Sample records for active defrost scheme

  1. MPI-Defrost: Extension of Defrost to MPI-based Cluster Environment

    NASA Astrophysics Data System (ADS)

    Amin, Mustafa A.; Easther, Richard; Finkel, Hal

    2011-06-01

    MPI-Defrost extends Frolov’s Defrost to an MPI-based cluster environment. This version has been restricted to a single field. Restoring two-field support should be straightforward, but will require some code changes. Some output options may also not be fully supported under MPI. This code was produced to support our own work, and has been made available for the benefit of anyone interested in either oscillon simulations or an MPI capable version of Defrost, and it is provided on an "as-is" basis. Andrei Frolov is the primary developer of Defrost and we thank him for placing his work under the GPL (GNU Public License), and thus allowing us to distribute this modified version.

  2. Apparatus and method for evaporator defrosting

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Domitrovic, Ronald E.

    2001-01-01

    An apparatus and method for warm-liquid defrosting of the evaporator of a refrigeration system. The apparatus includes a first refrigerant expansion device that selectively expands refrigerant for cooling the evaporator, a second refrigerant expansion device that selectively expands the refrigerant after the refrigerant has passed through the evaporator, and a defrosting control for the first refrigerant expansion device and second refrigerant expansion device to selectively defrost the evaporator by causing warm refrigerant to flow through the evaporator. The apparatus is alternately embodied with a first refrigerant bypass and/or a second refrigerant bypass for selectively directing refrigerant to respectively bypass the first refrigerant expansion device and the second refrigerant expansion device, and with the defrosting control connected to the first refrigerant bypass and/or the second refrigerant bypass to selectively activate and deactivate the bypasses depending upon the current cycle of the refrigeration system. The apparatus alternately includes an accumulator for accumulating liquid and/or gaseous refrigerant that is then pumped either to a refrigerant receiver or the first refrigerant expansion device for enhanced evaporator defrosting capability. The inventive method of defrosting an evaporator in a refrigeration system includes the steps of compressing refrigerant in a compressor and cooling the refrigerant in the condenser such that the refrigerant is substantially in liquid form, passing the refrigerant substantially in liquid form through the evaporator, and expanding the refrigerant with a refrigerant expansion device after the refrigerant substantially passes through the evaporator.

  3. Defrost Temperature Termination in Supermarket Refrigeration Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fricke, Brian A; Sharma, Vishaldeep

    2011-11-01

    The objective of this project was to determine the potential energy savings associated with implementing demand defrost strategies to defrost supermarket refrigerated display case evaporators, as compared to the widely accepted current practice of controlling display case defrost cycles with a preset timer. The defrost heater energy use of several representative display case types was evaluated. In addition, demand defrost strategies for refrigerated display cases as well as those used in residential refrigerator/freezers were evaluated. Furthermore, it is anticipated that future work will include identifying a preferred defrost strategy, with input from Retail Energy Alliance members. Based on this strategy,more » a demand defrost system will be designed which is suitable for supermarket refrigerated display cases. Limited field testing of the preferred defrost strategy will be performed in a supermarket environment.« less

  4. Modeling the defrost process in complex geometries - Part 1: Development of a one-dimensional defrost model

    NASA Astrophysics Data System (ADS)

    van Buren, Simon; Hertle, Ellen; Figueiredo, Patric; Kneer, Reinhold; Rohlfs, Wilko

    2017-11-01

    Frost formation is a common, often undesired phenomenon in heat exchanges such as air coolers. Thus, air coolers have to be defrosted periodically, causing significant energy consumption. For the design and optimization, prediction of defrosting by a CFD tool is desired. This paper presents a one-dimensional transient model approach suitable to be used as a zero-dimensional wall-function in CFD for modeling the defrost process at the fin and tube interfaces. In accordance to previous work a multi stage defrost model is introduced (e.g. [1, 2]). In the first instance the multi stage model is implemented and validated using MATLAB. The defrost process of a one-dimensional frost segment is investigated. Fixed boundary conditions are provided at the frost interfaces. The simulation results verify the plausibility of the designed model. The evaluation of the simulated defrost process shows the expected convergent behavior of the three-stage sequence.

  5. 9 CFR 590.538 - Defrosting facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Defrosting facilities. 590.538 Section 590.538 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG..., and Facility Requirements § 590.538 Defrosting facilities. (a) Approved metal defrosting tanks or vats...

