptual models of tight formation and WIPS scheme were firstly described. Secondly, seepage models of tight reservoir and hydraulic fractures (HFs were sequentially established and then dynamically coupled. Numerical simulation was utilized to validate our model. Finally, identification of flow regimes and sensitivity analysis were conducted. Our results showed that there was good agreement between our proposed model and numerical simulation; moreover, our approach also gave promising calculation speed over numerical simulation. Some expected flow regimes were significantly distorted due to WIPS. The slope of type curves which characterize the linear or bi-linear flow regime is bigger than 0.5 or 0.25. The horizontal line which characterize radial flow regime is also bigger 0.5. The smaller the oil rate, the more severely flow regimes were distorted. Well rate mainly determines the distortion of MPI curves, while fracture length, well spacing, fracture spacing mainly determine when the distortion of the MPI curves occurs. The bigger the well rate, the more severely the MPI curves are distorted. While as the well spacing decreases, fracture length increases, fracture spacing increases, occurrence of MWPI become earlier. Stress sensitivity coefficient mainly affects the MPI at the formation pseudo-radial flow stage, almost has no influence on the occurrence of MWPI. This work gains some

  20. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  1. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  2. Consumer-company Identification: Development and Validation of a Scale

    Directory of Open Access Journals (Sweden)

    Diogo Fajardo Nunes Hildebrand

    2010-07-01

    Full Text Available Consumer-Company Identification is a relatively new issue in the marketing academia. Bhattacharya and Sen(2003 explored the Social Identity theory and established Consumer-Company Identification as the primary psychological substrate for deep relationships between the organization and its customers. In the present study a new instrument was constructed and validated that permits the empirical verification of the phenomenon described by Bhattacharya and Sen (2003. The scale validated in the present study is the first to embrace the idiosyncrasies of the identification between consumers and organizations. The process was conducted through 3 independent data collections. The first one was collected using literature search and in-depth interviews with 12 undergraduate students and bachelors from different professional fields. The second data base was obtained from a survey of 226 undergraduate students from 3 universities in 2 big Brazilian cities. This data base was used for purification purposes using Explanatory Factorial Analysis. Finally, the Structural Equation Modeling technique was applied to analyze a third data base composed of 387 observations collected from the same 3 universities of the second study. The results confirm the content, convergent and discriminant validity of the new scale proposed.

  3. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  4. Experimental Damage Identification of a Model Reticulated Shell

    Directory of Open Access Journals (Sweden)

    Jing Xu

    2017-04-01

    Full Text Available The damage identification of a reticulated shell is a challenging task, facing various difficulties, such as the large number of degrees of freedom (DOFs, the phenomenon of modal localization and transition, and low modeling accuracy. Based on structural vibration responses, the damage identification of a reticulated shell was studied. At first, the auto-regressive (AR time series model was established based on the acceleration responses of the reticulated shell. According to the changes in the coefficients of the AR model between the damaged conditions and the undamaged condition, the damage of the reticulated shell can be detected. In addition, the damage sensitive factors were determined based on the coefficients of the AR model. With the damage sensitive factors as the inputs and the damage positions as the outputs, back-propagation neural networks (BPNNs were then established and were trained using the Levenberg–Marquardt algorithm (L–M algorithm. The locations of the damages can be predicted by the back-propagation neural networks. At last, according to the experimental scheme of single-point excitation and multi-point responses, the impact experiments on a K6 shell model with a scale of 1/10 were conducted. The experimental results verified the efficiency of the proposed damage identification method based on the AR time series model and back-propagation neural networks. The proposed damage identification method can ensure the safety of the practical engineering to some extent.

  5. Identification during imposed change: the roles of personal values, type of change, and anxiety.

    Science.gov (United States)

    Sverdlik, Noga; Oreg, Shaul

    2015-06-01

    Using a person-situation perspective, we explain what happens to individuals' identification with a collective in the context of a change. We propose that given the anxiety that often emerges during change, individuals' personal values (conservation and openness to change) interact with type of change (imposed vs. voluntary) in predicting identification following change. In a pilot, longitudinal field study (N = 61, 67% female) of an imposed university campus relocation, we measured employees' values and identification with the university before and several months after the relocation. In two lab experiments (Study 1: N = 104, 91.3% female; Study 2: N = 113, 75.2% female), we manipulated a change to be either imposed or voluntary and compared the relationships between values and identification across types of change. In Study 2, we also measured anxiety from the change. When change was imposed (all three studies), but not when voluntary (Studies 1 and 2), individuals' conservation was positively, and openness negatively, related to individuals' post-change identification. The effects emerged only for individuals who experienced change-related anxiety (Study 2). Our findings demonstrate that individuals' identification with a changing collective depends on the amount of anxiety change elicits and on the particular combination of their values and type of change. © 2014 Wiley Periodicals, Inc.

  6. Review of the Umthombo Youth Development Foundation scholarship scheme, 1999–2013

    Directory of Open Access Journals (Sweden)

    Andrew Ross

    2015-03-01

    Full Text Available Introduction: Staffing of rural and remote facilities is a challenge throughout the world. Umthombo Youth Development Foundation (UYDF has been running a rurally based scholarship scheme since 1999.The aim of this review is to present data on the number of students selected, their progress, graduation and work placement from inception of the scheme until 2013. Methods: Data were extracted from the UYDF data base using a data collection template to ensure all important information was captured. Results: Since 1999, 430 rural students across 15 health disciplines have been supported by UYDF. The annual pass rate has been greater than 89%, and less than 10% of students have been excluded from university. All graduates have spent time working in rural areas (excluding the 32 currently doing internships and 72% (52/73 of those with no work-back obligation continue to work in rural areas. Discussion and conclusion: The UYDF model is built around local selection, compulsory academic and peer mentoring and social support, comprehensive financial support and experiential holiday work. The results are encouraging and highlight the fact that rural students can succeed at university and will come back and work in rural areas. With 46% of the South African population situated rurally, greater thought and effort must be put into the recruitment and training of rural scholars as a possible solution to the staffing of rural healthcare facilities. The UYDF provides a model which could be replicated in other parts of South Africa.

  7. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  8. Improving the performance of minimizers and winnowing schemes.

    Science.gov (United States)

    Marçais, Guillaume; Pellow, David; Bork, Daniel; Orenstein, Yaron; Shamir, Ron; Kingsford, Carl

    2017-07-15

    The minimizers scheme is a method for selecting k -mers from sequences. It is used in many bioinformatics software tools to bin comparable sequences or to sample a sequence in a deterministic fashion at approximately regular intervals, in order to reduce memory consumption and processing time. Although very useful, the minimizers selection procedure has undesirable behaviors (e.g. too many k -mers are selected when processing certain sequences). Some of these problems were already known to the authors of the minimizers technique, and the natural lexicographic ordering of k -mers used by minimizers was recognized as their origin. Many software tools using minimizers employ ad hoc variations of the lexicographic order to alleviate those issues. We provide an in-depth analysis of the effect of k -mer ordering on the performance of the minimizers technique. By using small universal hitting sets (a recently defined concept), we show how to significantly improve the performance of minimizers and avoid some of its worse behaviors. Based on these results, we encourage bioinformatics software developers to use an ordering based on a universal hitting set or, if not possible, a randomized ordering, rather than the lexicographic order. This analysis also settles negatively a conjecture (by Schleimer et al. ) on the expected density of minimizers in a random sequence. The software used for this analysis is available on GitHub: https://github.com/gmarcais/minimizers.git . gmarcais@cs.cmu.edu or carlk@cs.cmu.edu. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  9. A combinatorial characterization scheme for high-throughput investigations of hydrogen storage materials