  6. Dynamic Defrosting on Scalable Superhydrophobic Surfaces.

    PubMed

    Murphy, Kevin R; McClintic, William T; Lester, Kevin C; Collier, C Patrick; Boreyko, Jonathan B

    2017-07-19

    Recent studies have shown that frost can grow in a suspended Cassie state on nanostructured superhydrophobic surfaces. During defrosting, the melting sheet of Cassie frost spontaneously dewets into quasi-spherical slush droplets that are highly mobile. Promoting Cassie frost would therefore seem advantageous from a defrosting standpoint; however, nobody has systematically compared the efficiency of defrosting Cassie ice versus defrosting conventional surfaces. Here, we characterize the defrosting of an aluminum plate, one-half of which exhibits a superhydrophobic nanostructure while the other half is smooth and hydrophobic. For thick frost sheets (>1 mm), the superhydrophobic surface was able to dynamically shed the meltwater, even at very low tilt angles. In contrast, the hydrophobic surface was unable to shed any appreciable meltwater even at a 90° tilt angle. For thin frost layers (≲1 mm), not even the superhydrophobic surface could mobilize the meltwater. We attribute this to the large apparent contact angle of the meltwater, which for small amounts of frost serves to minimize coalescence events and prevent droplets from approaching the capillary length. Finally, we demonstrate a new mode of dynamic defrosting using an upside-down surface orientation, where the melting frost was able to uniformly detach from the superhydrophobic side and subsequently pull the frost from the hydrophobic side in a chain reaction. Treating surfaces to enable Cassie frost is therefore very desirable for enabling rapid and low-energy thermal defrosting, but only for frost sheets that are sufficiently thick.

  7. Dynamic Defrosting on Scalable Superhydrophobic Surfaces

    DOE PAGES

    Murphy, Kevin R.; McClintic, William T.; Lester, Kevin C.; ...

    2017-06-27

    Recent studies have shown that frost can grow in a suspended Cassie state on nanostructured superhydrophobic surfaces. During defrosting, the melting sheet of Cassie frost spontaneously dewets into quasi-spherical slush droplets that are highly mobile. Promoting Cassie frost would therefore seem advantageous from a defrosting standpoint; however, nobody has systematically compared the efficiency of defrosting Cassie ice versus defrosting conventional surfaces. Here, we characterize the defrosting of an aluminum plate, one-half of which exhibits a superhydrophobic nanostructure while the other half is smooth and hydrophobic. For thick frost sheets (>1 mm), the superhydrophobic surface was able to dynamically shed themore » meltwater, even at very low tilt angles. In contrast, the hydrophobic surface was unable to shed any appreciable meltwater even at a 90° tilt angle. For thin frost layers (≲1 mm), not even the superhydrophobic surface could mobilize the meltwater. We attribute this to the large apparent contact angle of the meltwater, which for small amounts of frost serves to minimize coalescence events and prevent droplets from approaching the capillary length. Finally, we demonstrate a new mode of dynamic defrosting using an upside-down surface orientation, where the melting frost was able to uniformly detach from the superhydrophobic side and subsequently pull the frost from the hydrophobic side in a chain reaction. Treating surfaces to enable Cassie frost is therefore very desirable for enabling rapid and low-energy thermal defrosting, but only for frost sheets that are sufficiently thick.« less

  8. Dynamic Defrosting on Scalable Superhydrophobic Surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Murphy, Kevin R.; McClintic, William T.; Lester, Kevin C.

    Recent studies have shown that frost can grow in a suspended Cassie state on nanostructured superhydrophobic surfaces. During defrosting, the melting sheet of Cassie frost spontaneously dewets into quasi-spherical slush droplets that are highly mobile. Promoting Cassie frost would therefore seem advantageous from a defrosting standpoint; however, nobody has systematically compared the efficiency of defrosting Cassie ice versus defrosting conventional surfaces. Here, we characterize the defrosting of an aluminum plate, one-half of which exhibits a superhydrophobic nanostructure while the other half is smooth and hydrophobic. For thick frost sheets (>1 mm), the superhydrophobic surface was able to dynamically shed themore » meltwater, even at very low tilt angles. In contrast, the hydrophobic surface was unable to shed any appreciable meltwater even at a 90° tilt angle. For thin frost layers (≲1 mm), not even the superhydrophobic surface could mobilize the meltwater. We attribute this to the large apparent contact angle of the meltwater, which for small amounts of frost serves to minimize coalescence events and prevent droplets from approaching the capillary length. Finally, we demonstrate a new mode of dynamic defrosting using an upside-down surface orientation, where the melting frost was able to uniformly detach from the superhydrophobic side and subsequently pull the frost from the hydrophobic side in a chain reaction. Treating surfaces to enable Cassie frost is therefore very desirable for enabling rapid and low-energy thermal defrosting, but only for frost sheets that are sufficiently thick.« less

  9. The Defrosting South

    NASA Technical Reports Server (NTRS)

    2005-01-01

    20 August 2005 This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows varied springtime patterns formed in defrosting, seasonal carbon dioxide frost in the south polar region of Mars. The feature sporting an outline of dark spots and an interior of smaller, closely-spaced dark spots and dark-outlined polygons is a patch of windblown or wind-eroded sand that was covered by carbon dioxide frost during the previous autumn and winter. The fainter, larger polygon pattern on either side of the patch of defrosting sand is formed in the substrate upon which the sand patch is sitting. Polygonal forms such as these might indicate the presence of ice below the surface.

    Location near: 79.6oS, 125.0oW Image width: width: 3 km (1.9 mi) Illumination from: upper left Season: Southern Spring

  10. Activating the Microscale Edge Effect in a Hierarchical Surface for Frosting Suppression and Defrosting Promotion

    PubMed Central

    Chen, Xuemei; Ma, Ruiyuan; Zhou, Hongbo; Zhou, Xiaofeng; Che, Lufeng; Yao, Shuhuai; Wang, Zuankai

    2013-01-01

    Despite extensive progress, current icephobic materials are limited by the breakdown of their icephobicity in the condensation frosting environment. In particular, the frost formation over the entire surface is inevitable as a result of undesired inter-droplet freezing wave propagation initiated by the sample edges. Moreover, the frost formation directly results in an increased frost adhesion, posing severe challenges for the subsequent defrosting process. Here, we report a hierarchical surface which allows for interdroplet freezing wave propagation suppression and efficient frost removal. The enhanced performances are mainly owing to the activation of the microscale edge effect in the hierarchical surface, which increases the energy barrier for ice bridging as well as engendering the liquid lubrication during the defrosting process. We believe the concept of harnessing the surface morphology to achieve superior performances in two opposite phase transition processes might shed new light on the development of novel materials for various applications. PMID:23981909

  11. Meltwater Evolution during Defrosting on Superhydrophobic Surfaces.

    PubMed

    Chu, Fuqiang; Wu, Xiaomin; Wang, Lingli

    2018-01-10

    Defrosting is essential for removing frost from engineering surfaces, but some fundamental issues are still unclear, especially for defrosting on superhydrophobic surfaces. Here, defrosting experiments on prepared superhydrophobic surfaces were conducted along with the investigation on meltwater evolution characteristics. According to the experiments, the typical meltwater evolution process on superhydrophobic surfaces can be divided into two stages: dewetting by edge curling and dewetting by shrinkage. The edge curling of a meltwater film is a distinct phenomenon and has been first reported in this work. Profiting from the ultralow adhesion of the superhydrophobic surface, edge curling is mainly attributed to two unbalanced forces (one at the interface between the ice slurry layer and pure water layer and the other in the triple phase line area) acting on the layered meltwater film. During the multi-meltwater evolution process, the nonbreaking of chained droplets on superhydrophobic surfaces is also an interesting phenomenon, which is controlled by the interaction between the surface tension and the retentive force because of contact angle hysteresis. An approximate criterion was then developed to explain and determine the status of chained droplets, and experimental data from various surfaces have validated the effectiveness of this criterion. This work may deepen the understanding of defrosting on superhydrophobic surfaces and promote antifrosting/icing applications in engineering.

  12. “Sapsan”-carriages defrosting station of Nizhniy Novgorod railway service enterprise and its surface waste water purification

    NASA Astrophysics Data System (ADS)

    Strelkov, Alexander; Teplykh, Svetlana; Gorshkalev, Pavel; Bystranova, Anastasia

    2017-10-01

    Surface water disposal is one of the most relevant problems for Nizhniy Novgorod railway service enterprises. Waste water must be quickly removed with special drainage devices and water drainage facilities (culverts, slope drains, pipes, ditches, etc.). During “Sapsan”-carriages defrosting watse water is aggregated on railroad tracks. It leads to track bed structure sagging, roadbed washaway and damages to point switches. In this paper the authors describe a concrete system of waste water disposal from railway service enterprises. This system is realized through culverts readjusted at the foot of ballast section. Thereafter, the collected water is pumped into a water collector and to local sewage waste-disposal plants. For railway stations with three or more tracks surface runoff diversion scheme depends on topography, railway tracks types, flow discharge and is compiled individually for each object. This paper examines “Sapsan”-carriages defrosting station of Nizhniy Novgorod railway service enterprise. It presents a technology scheme and equipment consisting of Sand catcher LOS-P, Oil catcher LOS-N, pressure-tight flotation unit; drain feed pump; solution-consuming tank of the coagulant, the solution-consuming tank of flocculant. The proposed technology has been introduced into the project practice.

  13. Measured impacts of supermarket humidity level on defrost performance and refrigerating system energy use

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henderson, H.I.; Khattar, M.

    This paper presents field-monitor data from two supermarkets where the impact of space humidity on refrigerating system energy use was evaluated. Direct digital control (DDC) systems were used at both stores to collect 15-minute monitored data. At Store A in Minneapolis, the DDC system was used to monitor system performance as well as to implement temperature-terminated control in place of time-terminated control on 16 refrigerated zones using hot gas defrost. At Store B in Indianapolis, the DDC system was used to quantify the performance trends for the single compressor rack system with electric defrost. The results at Store B showedmore » that refrigerating system energy use decreases by nearly 10 kWh/day for each 1% drop in space relative humidity, or about 0.4% of average annual system energy use. This value includes the impact of reduced latent loads, the reduction in direct energy use and imposed load from reduced electric defrost heater operation, and the smaller imposed load from reduced anti-sweat heater energy use. The measured reductions agree well with the impact predicted using the calculation methods developed by Howell (1933b) in ASHRAE Research Project 596. At Store A, the measured data show that implementing temperature-terminated defrost reduced refrigerating system energy use by nearly 70 kWh/day over the winter period when the average space humidity was 22% RH. The savings from temperature-terminated defrost increase by 4 kWh/day per each 1% drop in relative humidity. At both stores, the same type of mechanical controls were used to duty cycle the anti-sweat heaters based on store dew point. Anti-sweat heater electricity use was observed to decrease by 4.6 kWh/day at Store B and 3.4 kWh/day at Store A for each 1% drop in relative humidity. At Store A, a more aggressive control scheme was implemented with the DDC system that reduced anti-sweat heater energy use by 7.8 kWh/day per % RH. The more aggressive control approach was reported to