    International Nuclear Information System (INIS)

    Hattrick-Simpers, Jason R; Chiu, Chun; Bendersky, Leonid A; Tan Zhuopeng; Oguchi, Hiroyuki; Heilweil, Edwin J; Maslar, James E

    2011-01-01

    In order to increase measurement throughput, a characterization scheme has been developed that accurately measures the hydrogen storage properties of materials in quantities ranging from 10 ng to 1 g. Initial identification of promising materials is realized by rapidly screening thin-film composition spread and thickness wedge samples using normalized IR emissivity imaging. The hydrogen storage properties of promising samples are confirmed through measurements on single-composition films with high-sensitivity (resolution <0.3 μg) Sievert's-type apparatus. For selected samples, larger quantities of up to ∼100 mg may be prepared and their (de)hydrogenation and micro-structural properties probed via parallel in situ Raman spectroscopy. Final confirmation of the hydrogen storage properties is obtained on ∼1 g powder samples using a combined Raman spectroscopy/Sievert's apparatus.

  10. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  11. Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition

    Directory of Open Access Journals (Sweden)

    Khaled Loukhaoukha

    2017-12-01

    Full Text Available Among emergent applications of digital watermarking are copyright protection and proof of ownership. Recently, Makbol and Khoo (2013 have proposed for these applications a new robust blind image watermarking scheme based on the redundant discrete wavelet transform (RDWT and the singular value decomposition (SVD. In this paper, we present two ambiguity attacks on this algorithm that have shown that this algorithm fails when used to provide robustness applications like owner identification, proof of ownership, and transaction tracking. Keywords: Ambiguity attack, Image watermarking, Singular value decomposition, Redundant discrete wavelet transform

  12. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  13. Schemes for fibre-based entanglement generation in the telecom band

    International Nuclear Information System (INIS)

    Chen, Jun; Lee, Kim Fook; Li Xiaoying; Voss, Paul L; Kumar, Prem

    2007-01-01

    We investigate schemes for generating polarization-entangled photon pairs in standard optical fibres. The advantages of a double-loop scheme are explored through comparison with two other schemes, namely, the Sagnac-loop scheme and the counter-propagating scheme. Experimental measurements with the double-loop scheme verify the predicted advantages

  14. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  15. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  16. A surface evolution scheme to identify nanoscale intrinsic geometry from AFM experimental data

    International Nuclear Information System (INIS)

    Jang, Hong-Lae; Kim, Hyun-Seok; Park, Youmie; Cho, Seonho

    2013-01-01

    The geometrical properties of metallic nanoparticles such as the size and morphology have significant impacts on the structure and stability of the adsorbed biological entities as well as the nanoscale structural performances. To identify the nanoscale intrinsic geometry from the height images by atomic force microscopy (AFM), we developed a curvature-dependent evolution scheme that can eliminate the noise and smoothen the surfaces. The principal curvatures are computed directly from the first and second derivatives of the discrete AFM height data. The principal curvatures and directions correspond to the eigenvalues and eigenvectors of shape operator matrix, respectively. The evolution equation using the principal curvature flows smoothens the images in the corresponding principal directions. For an idealized model, κ 2 flow successfully identifies the major valley lines to represent the boundary of nanoparticles without referring to the phase information, whereas the mean curvature flow eliminates all the minor ones leaving only the major feature of the boundary. To demonstrate the capability of noise removal, smoothing surfaces, the identification of ridge and valley lines, and the extraction of intrinsic geometry, the developed numerical scheme is applied to real AFM data that include the silver nanoparticles of 24 nm diameter and the gold nanoparticles of 33–56 nm diameters

  17. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  18. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  19. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  20. Addressing healthcare needs of people living below the poverty line: a rapid assessment of the Andhra Pradesh Health Insurance Scheme.

    Science.gov (United States)

    Rao, M; Ramachandra, S S; Bandyopadhyay, S; Chandran, A; Shidhaye, R; Tamisettynarayana, S; Thippaiah, A; Sitamma, M; Sunil George, M; Singh, V; Sivasankaran, S; Bangdiwala, S I

    2011-01-01

    Families living below the poverty line in countries which do not have universal healthcare coverage are drawn into indebtedness and bankruptcy. The state of Andhra Pradesh in India established the Rajiv Aarogyasri Community Health Insurance Scheme (RACHIS) in 2007 with the aim of breaking this cycle by improving the access of below the poverty line (BPL) families to secondary and tertiary healthcare. It covered a wide range of surgical and medical treatments for serious illnesses requiring specialist healthcare resources not always available at district-level government hospitals. The impact of this scheme was evaluated by a rapid assessment, commissioned by the government of Andhra Pradesh. The aim of the assessment was to explore the contribution of the scheme to the reduction of catastrophic health expenditure among the poor and to recommend ways by which delivery of the scheme could be improved. We report the findings of this assessment. Two types of data were used for the assessment. Patient data pertaining to 89 699 treatment requests approved by the scheme during its first 18 months were examined. Second, surveys of scheme beneficiaries and providers were undertaken in 6 randomly selected districts of Andhra Pradesh. This novel scheme was beginning to reach the BPL households in the state and providing access to free secondary and tertiary healthcare to seriously ill poor people. An integrated model encompassing primary, secondary and tertiary care would be of greater benefit to families below the poverty line and more cost-effective for the government. There is considerable potential for the government to build on this successful start and to strengthen equity of access and the quality of care provided by the scheme. Copyright 2011, NMJI.

  1. Future perspectives toward the early definition of a multivariate decision-support scheme employed in clinical decision making for senior citizens.

    Science.gov (United States)

    Frantzidis, Christos A; Gilou, Sotiria; Billis, Antonis; Karagianni, Maria; Bratsas, Charalampos D; Bamidis, Panagiotis

    2016-03-01

    Recent neuroscientific studies focused on the identification of pathological neurophysiological patterns (emotions, geriatric depression, memory impairment and sleep disturbances) through computerised clinical decision-support systems. Almost all these research attempts employed either resting-state condition (e.g. eyes-closed) or event-related potentials extracted during a cognitive task known to be affected by the disease under consideration. This Letter reviews existing data mining techniques and aims to enhance their robustness by proposing a holistic decision framework dealing with comorbidities and early symptoms' identification, while it could be applied in realistic occasions. Multivariate features are elicited and fused in order to be compared with average activities characteristic of each neuropathology group. A proposed model of the specific cognitive function which may be based on previous findings (a priori information) and/or validated by current experimental data should be then formed. So, the proposed scheme facilitates the early identification and prevention of neurodegenerative phenomena. Neurophysiological semantic annotation is hypothesised to enhance the importance of the proposed framework in facilitating the personalised healthcare of the information society and medical informatics research community.

  2. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  3. Differential identification of Candida species and other yeasts by analysis of [35S]methionine-labeled polypeptide profiles

    International Nuclear Information System (INIS)

    Shen, H.D.; Choo, K.B.; Tsai, W.C.; Jen, T.M.; Yeh, J.Y.; Han, S.H.

    1988-01-01

    This paper describes a scheme for differential identification of Candida species and other yeasts based on autoradiographic analysis of protein profiles of [ 35 S]methionine-labeled cellular proteins separated by sodium dodecyl sulfate-polyacrylamide gel electrophoresis. Using ATCC strains as references, protein profile analysis showed that different Candida and other yeast species produced distinctively different patterns. Good agreement in results obtained with this approach and with other conventional systems was observed. Being accurate and reproducible, this approach provides a basis for the development of an alternative method for the identification of yeasts isolated from clinical specimens

  4. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  5. Advanced driver assistance system: Road sign identification using VIAPIX system and a correlation technique

    Science.gov (United States)

    Ouerhani, Y.; Alfalou, A.; Desthieux, M.; Brosseau, C.

    2017-02-01

    We present a three-step approach based on the commercial VIAPIX® module for road traffic sign recognition and identification. Firstly, detection in a scene of all objects having characteristics of traffic signs is performed. This is followed by a first-level recognition based on correlation which consists in making a comparison between each detected object with a set of reference images of a database. Finally, a second level of identification allows us to confirm or correct the previous identification. In this study, we perform a correlation-based analysis by combining and adapting the Vander Lugt correlator with the nonlinear joint transformation correlator (JTC). Of particular significance, this approach permits to make a reliable decision on road traffic sign identification. We further discuss a robust scheme allowing us to track a detected road traffic sign in a video sequence for the purpose of increasing the decision performance of our system. This approach can have broad practical applications in the maintenance and rehabilitation of transportation infrastructure, or for drive assistance.

  6. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  7. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  8. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  9. Identification and analysis of labor productivity components based on ACHIEVE model (case study: staff of Kermanshah University of Medical Sciences).

    Science.gov (United States)

    Ziapour, Arash; Khatony, Alireza; Kianipour, Neda; Jafary, Faranak

    2014-12-15

    Identification and analysis of the components of labor productivity based on ACHIEVE model was performed among employees in different parts of Kermanshah University of Medical Sciences in 2014. This was a descriptive correlational study in which the population consisted of 270 working personnel in different administrative groups (contractual, fixed- term and regular) at Kermanshah University of Medical Sciences (872 people) that were selected among 872 people through stratified random sampling method based on Krejcie and Morgan sampling table. The survey tool included labor productivity questionnaire of ACHIEVE. Questionnaires were confirmed in terms of content and face validity, and their reliability was calculated using Cronbach's alpha coefficient. The data were analyzed by SPSS-18 software using descriptive and inferential statistics. The mean scores for labor productivity dimensions of the employees, including environment (environmental fit), evaluation (training and performance feedback), validity (valid and legal exercise of personnel), incentive (motivation or desire), help (organizational support), clarity (role perception or understanding), ability (knowledge and skills) variables and total labor productivity were 4.10±0.630, 3.99±0.568, 3.97±0.607, 3.76±0.701, 3.63±0.746, 3.59±0.777, 3.49±0.882 and 26.54±4.347, respectively. Also, the results indicated that the seven factors of environment, performance assessment, validity, motivation, organizational support, clarity, and ability were effective in increasing labor productivity. The analysis of the current status of university staff in the employees' viewpoint suggested that the two factors of environment and evaluation, which had the greatest impact on labor productivity in the viewpoint of the staff, were in a favorable condition and needed to be further taken into consideration by authorities.

  10. Identification and Analysis of Labor Productivity Components Based on ACHIEVE Model (Case Study: Staff of Kermanshah University of Medical Sciences)

    Science.gov (United States)

    Ziapour, Arash; Khatony, Alireza; Kianipour, Neda; Jafary, Faranak

    2015-01-01

    Identification and analysis of the components of labor productivity based on ACHIEVE model was performed among employees in different parts of Kermanshah University of Medical Sciences in 2014. This was a descriptive correlational study in which the population consisted of 270 working personnel in different administrative groups (contractual, fixed- term and regular) at Kermanshah University of Medical Sciences (872 people) that were selected among 872 people through stratified random sampling method based on Krejcie and Morgan sampling table. The survey tool included labor productivity questionnaire of ACHIEVE. Questionnaires were confirmed in terms of content and face validity, and their reliability was calculated using Cronbach’s alpha coefficient. The data were analyzed by SPSS-18 software using descriptive and inferential statistics. The mean scores for labor productivity dimensions of the employees, including environment (environmental fit), evaluation (training and performance feedback), validity (valid and legal exercise of personnel), incentive (motivation or desire), help (organizational support), clarity (role perception or understanding), ability (knowledge and skills) variables and total labor productivity were 4.10±0.630, 3.99±0.568, 3.97±0.607, 3.76±0.701, 3.63±0.746, 3.59±0.777, 3.49±0.882 and 26.54±4.347, respectively. Also, the results indicated that the seven factors of environment, performance assessment, validity, motivation, organizational support, clarity, and ability were effective in increasing labor productivity. The analysis of the current status of university staff in the employees’ viewpoint suggested that the two factors of environment and evaluation, which had the greatest impact on labor productivity in the viewpoint of the staff, were in a favorable condition and needed to be further taken into consideration by authorities. PMID:25560364

  11. Performance comparison of renewable incentive schemes using optimal control

    International Nuclear Information System (INIS)

    Oak, Neeraj; Lawson, Daniel; Champneys, Alan

    2014-01-01

    Many governments worldwide have instituted incentive schemes for renewable electricity producers in order to meet carbon emissions targets. These schemes aim to boost investment and hence growth in renewable energy industries. This paper examines four such schemes: premium feed-in tariffs, fixed feed-in tariffs, feed-in tariffs with contract for difference and the renewable obligations scheme. A generalised mathematical model of industry growth is presented and fitted with data from the UK onshore wind industry. The model responds to subsidy from each of the four incentive schemes. A utility or ‘fitness’ function that maximises installed capacity at some fixed time in the future while minimising total cost of subsidy is postulated. Using this function, the optimal strategy for provision and timing of subsidy for each scheme is calculated. Finally, a comparison of the performance of each scheme, given that they use their optimal control strategy, is presented. This model indicates that the premium feed-in tariff and renewable obligation scheme produce the joint best results. - Highlights: • Stochastic differential equation model of renewable energy industry growth and prices, using UK onshore wind data 1992–2010. • Cost of production reduces as cumulative installed capacity of wind energy increases, consistent with the theory of learning. • Studies the effect of subsidy using feed-in tariff schemes, and the ‘renewable obligations’ scheme. • We determine the optimal timing and quantity of subsidy required to maximise industry growth and minimise costs. • The premium feed-in tariff scheme and the renewable obligations scheme produce the best results under optimal control

  12. News Competition: Physics Olympiad hits Thailand Report: Institute carries out survey into maths in physics at university Event: A day for everyone teaching physics Conference: Welsh conference celebrates birthday Schools: Researchers in Residence scheme set to close Teachers: A day for new physics teachers Social: Network combines fun and physics Forthcoming events

    Science.gov (United States)

    2011-09-01

    Competition: Physics Olympiad hits Thailand Report: Institute carries out survey into maths in physics at university Event: A day for everyone teaching physics Conference: Welsh conference celebrates birthday Schools: Researchers in Residence scheme set to close Teachers: A day for new physics teachers Social: Network combines fun and physics Forthcoming events