  14. Defrosting Polar Dunes -- "The Snow Leopard"

    NASA Image and Video Library

    2000-05-16

    The patterns created by dark spots on defrosting south polar dunes are often strange and beautiful. This picture, which the Mars Orbiter Camera team has dubbed, "the snow leopard," shows a dune field located at 61.5°S, 18.9°W, as it appeared on July 1, 1999. The spots are areas where dark sand has been exposed from beneath bright frost as the south polar winter cap begins to retreat. Many of the spots have a diffuse, bright ring around them this is thought to be fresh frost that was re-precipitated after being removed from the dark spot. The spots seen on defrosting polar dunes are a new phenomenon that was not observed by previous spacecraft missions to Mars. Thus, there is much about these features that remains unknown. For example, no one yet knows why the dunes become defrosted by forming small spots that grow and grow over time. No one knows for sure if the bright rings around the dark spots are actually composed of re-precipitated frost. And no one knows for sure why some dune show spots that appear to be "lined-up" (as they do in the picture shown here). This Mars Global Surveyor Mars Orbiter Camera image is illuminated from the upper left. North is toward the upper right. The scale bar indicates a distance of 200 meters (656 feet). http://photojournal.jpl.nasa.gov/catalog/PIA02301

  15. Defrosting Spots

    NASA Technical Reports Server (NTRS)

    2005-01-01

    3 October 2005 This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows dark, defrosting spots formed on a polygon-cracked plain in the south polar region of Mars. The surface was covered with carbon dioxide frost during the previous winter. In spring, the material begins to sublime away, creating a pattern of dark spots that sometimes have wind streaks emanating from them, as wind carries away or erodes the frost.

    Location near: 87.2oS, 28.4oW Image width: width: 3 km (1.9 mi) Illumination from: upper left Season: Southern Spring

  16. Heat pump having improved defrost system

    DOEpatents

    Chen, Fang C.; Mei, Viung C.; Murphy, Richard W.

    1998-01-01

    A heat pump system includes, in an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant: a compressor; an interior heat exchanger; an exterior heat exchanger; an accumulator; and means for heating the accumulator in order to defrost the exterior heat exchanger.

  17. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 590.539 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG... objectionable odors and are unfit for human food (e.g., sour, musty, fermented, or decomposed odors) shall be.... Defrosted liquid shall not be held more than 16 hours prior to processing or drying. (e) Sanitary methods...

  18. Heat pump having improved defrost system

    DOEpatents

    Chen, F.C.; Mei, V.C.; Murphy, R.W.

    1998-12-08

    A heat pump system includes, in an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant: a compressor; an interior heat exchanger; an exterior heat exchanger; an accumulator; and means for heating the accumulator in order to defrost the exterior heat exchanger. 2 figs.

  19. Defrosting Polar Dunes--'The Snow Leopard'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The patterns created by dark spots on defrosting south polar dunes are often strange and beautiful. This picture, which the Mars Orbiter Camera team has dubbed, 'the snow leopard,' shows a dune field located at 61.5oS, 18.9oW, as it appeared on July 1, 1999. The spots are areas where dark sand has been exposed from beneath bright frost as the south polar winter cap begins to retreat. Many of the spots have a diffuse, bright ring around them this is thought to be fresh frost that was re-precipitated after being removed from the dark spot. The spots seen on defrosting polar dunes are a new phenomenon that was not observed by previous spacecraft missions to Mars. Thus, there is much about these features that remains unknown. For example, no one yet knows why the dunes become defrosted by forming small spots that grow and grow over time. No one knows for sure if the bright rings around the dark spots are actually composed of re-precipitated frost. And no one knows for sure why some dune show spots that appear to be 'lined-up' (as they do in the picture shown here).

    This Mars Global Surveyor Mars Orbiter Camera image is illuminated from the upper left. North is toward the upper right. The scale bar indicates a distance of 200 meters (656 feet).

    Malin Space Science Systems and the California Institute of Technology built the MOC using spare hardware from the Mars Observer mission. MSSS operates the camera from its facilities in San Diego, CA. The Jet Propulsion Laboratory's Mars Surveyor Operations Project operates the Mars Global Surveyor spacecraft with its industrial partner, Lockheed Martin Astronautics, from facilities in Pasadena, CA and Denver, CO.

  20. WARM-LIQUID DEFROST FOR COMMERCIAL FOOD DISPLAY CASES: EXPERIMENTAL INVESTIGATION AT 32.2 DEGREES C CONDENSING

    EPA Science Inventory

    The paper gives results of an experimental investigation at 32.2 C condensing of warm-liquid defrost for commercial food display cases. A refrigeration test rig with two open cases and two reach-in cases was tested using warm-liquid defrost (WLD) at -34.4 C evaporating, 32.2 C co...