  13. Multilevel Bloom Filters for P2P Flows Identification Based on Cluster Analysis in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Xia-an Bi

    2015-01-01

    Full Text Available With the development of wireless mesh networks and distributed computing, lots of new P2P services have been deployed and enrich the Internet contents and applications. The rapid growth of P2P flows brings great pressure to the regular network operation. So the effective flow identification and management of P2P applications become increasingly urgent. In this paper, we build a multilevel bloom filters data structure to identify the P2P flows through researches on the locality characteristics of P2P flows. Different level structure stores different numbers of P2P flow rules. According to the characteristics values of the P2P flows, we adjust the parameters of the data structure of bloom filters. The searching steps of the scheme traverse from the first level to the last level. Compared with the traditional algorithms, our method solves the drawbacks of previous schemes. The simulation results demonstrate that our algorithm effectively enhances the performance of P2P flows identification. Then we deploy our flow identification algorithm in the traffic monitoring sensors which belong to the network traffic monitoring system at the export link in the campus network. In the real environment, the experiment results demonstrate that our algorithm has a fast speed and high accuracy to identify the P2P flows; therefore, it is suitable for actual deployment.

  14. Galaxy clusters in simulations of the local Universe: a matter of constraints

    Science.gov (United States)

    Sorce, Jenny G.; Tempel, Elmo

    2018-06-01

    To study the full formation and evolution history of galaxy clusters and their population, high-resolution simulations of the latter are flourishing. However, comparing observed clusters to the simulated ones on a one-to-one basis to refine the models and theories down to the details is non-trivial. The large variety of clusters limits the comparisons between observed and numerical clusters. Simulations resembling the local Universe down to the cluster scales permit pushing the limit. Simulated and observed clusters can be matched on a one-to-one basis for direct comparisons provided that clusters are well reproduced besides being in the proper large-scale environment. Comparing random and local Universe-like simulations obtained with differently grouped observational catalogues of peculiar velocities, this paper shows that the grouping scheme used to remove non-linear motions in the catalogues that constrain the simulations affects the quality of the numerical clusters. With a less aggressive grouping scheme - galaxies still falling on to clusters are preserved - combined with a bias minimization scheme, the mass of the dark matter haloes, simulacra for five local clusters - Virgo, Centaurus, Coma, Hydra, and Perseus - is increased by 39 per cent closing the gap with observational mass estimates. Simulacra are found on average in 89 per cent of the simulations, an increase of 5 per cent with respect to the previous grouping scheme. The only exception is Perseus. Since the Perseus-Pisces region is not well covered by the used peculiar velocity catalogue, the latest release lets us foresee a better simulacrum for Perseus in a near future.

  15. Full second order chromatographic/spectrometric data matrices for automated sample identification and component analysis by non-data-reducing image analysis

    DEFF Research Database (Denmark)

    Nielsen, Niles-Peter Vest; Smedsgaard, Jørn; Frisvad, Jens Christian

    1999-01-01

    A data analysis method is proposed for identification and for confirmation of classification schemes, based on single- or multiple-wavelength chromatographic profiles. The proposed method works directly on the chromatographic data without data reduction procedures such as peak area or retention...... classes from the reference chromatograms, This feature is a valuable aid in selecting components for further analysis, The identification method is demonstrated on two data sets: 212 isolates from 41 food-borne Penicillium species and 61 isolates from 6 soil-borne Penicillium species. Both data sets...

  16. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  17. Generation and discrimination of Greenberger-Horne-Zeilinger states using dipole-induced transparency in a cavity-waveguide system

    International Nuclear Information System (INIS)

    Qian, Jun; Qian, Yong; Yang, Tao; Feng, Xun-Li; Gong, Shang-Qing

    2007-01-01

    We propose an efficient scheme to build an arbitrary multipartite Greenberger-Horne-Zeilinger state and discriminate all the universal Greenberger-Horne-Zeilinger states using parity measurement based on dipole-induced transparency in a cavity-waveguide system. A prominent advantage is that initial entangled states remain after nondetective identification and they can be used for successive tasks. We analyze the performance and possible errors of the required single-qubit rotations and emphasize that the scheme is reliable and can satisfy the current experimental technology

  18. Understanding help-seeking amongst university students: the role of group identity, stigma, and exposure to suicide and help-seeking

    Science.gov (United States)

    Kearns, Michelle; Muldoon, Orla T.; Msetfi, Rachel M.; Surgenor, Paul W. G.

    2015-01-01

    Background: Despite a high prevalence of suicide ideation and mental health issues amongst university students, the stigma of help-seeking remains a barrier to those who are in real need of professional support. Social identity theory states that help received from an ingroup source is more welcome and less threatening to one's identity than that from a source perceived as outgroup. Therefore, we hypothesized that students' stigma toward seeking help from their university mental health service would differ based on the strength of their identification with the university. Method: An online survey including measures of stigma of suicide, group identification, experience with help-seeking and exposure to suicide was administered to Irish university students (N = 493). Results: Group identification was a significant predictor of help-seeking attitudes after controlling for already known predictors. Contrary to our expectations, those who identified more strongly with their university demonstrated a higher stigma of seeking help from their university mental health service. Conclusions: Results are discussed in relation to self-categorization theory and the concept of normative fit. Practical implications for mental health service provision in universities are also addressed, specifically the need for a range of different mental health services both on and off-campus. PMID:26483722

  19. Understanding help-seeking amongst university students: The role of group identity, stigma and exposure to suicide and help-seeking

    Directory of Open Access Journals (Sweden)

    Michelle eKearns

    2015-09-01

    Full Text Available Background: Despite a high prevalence of suicide ideation and mental health issues amongst university students, the stigma of help-seeking remains a barrier to those who are in real need of professional support. Social identity theory states that help received from an ingroup source is more welcome and less threatening to one’s identity than that from a source perceived as outgroup. Therefore, we hypothesized that students' stigma towards seeking help from their university mental health service would differ based on the strength of their identification with the university.Method: An online survey including measures of stigma of suicide, group identification, experience with help-seeking and exposure to suicide was administered to Irish university students (N = 493.Results: Group identification was a significant predictor of help-seeking attitudes after controlling for already known predictors. Contrary to our expectations, those who identified more strongly with their university demonstrated a higher stigma of seeking help from their university mental health service.Conclusions: Results are discussed in relation to self-categorization theory and the concept of normative fit. Practical implications for mental health service provision in universities are also addressed, specifically the need for a range of different mental health services both on and off-campus.

  20. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  1. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  2. Finite Difference Schemes as Algebraic Correspondences between Layers

    Science.gov (United States)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  3. Towards the ultimate variance-conserving convection scheme

    International Nuclear Information System (INIS)

    Os, J.J.A.M. van; Uittenbogaard, R.E.

    2004-01-01

    In the past various arguments have been used for applying kinetic energy-conserving advection schemes in numerical simulations of incompressible fluid flows. One argument is obeying the programmed dissipation by viscous stresses or by sub-grid stresses in Direct Numerical Simulation and Large Eddy Simulation, see e.g. [Phys. Fluids A 3 (7) (1991) 1766]. Another argument is that, according to e.g. [J. Comput. Phys. 6 (1970) 392; 1 (1966) 119], energy-conserving convection schemes are more stable i.e. by prohibiting a spurious blow-up of volume-integrated energy in a closed volume without external energy sources. In the above-mentioned references it is stated that nonlinear instability is due to spatial truncation rather than to time truncation and therefore these papers are mainly concerned with the spatial integration. In this paper we demonstrate that discretized temporal integration of a spatially variance-conserving convection scheme can induce non-energy conserving solutions. In this paper the conservation of the variance of a scalar property is taken as a simple model for the conservation of kinetic energy. In addition, the derivation and testing of a variance-conserving scheme allows for a clear definition of kinetic energy-conserving advection schemes for solving the Navier-Stokes equations. Consequently, we first derive and test a strictly variance-conserving space-time discretization for the convection term in the convection-diffusion equation. Our starting point is the variance-conserving spatial discretization of the convection operator presented by Piacsek and Williams [J. Comput. Phys. 6 (1970) 392]. In terms of its conservation properties, our variance-conserving scheme is compared to other spatially variance-conserving schemes as well as with the non-variance-conserving schemes applied in our shallow-water solver, see e.g. [Direct and Large-eddy Simulation Workshop IV, ERCOFTAC Series, Kluwer Academic Publishers, 2001, pp. 409-287

  4. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  5. A qualitative study on the motivation of Turkish EFL teachers working at state universities

    OpenAIRE

    Ölmezer Öztürk, Elçin

    2015-01-01

    Following a qualitative research design, this study examines the motivation of Turkish EFL teachers working at state universities in Turkey. Purposeful sampling was used in the selection of participants and 20 teachers working at different universities participated in the study. The data were collected through semi-structured interviews and daily reflection entries. In the analysis of data, qualitative content analysis scheme of Creswell (2011) was used. The results revealed that ...

  6. Risk management in a university environment.

    Science.gov (United States)

    Brewer, Ann; Walker, Ian

    2011-06-01

    Risk is an integral part of quality assurance in higher education in Australia. This paper describes a generic methodology for the identification and management of risk in a university or similar tertiary education environment and outlines a framework that enables the management of risk to be incorporated in the institution's governance cycle. The new approach here is that risk is embedded in the quality assurance framework and, in turn, in the strategic planning and budgeting processes. In many organisations, risk is implemented as a separate process and not considered in any meaningful way as integral to the strategic direction and performance of the university. The paper is based on work carried out by the authors and others between March 2008 and April 2009 to develop a comprehensive system for managing risk in a major Australian university, including processes whereby risk management could be integrated with, and add value to, the overall governance of the university. The case study is described in the appendix to this paper.

  7. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  8. Extensive Listening in a Colombian University: Process, Product, and Perceptions

    Directory of Open Access Journals (Sweden)

    Carlos A. Mayora

    2017-02-01

    Full Text Available The current paper reports an experience implementing a small-scale narrow listening scheme (one of the varieties of extensive listening with intermediate learners of English as a foreign language in a Colombian university. The paper presents (a how the scheme was designed and implemented, including materials and procedures (the process; (b how the students performed in the different activities with an emphasis on time spent watching/listening and their perceptions of video difficulty and self-rated comprehension (the product; and (c how the students felt and viewed the experience (perception. Product and perceptions showed that the pedagogical implementation was positive which leads to a discussion of a number of implications for this context and similar ones.

  9. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  10. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  11. Feasible Teleportation Schemes with Five-Atom Entangled State

    Institute of Scientific and Technical Information of China (English)

    XUE Zheng-Yuan; YI You-Min; CAO Zhuo-Liang

    2006-01-01

    Teleportation schemes with a five-atom entangled state are investigated. In the teleportation scheme Bell state measurements (BSMs) are difficult for physical realization, so we investigate another strategy using separate measurements instead of BSM based on cavity quantum electrodynamics techniques. The scheme of two-atom entangled state teleportation is a controlled and probabilistic one. For the teleportation of the three-atom entangled state, the scheme is a probabilistic one. The fidelity and the probability of the successful teleportation are also obtained.

  12. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  13. A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition

    Directory of Open Access Journals (Sweden)

    L. Laur

    2015-12-01

    Full Text Available Internet has affected our everyday life drastically. Expansive volumes of information are exchanged over the Internet consistently which causes numerous security concerns. Issues like content identification, document and image security, audience measurement, ownership, copyrights and others can be settled by using digital watermarking. In this work, robust and imperceptible non-blind color image watermarking algorithm is proposed, which benefit from the fact that watermark can be hidden in different color channel which results into further robustness of the proposed technique to attacks. Given method uses some algorithms such as entropy, discrete wavelet transform, Chirp z-transform, orthogonal-triangular decomposition and Singular value decomposition in order to embed the watermark in a color image. Many experiments are performed using well-known signal processing attacks such as histogram equalization, adding noise and compression. Experimental results show that proposed scheme is imperceptible and robust against common signal processing attacks.

  14. Outcome-based health equity across different social health insurance schemes for the elderly in China.

    Science.gov (United States)

    Liu, Xiaoting; Wong, Hung; Liu, Kai

    2016-01-14

    Against the achievement of nearly universal coverage for social health insurance for the elderly in China, a problem of inequity among different insurance schemes on health outcomes is still a big challenge for the health care system. Whether various health insurance schemes have divergent effects on health outcome is still a puzzle. Empirical evidence will be investigated in this study. This study employs a nationally representative survey database, the National Survey of the Aged Population in Urban/Rural China, to compare the changes of health outcomes among the elderly before and after the reform. A one-way ANOVA is utilized to detect disparities in health care expenditures and health status among different health insurance schemes. Multiple Linear Regression is applied later to examine the further effects of different insurance plans on health outcomes while controlling for other social determinants. The one-way ANOVA result illustrates that although the gaps in insurance reimbursements between the Urban Employee Basic Medical Insurance (UEBMI) and the other schemes, the New Rural Cooperative Medical Scheme (NCMS) and Urban Residents Basic Medical Insurance (URBMI) decreased, out-of-pocket spending accounts for a larger proportion of total health care expenditures, and the disparities among different insurances enlarged. Results of the Multiple Linear Regression suggest that UEBMI participants have better self-reported health status, physical functions and psychological wellbeing than URBMI and NCMS participants, and those uninsured. URBMI participants report better self-reported health than NCMS ones and uninsured people, while having worse psychological wellbeing compared with their NCMS counterparts. This research contributes to a transformation in health insurance studies from an emphasis on the opportunity-oriented health equity measured by coverage and healthcare accessibility to concern with outcome-based equity composed of health expenditure and health

  15. Roles of University Support for International Students in the United States: Analysis of a Systematic Model of University Identification, University Support, and Psychological Well-Being

    Science.gov (United States)

    Cho, Jaehee; Yu, Hongsik

    2015-01-01

    Unlike previous research on international students' social support, this current study applied the concept of organizational support to university contexts, examining the effects of university support. Mainly based on the social identity/self-categorization stress model, this study developed and tested a path model composed of four key…

  16. Turbulence mitigation scheme based on multiple-user detection in an orbital-angular-momentum multiplexed system

    Science.gov (United States)