  1. Defrosting Polar Dunes--"They Look Like Bushes!"

    NASA Image and Video Library

    2000-05-26

    "They look like bushes!" That's what almost everyone says when they see the dark features found in pictures taken of sand dunes in the polar regions as they are beginning to defrost after a long, cold winter. It is hard to escape the fact that, at first glance, these images acquired by the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) over both polar regions during the spring and summer seasons, do indeed resemble aerial photographs of sand dune fields on Earth -- complete with vegetation growing on and around them! Of course, this is not what the features are, as we describe below and in related picture captions. Still, don't they look like vegetation to you? Shown here are two views of the same MGS MOC image. On the left is the full scene, on the right is an expanded view of a portion of the scene on the left. The bright, smooth surfaces that are dotted with occasional, nearly triangular dark spots are sand dunes covered by winter frost. The MGS MOC has been used over the past several months (April-August 1999) to monitor dark spots as they form and evolve on polar dune surfaces. The dark spots typically appear first along the lower margins of a dune -- similar to the position of bushes and tufts of grass that occur in and among some sand dunes on Earth. Because the martian air pressure is very low -- 100 times lower than at Sea Level on Earth -- ice on Mars does not melt and become liquid when it warms up. Instead, ice sublimes -- that is, it changes directly from solid to gas, just as "dry ice" does on Earth. As polar dunes emerge from the months-long winter night, and first become exposed to sunlight, the bright winter frost and snow begins to sublime. This process is not uniform everywhere on a dune, but begins in small spots and then over several months it spreads until the entire dune is spotted like a leopard. The early stages of the defrosting process -- as in the picture shown here -- give the impression that something is "growing" on the dunes

  2. Frost sensor for use in defrost controls for refrigeration

    DOEpatents

    French, Patrick D.; Butz, James R.; Veatch, Bradley D.; O'Connor, Michael W.

    2002-01-01

    An apparatus and method for measuring the total thermal resistance to heat flow from the air to the evaporative cooler fins of a refrigeration system. The apparatus is a frost sensor that measures the reduction in heat flow due to the added thermal resistance of ice (reduced conduction) as well as the reduction in heat flow due to the blockage of airflow (reduced convection) from excessive ice formation. The sensor triggers a defrost cycle when needed, instead of on a timed interval. The invention is also a method for control of frost in a system that transfers heat from air to a refrigerant along a thermal path. The method involves measuring the thermal conductivity of the thermal path from the air to the refrigerant, recognizing a reduction in thermal conductivity due to the thermal insulation effect of the frost and due to the loss of airflow from excessive ice formation; and controlling the defrosting of the system.

  3. Defrosting Polar Dunes--'They Look Like Bushes!'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    'They look like bushes!' That's what almost everyone says when they see the dark features found in pictures taken of sand dunes in the polar regions as they are beginning to defrost after a long, cold winter. It is hard to escape the fact that, at first glance, these images acquired by the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) over both polar regions during the spring and summer seasons, do indeed resemble aerial photographs of sand dune fields on Earth--complete with vegetation growing on and around them! Of course, this is not what the features are, as we describe below and in related picture captions. Still, don't they look like vegetation to you? Shown here are two views of the same MGS MOC image. On the left is the full scene, on the right is an expanded view of a portion of the scene on the left. The bright, smooth surfaces that are dotted with occasional, nearly triangular dark spots are sand dunes covered by winter frost.

    The MGS MOC has been used over the past several months (April-August 1999) to monitor dark spots as they form and evolve on polar dune surfaces. The dark spots typically appear first along the lower margins of a dune--similar to the position of bushes and tufts of grass that occur in and among some sand dunes on Earth.

    Because the martian air pressure is very low--100 times lower than at Sea Level on Earth--ice on Mars does not melt and become liquid when it warms up. Instead, ice sublimes--that is, it changes directly from solid to gas, just as 'dry ice' does on Earth. As polar dunes emerge from the months-long winter night, and first become exposed to sunlight, the bright winter frost and snow begins to sublime. This process is not uniform everywhere on a dune, but begins in small spots and then over several months it spreads until the entire dune is spotted like a leopard.

    The early stages of the defrosting process--as in the picture shown here--give the impression that something is 'growing' on the dunes

  4. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service...

  5. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service...

  6. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service...

  7. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service...

  8. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service...

  9. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service...

  10. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service...

  11. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service...

  12. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service...

  13. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service...

  14. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service...

  15. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service...

  16. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service Range...

  17. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service Range...

  18. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service Range...

  19. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service Range...

  20. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service Range...

  1. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service Range...

  2. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service Range...

  3. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service Range...

  4. Bio-inspired, colorful, flexible, defrostable light-scattering hybrid films for the effective distribution of LED light.