    Zou, Li; Wang, Le; Zhao, Sheng-Mei; Chen, Han-Wu

    2016-11-01

    Atmospheric turbulence (AT) induced crosstalk can significantly impair the performance of a free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. In this paper, we propose a multiple-user detection (MUD) turbulence mitigation scheme in an OAM-multiplexed FSO communication link. First, we present a MUD equivalent communication model for an OAM-multiplexed FSO communication link under AT. In the equivalent model, each input bit stream represents one user’s information. The deformed OAM spatial modes caused by AT, instead of the pure OAM spatial modes, are used as information carriers, and the overlapping between the deformed OAM spatial modes are computed as the correlation coefficients between the users. Then, we present a turbulence mitigation scheme based on MUD idea to enhance AT tolerance of the OAM-multiplexed FSO communication link. In the proposed scheme, the crosstalk caused by AT is used as a useful component to deduce users’ information. The numerical results show that the performance of the OAM-multiplexed communication link has greatly improved by the proposed scheme. When the turbulence strength is 1 × 10-15 m-2/3, the transmission distance is 1000 m and the channel signal-to-noise ratio (SNR) is 26 dB, the bit-error-rate (BER) performance of four spatial multiplexed OAM modes lm = +1,+2,+3,+4 are all close to 10-5, and there is a 2-3 fold increase in the BER performance in comparison with those results without the proposed scheme. In addition, the proposed scheme is more effective for an OAM-multiplexed FSO communication link with a larger OAM mode topological charge interval. The proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network

  17. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  18. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  19. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  20. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  1. A Universal Ts-VI Triangle Method for the Continuous Retrieval of Evaporative Fraction From MODIS Products

    Science.gov (United States)

    Zhu, Wenbin; Jia, Shaofeng; Lv, Aifeng

    2017-10-01

    The triangle method based on the spatial relationship between remotely sensed land surface temperature (Ts) and vegetation index (VI) has been widely used for the estimates of evaporative fraction (EF). In the present study, a universal triangle method was proposed by transforming the Ts-VI feature space from a regional scale to a pixel scale. The retrieval of EF is only related to the boundary conditions at pixel scale, regardless of the Ts-VI configuration over the spatial domain. The boundary conditions of each pixel are composed of the theoretical dry edge determined by the surface energy balance principle and the wet edge determined by the average air temperature of open water. The universal triangle method was validated using the EF observations collected by the Energy Balance Bowen Ratio systems in the Southern Great Plains of the United States of America (USA). Two parameterization schemes of EF were used to demonstrate their applicability with Terra Moderate Resolution Imaging Spectroradiometer (MODIS) products over the whole year 2004. The results of this study show that the accuracy produced by both of these two parameterization schemes is comparable to that produced by the traditional triangle method, although the universal triangle method seems specifically suited to the parameterization scheme proposed in our previous research. The independence of the universal triangle method from the Ts-VI feature space makes it possible to conduct a continuous monitoring of evapotranspiration and soil moisture. That is just the ability the traditional triangle method does not possess.

  2. Stakeholders Perspectives on the Success Drivers in Ghana's National Health Insurance Scheme - Identifying Policy Translation Issues.

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2016-10-01

    Ghana's National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Based on an empirical qualitative case study of stakeholders' views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. In the study, interviewees referred to both 'hard and soft' elements as driving the "success" of the Ghana scheme. The main 'hard elements' include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The 'soft' elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years, amounting to a process best conceived as germination as opposed

  3. Heeding the Rebel Yell: Identification and Communication in Managing Organizational Issues

    Science.gov (United States)

    Collins, McLean

    2005-01-01

    In applying an issue development model, it is suggested that strategic identification and communication of the Colonel Reb issue would have helped the University of Mississippi to smoother transition to a new athletic mascot.

  4. Management of Universal Basic Education Scheme (U.B.E.) for Qualitative Education in Nigeria

    Science.gov (United States)

    Omotayo, Dare Michael; Ihebereme, Chioma; Maduewesi, Sir B. U.

    2008-01-01

    Since independence, Nigeria has been searching diligently for a viable educational system capable of enhancing the socio-economic and political values inherent in the country. This paper discusses concepts such as management, qualitative education and Universal Basic Education. In addition to the above, the paper also examines the National…

  5. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  6. Analysis of multi drug resistant tuberculosis (MDR-TB) financial protection policy: MDR-TB health insurance schemes, in Chhattisgarh state, India.

    Science.gov (United States)

    Kundu, Debashish; Sharma, Nandini; Chadha, Sarabjit; Laokri, Samia; Awungafac, George; Jiang, Lai; Asaria, Miqdad

    2018-01-27

    There are significant financial barriers to access treatment for multi drug resistant tuberculosis (MDR-TB) in India. To address these challenges, Chhattisgarh state in India has established a MDR-TB financial protection policy by creating MDR-TB benefit packages as part of the universal health insurance scheme that the state has rolled out in their effort towards attaining Universal Health Coverage for all its residents. In these schemes the state purchases health insurance against set packages of services from third party health insurance agencies on behalf of all its residents. Provider payment reform by strategic purchasing through output based payments (lump sum fee is reimbursed as per the MDR-TB benefit package rates) to the providers - both public and private health facilities empanelled under the insurance scheme was the key intervention. To understand the implementation gap between policy and practice of the benefit packages with respect to equity in utilization of package claims by the poor patients in public and private sector. Data from primary health insurance claims from January 2013 to December 2015, were analysed using an extension of 'Kingdon's multiple streams for policy implementation framework' to explain the implementation gap between policy and practice of the MDR-TB benefit packages. The total number of claims for MDR-TB benefit packages increased over the study period mainly from poor patients treated in public facilities, particularly for the pre-treatment evaluation and hospital stay packages. Variations and inequities in utilizing the packages were observed between poor and non-poor beneficiaries in public and private sector. Private providers participation in the new MDR-TB financial protection mechanism through the universal health insurance scheme was observed to be much lower than might be expected given their share of healthcare provision overall in India. Our findings suggest that there may be an implementation gap due to weak

  7. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  8. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  9. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  10. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  11. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  12. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  13. Characteristics of different convective parameterization schemes on the simulation of intensity and track of severe extratropical cyclones over North Atlantic

    Science.gov (United States)

    Pradhan, P. K.; Liberato, Margarida L. R.; Ferreira, Juan A.; Dasamsetti, S.; Vijaya Bhaskara Rao, S.

    2018-01-01

    The role of the convective parameterization schemes (CPSs) in the ARW-WRF (WRF) mesoscale model is examined for extratropical cyclones (ETCs) over the North Atlantic Ocean. The simulation of very severe winter storms such as Xynthia (2010) and Gong (2013) are considered in this study. Most popular CPSs within WRF model, along with Yonsei University (YSU) planetary boundary layer (PBL) and WSM6 microphysical parameterization schemes are incorporated for the model experiments. For each storm, four numerical experiments were carried out using New Kain Fritsch (NKF), Betts-Miller-Janjic (BMJ), Grell 3D Ensemble (Gr3D) and no convection scheme (NCS) respectively. The prime objectives of these experiments were to recognize the best CPS that can forecast the intensity, track, and landfall over the Iberian Peninsula in advance of two days. The WRF model results such as central sea level pressure (CSLP), wind field, moisture flux convergence, geopotential height, jet stream, track and precipitation have shown sensitivity CPSs. The 48-hour lead simulations with BMJ schemes produce the best simulations both regarding ETCs intensity and track than Gr3D and NKF schemes. The average MAE and RMSE of intensities are least that (6.5 hPa in CSLP and 3.4 ms- 1 in the 10-m wind) found in BMJ scheme. The MAE and RMSE for and intensity and track error have revealed that NCS produces large errors than other CPSs experiments. However, for track simulation of these ETCs, at 72-, 48- and 24-hour means track errors were 440, 390 and 158 km respectively. In brevity, BMJ and Gr3D schemes can be used for short and medium range predictions of the ETCs over North Atlantic. For the evaluation of precipitation distributions using Gr3D scheme are good agreement with TRMM satellite than other CPSs.

  14. Speaker gender identification based on majority vote classifiers

    Science.gov (United States)

    Mezghani, Eya; Charfeddine, Maha; Nicolas, Henri; Ben Amar, Chokri

    2017-03-01

    Speaker gender identification is considered among the most important tools in several multimedia applications namely in automatic speech recognition, interactive voice response systems and audio browsing systems. Gender identification systems performance is closely linked to the selected feature set and the employed classification model. Typical techniques are based on selecting the best performing classification method or searching optimum tuning of one classifier parameters through experimentation. In this paper, we consider a relevant and rich set of features involving pitch, MFCCs as well as other temporal and frequency-domain descriptors. Five classification models including decision tree, discriminant analysis, nave Bayes, support vector machine and k-nearest neighbor was experimented. The three best perming classifiers among the five ones will contribute by majority voting between their scores. Experimentations were performed on three different datasets spoken in three languages: English, German and Arabic in order to validate language independency of the proposed scheme. Results confirm that the presented system has reached a satisfying accuracy rate and promising classification performance thanks to the discriminating abilities and diversity of the used features combined with mid-level statistics.

  15. Identification of complex stiffness tensor from waveform reconstruction

    Science.gov (United States)

    Leymarie, N.; Aristégui, C.; Audoin, B.; Baste, S.

    2002-03-01

    An inverse method is proposed in order to determine the viscoelastic properties of composite-material plates from the plane-wave transmitted acoustic field. Analytical formulations of both the plate transmission coefficient and its first and second derivatives are established, and included in a two-step inversion scheme. Two objective functions to be minimized are then designed by considering the well-known maximum-likelihood principle and by using an analytic signal formulation. Through these innovative objective functions, the robustness of the inversion process against high level of noise in waveforms is improved and the method can be applied to a very thin specimen. The suitability of the inversion process for viscoelastic property identification is demonstrated using simulated data for composite materials with different anisotropy and damping degrees. A study of the effect of the rheologic model choice on the elastic property identification emphasizes the relevance of using a phenomenological description considering viscosity. Experimental characterizations show then the good reliability of the proposed approach. Difficulties arise experimentally for particular anisotropic media.

  16. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  17. A repeat-until-success quantum computing scheme

    International Nuclear Information System (INIS)

    Beige, A; Lim, Y L; Kwek, L C

    2007-01-01

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes

  18. Analysis of technical university information system

    Science.gov (United States)

    Savelyev, N. A.; Boyarkin, M. A.

    2018-05-01

    The paper covers a set and interaction of the existing higher education institution automated control systems in φ state budgetary educational institution of higher professional education "Industrial University of Tyumen ". A structural interaction of the existing systems and their functions has been analyzed which has become a basis for identification of a number of system-related and local (related to separate modules) drawbacks of the university activities automation. The authors suggested a new structure of the automated control system, consisting of three major subsystems: management support; training and methodology support; distance and supplementary education support. Functionality for each subsystem has been defined in accordance with the educational institution automation requirements. The suggested structure of the ACS will solve the challenges facing the university during reorganization and optimization of the processes of management of the institution activities as a whole.

  19. A pattern recognition approach based on DTW for automatic transient identification in nuclear power plants

    International Nuclear Information System (INIS)

    Galbally, Javier; Galbally, David

    2015-01-01

    Highlights: • Novel transient identification method for NPPs. • Low-complexity. • Low training data requirements. • High accuracy. • Fully reproducible protocol carried out on a real benchmark. - Abstract: Automatic identification of transients in nuclear power plants (NPPs) allows monitoring the fatigue damage accumulated by critical components during plant operation, and is therefore of great importance for ensuring that usage factors remain within the original design bases postulated by the plant designer. Although several schemes to address this important issue have been explored in the literature, there is still no definitive solution available. In the present work, a new method for automatic transient identification is proposed, based on the Dynamic Time Warping (DTW) algorithm, largely used in other related areas such as signature or speech recognition. The novel transient identification system is evaluated on real operational data following a rigorous pattern recognition protocol. Results show the high accuracy of the proposed approach, which is combined with other interesting features such as its low complexity and its very limited requirements of training data

  20. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  1. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Universal dephasing control during quantum computation

    International Nuclear Information System (INIS)

    Gordon, Goren; Kurizki, Gershon

    2007-01-01

    Dephasing is a ubiquitous phenomenon that leads to the loss of coherence in quantum systems and the corruption of quantum information. We present a universal dynamical control approach to combat dephasing during all stages of quantum computation, namely, storage and single- and two-qubit operators. We show that (a) tailoring multifrequency gate pulses to the dephasing dynamics can increase fidelity; (b) cross-dephasing, introduced by entanglement, can be eliminated by appropriate control fields; (c) counterintuitively and contrary to previous schemes, one can increase the gate duration, while simultaneously increasing the total gate fidelity

  3. Technical assistance for an evaluation of international schemes to promote biomass sustainability. Final report

    International Nuclear Information System (INIS)

    Londo, M.

    2009-12-01

    In this technical assistance report to the title subject report is given of Task 1: Review of GREEN-X assumptions on biomass availability and costs; Task 2: Impacts of sustainability criteria on biomass availability and costs; Task 3: Applicability of existing certification schemes; Task 4: Identification of feasible verification options; and Task 5: summary, integration. The key objective of Task 1 is to validate the present and future availability (up to 2020) and costs of biomass energy in the EU 27. The GREEN-X model forecasts the deployment of renewable energy systems under various scenarios in terms of supporting policy instruments, the availability of resources and generation technologies and energy, technology and resource price developments. Objective of task 2 is to assess to what extent the sustainability criteria as specified in the Renewable Energy Directive (RED (EP/EC 2009)) affect availability and costs of biofuels. The objective of task 3 is to assess to what extent national and international certification schemes (existing and under development) would be applicable for safeguarding the sustainability criteria as mentioned in the Renewable Energy Sources (RES) directive. The objective of Task 4 is to identify and analyse feasible options to verify compliance with biomass sustainability criteria, in the case of forest biomass.

  4. Large Scale Skill in Regional Climate Modeling and the Lateral Boundary Condition Scheme

    Science.gov (United States)

    Veljović, K.; Rajković, B.; Mesinger, F.