    PubMed

    An, Seongpil; Jo, Hong Seok; Kim, Yong Il; Song, Kyo Yong; Kim, Min-Woo; Lee, Kyu Bum; Yarin, Alexander L; Yoon, Sam S

    2017-07-06

    Bioluminescent jellyfish has a unique structure derived from fiber/polymer interfaces that is advantageous for effective light scattering in the dark, deep sea water. Herein, we demonstrate the fabrication of bio-inspired hybrid films by mimicry of the jellyfish's structure, leading to excellent light-scattering performance and defrosting capability. A haze value reaching 59.3% and a heating temperature of up to 292 °C were achieved with the films. Accordingly, the developed surface constitutes an attractive optical device for lighting applications, especially for street or vehicle luminaries for freezing Arctic-climate countries. The morphological details of the hybrid films were revealed by scanning electron microscopy. The light-scattering properties of these films were examined by ultraviolet-visible-infrared spectrophotometry and anti-glare effect analyses. The defrosting performance of the hybrid films was evaluated via heating tests and infra-red observations.

  5. Defrosting Polar Dunes--Dark Spots and Wind Streaks

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The first time that the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC)team saw dark spots on defrosting dune surfaces was in August and September of 1998. At that time, it was the north polar seasonal frost cap that was subliming away (more recent images from 1999 have shown the south polar frosts). This picture (above) shows a small portion of the giant dune field that surrounds the north polar region, as it appeared on August 23, 1998. At the time, it was early northern spring and the dunes were still covered with winter frost.

    Dark spots had appeared on the north polar dunes, and many of them exhibited a radial or semi-radial pattern of dark streaks and streamers. At first, there was speculation that the streaks indicated that the defrosting process might somehow involve explosions! The dark spots seemed to resemble small craters with dark, radial ejecta. It seemed possible that frozen carbon dioxide trapped beneath water ice might somehow heat up, turn to gas, expand, and then 'explode' in either a small blast or at least a 'puff' of air similar to that which comes from the blowhole of a surfacing whale or seal.

    The image shown here changed the earlier impression. The dark spots and streaks do not result from explosions. The spots--though not well understood--represent the earliest stages of defrosting on the sand dunes. The streaks, instead of being caused by small explosions, are instead the result of wind. In this picture, the fine, dark streaks show essentially identical orientations from spot to spot (e.g., compare the spots seen in boxes (a) and (b)). Each ray of dark material must result from wind blowing from a particular direction--for example, all of the spots in this picture exhibit a ray that points toward the upper left corner of the image, and each of these rays indicates the same wind regime. Each spot also has a ray pointing toward the lower right and top/upper-right. These, too, must indicate periods when the wind was strong

  6. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial... Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume in...

  7. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial... Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume in...

  8. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial... Freezer Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated...

  9. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial... With Through-the-door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume in...

  10. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial... With Through-the-door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume in...

  11. Achieving bifunctional cloak via combination of passive and active schemes

    NASA Astrophysics Data System (ADS)

    Lan, Chuwen; Bi, Ke; Gao, Zehua; Li, Bo; Zhou, Ji

    2016-11-01

    In this study, a simple and delicate approach to realizing manipulation of multi-physics field simultaneously through combination of passive and active schemes is proposed. In the design, one physical field is manipulated with passive scheme while the other with active scheme. As a proof of this concept, a bifunctional device is designed and fabricated to behave as electric and thermal invisibility cloak simultaneously. It is found that the experimental results are consistent with the simulated ones well, confirming the feasibility of our method. Furthermore, the proposed method could also be extended to other multi-physics fields, which might lead to potential applications in thermal, electric, and acoustic areas.

  12. Defrosting the digital library: bibliographic tools for the next generation web.

    PubMed

    Hull, Duncan; Pettifer, Steve R; Kell, Douglas B

    2008-10-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as "thought in cold storage," and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines.

  13. Defrosting the Digital Library: Bibliographic Tools for the Next Generation Web

    PubMed Central

    Hull, Duncan; Pettifer, Steve R.; Kell, Douglas B.

    2008-01-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as “thought in cold storage,” and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines. PMID:18974831

  14. Application of a micro-credit scheme to some ecological activities

    NASA Astrophysics Data System (ADS)

    Hakoyama, F.

    2017-03-01

    Micro-credit schemes are expanding very rapidly worldwide in ecological activities. Providing gas-cooking equipments in Burkina Faso is a successful example in which the micro-credit system contributes to improve not only poor women’s life but also ecological environment. In Bangladesh, a solar PV system program through micro-credit has been implemented widely and successfully: big NGOs act as equipment dealers and provide micro-credit loans to individual poor households. In contrast, there are very few cases which showed positive results in sanitation projects. Micro-credit schemes are, in principle, based on the income generated through the fund. But in usual cases, sanitation activities do not yield any income. High cost of latrine construction is another barrier. In this paper, we reviewed why we could not apply a micro-credit scheme to our “Améli-eaur project” in Burkina Faso. Common features for the success in ecological activities are 1) enough income yielded from the activity itself, 2) the strong needs from population side, and 3) established system support, both technically and administratively. If we find a way to fulfill these elements in a sanitation project, it can be a long, sustainable project.