    2009-04-01

    Several points are made concerning the somewhat controversial issue of regional climate modeling: should a regional climate model (RCM) be expected to maintain the large scale skill of the driver global model that is supplying its lateral boundary condition (LBC)? Given that this is normally desired, is it able to do so without help via the fairly popular large scale nudging? Specifically, without such nudging, will the RCM kinetic energy necessarily decrease with time compared to that of the driver model or analysis data as suggested by a study using the Regional Atmospheric Modeling System (RAMS)? Finally, can the lateral boundary condition scheme make a difference: is the almost universally used but somewhat costly relaxation scheme necessary for a desirable RCM performance? Experiments are made to explore these questions running the Eta model in two versions differing in the lateral boundary scheme used. One of these schemes is the traditional relaxation scheme, and the other the Eta model scheme in which information is used at the outermost boundary only, and not all variables are prescribed at the outflow boundary. Forecast lateral boundary conditions are used, and results are verified against the analyses. Thus, skill of the two RCM forecasts can be and is compared not only against each other but also against that of the driver global forecast. A novel verification method is used in the manner of customary precipitation verification in that forecast spatial wind speed distribution is verified against analyses by calculating bias adjusted equitable threat scores and bias scores for wind speeds greater than chosen wind speed thresholds. In this way, focusing on a high wind speed value in the upper troposphere, verification of large scale features we suggest can be done in a manner that may be more physically meaningful than verifications via spectral decomposition that are a standard RCM verification method. The results we have at this point are somewhat

  5. Universal Developmental Screening: Preliminary Studies in Galicia, Spain

    Science.gov (United States)

    Sarmiento Campos, Jose A.; Squires, Jane; Ponte, Jaime

    2011-01-01

    "A_Tempo" is a research project that is currently under development in Galicia, an autonomous community of Spain. Its main aim is to propose an effective universal screening procedure for early identification of developmental disorders in children from zero to three years of age who attend Galician pre-primary schools.…

  6. On doublet composite schemes of leptons and quarks

    International Nuclear Information System (INIS)

    Pirogov, Yu.F.

    1981-01-01

    All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru

  7. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  8. A Very Low-Speed Sensorless Induction Motor Drive with Online Stator Resistance identification scheme

    Directory of Open Access Journals (Sweden)

    M. Zaky

    2008-03-01

    Full Text Available Recently, speed sensorless control of induction motor drives received great attention to avoid the different problems associated with direct speed sensors. However, low speed operation with robustness against parameter variations remains an area of research for sensorless systems. Stator resistance is of greatest importance for good operation of speed sensorless systems in low speed region. In this paper, a sliding mode current observer for an induction motor is presented. An estimation algorithm based on this observer in conjunction with Popov's hyper-stability theory is proposed to calculate the speed and stator resistance independently. The proposed speed observer with parallel stator resistance identification is firstly verified by simulation. Experimental results are included as well to demonstrate the good performance of the proposed observer and estimation algorithms at low speed.

  9. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  10. Universal continuous-variable quantum computation: Requirement of optical nonlinearity for photon counting

    International Nuclear Information System (INIS)

    Bartlett, Stephen D.; Sanders, Barry C.

    2002-01-01

    Although universal continuous-variable quantum computation cannot be achieved via linear optics (including squeezing), homodyne detection, and feed-forward, inclusion of ideal photon-counting measurements overcomes this obstacle. These measurements are sometimes described by arrays of beam splitters to distribute the photons across several modes. We show that such a scheme cannot be used to implement ideal photon counting and that such measurements necessarily involve nonlinear evolution. However, this requirement of nonlinearity can be moved ''off-line,'' thereby permitting universal continuous-variable quantum computation with linear optics

  11. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  12. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  13. Socioeconomic and programmatic determinants of renewal of membership in a voluntary micro health insurance scheme: evidence from Chakaria, Bangladesh.

    Science.gov (United States)

    Iqbal, Mohammad; Chowdhury, Asiful Haidar; Mahmood, Shehrin Shaila; Mia, Mohammad Nahid; Hanifi, S M A; Bhuiya, Abbas

    2017-01-01

    Out-of-pocket (OOP) healthcare expenditure is a major obstacle for achieving universal health coverage in low-income countries including Bangladesh. Sixty-three percent of the USD 27 annual per-capita healthcare expenditure in Bangladesh comes from individuals' pockets. Although health insurance is a financial tool for reducing OOP, use of such tools in Bangladesh has been limited to some small-scale voluntary micro health insurance (MHI) schemes run by non-governmental organizations (NGO). The MHI, however, can orient people on health insurance concept and provide learning for product development, implementation, barriers to enrolment, membership renewal, and other operational challenges and solutions. Keeping this in mind, icddr,b in 2012 initiated a pilot MHI, Amader Shasthya, in Chakaria, Bangladesh. This paper explores the determinants of membership renewal in this scheme, which is a perpetual challenge for MHI. Identify socioeconomic and programmatic determinants and their effects on membership renewal in a voluntary MHI scheme. Data came from the online management information system of the scheme and Health and Demographic Surveillance System of Chakaria, covering the period February 2012-May 2015. Association between renewal and independent variables was examined using cross-tabular and logistic regression analyses. Nearly 20% of households in the catchment area ever enroled in the scheme, and 38% renewed membership over the initial 3 years of operation. Frequency of consultation with healthcare providers, benefits received, proximity of member's residence to health facility, socioeconomic status, educational level, and age of the household head showed significant positive association with renewal of membership. Villagers' enrolment in the scheme indicated that even in poor economic and literacy conditions people can be motivated to enrol in insurance schemes. Degree of service utilization and benefits received can greatly enhance the probability of

  14. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  15. Convergent Difference Schemes for Hamilton-Jacobi equations

    KAUST Repository

    Duisembay, Serikbolsyn

    2018-05-07

    In this thesis, we consider second-order fully nonlinear partial differential equations of elliptic type. Our aim is to develop computational methods using convergent difference schemes for stationary Hamilton-Jacobi equations with Dirichlet and Neumann type boundary conditions in arbitrary two-dimensional domains. First, we introduce the notion of viscosity solutions in both continuous and discontinuous frameworks. Next, we review Barles-Souganidis approach using monotone, consistent, and stable schemes. In particular, we show that these schemes converge locally uniformly to the unique viscosity solution of the first-order Hamilton-Jacobi equations under mild assumptions. To solve the scheme numerically, we use Euler map with some initial guess. This iterative method gives the viscosity solution as a limit. Moreover, we illustrate our numerical approach in several two-dimensional examples.

  16. 'Neknomination': Predictors in a sample of UK university students.

    Science.gov (United States)

    Moss, Antony C; Spada, Marcantonio M; Harkin, Jamila; Albery, Ian P; Rycroft, Nicola; Nikčević, Ana V

    2015-06-01

    To identify prevalence and predictors of participation in the online drinking game 'neknomination' amongst university students. A convenience sample of 145 university students participated in a study about drinking behaviours, completing a questionnaire about their participation in neknomination, the Alcohol Use Disorders Identification Test, and the Resistance to Peer Influence Scale. Out of 145 students sampled, 54% took part in neknomination in the previous month. Mann-Whitney U tests revealed significantly higher scores on the Alcohol Use Disorders Identification Test, and significantly lower scores on the Resistance to Peer Influence Scale, for those who had participated in neknomination. A significant correlation was also shown between specific peer pressure to neknominate, and engagement in neknomination. A logistic regression analysis indicated that scores on the Alcohol Use Disorders Identification Test, but not the Resistance to Peer Influence Scale, predicted classification as an individual who participated in neknomination. We found that over half of respondents had participated in a neknomination game in the past month, with almost all male respondents having done so. Participation in neknomination was strongly associated with general hazardous drinking behaviour but not with resistance to peer influence. Further research is needed to understand the role of engagement with social media in drinking games and risky drinking.

  17. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  18. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  19. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  20. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.