  15. A Novel, Simplified Scheme for Plastics Identification: "JCE" Classroom Activity 104

    ERIC Educational Resources Information Center

    Harris, Mary E.; Walker, Barbara

    2010-01-01

    In this Activity, students identify samples of seven types of recyclable plastic by using a flowchart scheme. The flowchart procedure includes making density comparisons of the plastic samples in water and alcohol and observing physical changes of plastic samples subjected to boiling water temperatures and exposure to acetone. This scheme is…

  16. Multichannel feedforward control schemes with coupling compensation for active sound profiling

    NASA Astrophysics Data System (ADS)

    Mosquera-Sánchez, Jaime A.; Desmet, Wim; de Oliveira, Leopoldo P. R.

    2017-05-01

    Active sound profiling includes a number of control techniques that enables the equalization, rather than the mere reduction, of acoustic noise. Challenges may rise when trying to achieve distinct targeted sound profiles simultaneously at multiple locations, e.g., within a vehicle cabin. This paper introduces distributed multichannel control schemes for independently tailoring structural borne sound reaching a number of locations within a cavity. The proposed techniques address the cross interactions amongst feedforward active sound profiling units, which compensate for interferences of the primary sound at each location of interest by exchanging run-time data amongst the control units, while attaining the desired control targets. Computational complexity, convergence, and stability of the proposed multichannel schemes are examined in light of the physical system at which they are implemented. The tuning performance of the proposed algorithms is benchmarked with the centralized and pure-decentralized control schemes through computer simulations on a simplified numerical model, which has also been subjected to plant magnitude variations. Provided that the representation of the plant is accurate enough, the proposed multichannel control schemes have been shown as the only ones that properly deliver targeted active sound profiling tasks at each error sensor location. Experimental results in a 1:3-scaled vehicle mock-up further demonstrate that the proposed schemes are able to attain reductions of more than 60 dB upon periodic disturbances at a number of positions, while resolving cross-channel interferences. Moreover, when the sensor/actuator placement is found as defective at a given frequency, the inclusion of a regularization parameter in the cost function is seen to not hinder the proper operation of the proposed compensation schemes, at the time that it assures their stability, at the expense of losing control performance.

  17. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    PubMed

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges.

  18. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  19. Agent-based power sharing scheme for active hybrid power sources

    NASA Astrophysics Data System (ADS)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  20. Effectiveness of exercise-referral schemes to promote physical activity in adults: systematic review.

    PubMed

    Williams, Nefyn H; Hendry, Maggie; France, Barbara; Lewis, Ruth; Wilkinson, Clare

    2007-12-01

    Despite the health benefits of physical activity, most adults do not take the recommended amount of exercise. To assess whether exercise-referral schemes are effective in improving exercise participation in sedentary adults. Systematic review. Studies were identified by searching MEDLINE, CINAHL, EMBASE, AMED, PsycINFO, SPORTDiscus, The Cochrane Library and SIGLE until March 2007. Randomised controlled trials (RCTs), observational studies, process evaluations and qualitative studies of exercise-referral schemes, defined as referral by a primary care clinician to a programme that encouraged physical activity or exercise were included. RCT results were combined in a meta-analysis where there was sufficient homogeneity. Eighteen studies were included in the review. These comprised six RCTs, one non-randomised controlled study, four observational studies, six process evaluations and one qualitative study. In addition, two of the RCTs and two of the process evaluations incorporated a qualitative component. Results from five RCTs were combined in a meta-analysis. There was a statistically significant increase in the numbers of participants doing moderate exercise with a combined relative risk of 1.20 (95% confidence intervals = 1.06 to 1.35). This means that 17 sedentary adults would need to be referred for one to become moderately active. This small effect may be at least partly due to poor rates of uptake and adherence to the exercise schemes. Exercise-referral schemes have a small effect on increasing physical activity in sedentary people. The key challenge, if future exercise-referral schemes are to be commissioned by the NHS, is to increase uptake and improve adherence by addressing the barriers described in these studies.

  1. Dynamo-based scheme for forecasting the magnitude of solar activity cycles

    NASA Technical Reports Server (NTRS)

    Layden, A. C.; Fox, P. A.; Howard, J. M.; Sarajedini, A.; Schatten, K. H.

    1991-01-01

    This paper presents a general framework for forecasting the smoothed maximum level of solar activity in a given cycle, based on a simple understanding of the solar dynamo. This type of forecasting requires knowledge of the sun's polar magnetic field strength at the preceding activity minimum. Because direct measurements of this quantity are difficult to obtain, the quality of a number of proxy indicators already used by other authors is evaluated, which are physically related to the sun's polar field. These indicators are subjected to a rigorous statistical analysis, and the analysis technique for each indicator is specified in detail in order to simplify and systematize reanalysis for future use. It is found that several of these proxies are in fact poorly correlated or uncorrelated with solar activity, and thus are of little value for predicting activity maxima. Also presented is a scheme in which the predictions of the individual proxies are combined via an appropriately weighted mean to produce a compound prediction. The scheme is then applied to the current cycle 22, and a maximum smoothed international sunspot number of 171 + or - 26 is estimated.

  2. Self-powered suspension criterion and energy regeneration implementation scheme of motor-driven active suspension

    NASA Astrophysics Data System (ADS)

    Yan, Shuai; Sun, Weichao

    2017-09-01

    Active suspension systems have advantages on mitigating the effects of vehicle vibration caused by road roughness, which are one of the most important component parts in influencing the performances of vehicles. However, high amount of energy consumption restricts the application of active suspension systems. From the point of energy saving, this paper presents a self-powered criterion of the active suspension system to judge whether a motor-driven suspension can be self-powered or not, and then a motor parameter condition is developed as a reference to design a self-powered suspension. An energy regeneration implementation scheme is subsequently proposed to make the active suspension which has the potential to be self-powered achieve energy-saving target in the real application. In this implementation scheme, operating electric circuits are designed based on different working status of the actuator and power source and it is realizable to accumulate energy from road vibration and supply energy to the actuator by switching corresponding electric circuits. To apply the self-powered suspension criterion and energy regeneration implementation scheme, an active suspension system is designed with a constrained H∞ controller and calculation results indicate that it has the capability to be self-powered. Simulation results show that the performances of the self-powered active suspension are nearly the same as those of the active suspension with an external energy source and can achieve energy regeneration at the same time.

  3. Effect of exercise referral schemes in primary care on physical activity and improving health outcomes: systematic review and meta-analysis

    PubMed Central

    Taylor, A H; Fox, K R; Hillsdon, M; Anokye, N; Campbell, J L; Foster, C; Green, C; Moxham, T; Mutrie, N; Searle, J; Trueman, P; Taylor, R S

    2011-01-01

    Objective To assess the impact of exercise referral schemes on physical activity and health outcomes. Design Systematic review and meta-analysis. Data sources Medline, Embase, PsycINFO, Cochrane Library, ISI Web of Science, SPORTDiscus, and ongoing trial registries up to October 2009. We also checked study references. Study selection Design: randomised controlled trials or non-randomised controlled (cluster or individual) studies published in peer review journals. Population: sedentary individuals with or without medical diagnosis. Exercise referral schemes defined as: clear referrals by primary care professionals to third party service providers to increase physical activity or exercise, physical activity or exercise programmes tailored to individuals, and initial assessment and monitoring throughout programmes. Comparators: usual care, no intervention, or alternative exercise referral schemes. Results Eight randomised controlled trials met the inclusion criteria, comparing exercise referral schemes with usual care (six trials), alternative physical activity intervention (two), and an exercise referral scheme plus a self determination theory intervention (one). Compared with usual care, follow-up data for exercise referral schemes showed an increased number of participants who achieved 90-150 minutes of physical activity of at least moderate intensity per week (pooled relative risk 1.16, 95% confidence intervals 1.03 to 1.30) and a reduced level of depression (pooled standardised mean difference −0.82, −1.28 to −0.35). Evidence of a between group difference in physical activity of moderate or vigorous intensity or in other health outcomes was inconsistent at follow-up. We did not find any difference in outcomes between exercise referral schemes and the other two comparator groups. None of the included trials separately reported outcomes in individuals with specific medical diagnoses.Substantial heterogeneity in the quality and nature of the exercise referral

  4. Active module identification in intracellular networks using a memetic algorithm with a new binary decoding scheme.

    PubMed

    Li, Dong; Pan, Zhisong; Hu, Guyu; Zhu, Zexuan; He, Shan

    2017-03-14

    Active modules are connected regions in biological network which show significant changes in expression over particular conditions. The identification of such modules is important since it may reveal the regulatory and signaling mechanisms that associate with a given cellular response. In this paper, we propose a novel active module identification algorithm based on a memetic algorithm. We propose a novel encoding/decoding scheme to ensure the connectedness of the identified active modules. Based on the scheme, we also design and incorporate a local search operator into the memetic algorithm to improve its performance. The effectiveness of proposed algorithm is validated on both small and large protein interaction networks.

  5. Development of a Blood Pressure Measurement Instrument with Active Cuff Pressure Control Schemes.

    PubMed

    Kuo, Chung-Hsien; Wu, Chun-Ju; Chou, Hung-Chyun; Chen, Guan-Ting; Kuo, Yu-Cheng

    2017-01-01

    This paper presents an oscillometric blood pressure (BP) measurement approach based on the active control schemes of cuff pressure. Compared with conventional electronic BP instruments, the novelty of the proposed BP measurement approach is to utilize a variable volume chamber which actively and stably alters the cuff pressure during inflating or deflating cycles. The variable volume chamber is operated with a closed-loop pressure control scheme, and it is activated by controlling the piston position of a single-acting cylinder driven by a screw motor. Therefore, the variable volume chamber could significantly eliminate the air turbulence disturbance during the air injection stage when compared to an air pump mechanism. Furthermore, the proposed active BP measurement approach is capable of measuring BP characteristics, including systolic blood pressure (SBP) and diastolic blood pressure (DBP), during the inflating cycle. Two modes of air injection measurement (AIM) and accurate dual-way measurement (ADM) were proposed. According to the healthy subject experiment results, AIM reduced 34.21% and ADM reduced 15.78% of the measurement time when compared to a commercial BP monitor. Furthermore, the ADM performed much consistently (i.e., less standard deviation) in the measurements when compared to a commercial BP monitor.

  6. The Nature of All "Inappropriate Referrals" Made to a Countywide Physical Activity Referral Scheme: Implications for Practice

    ERIC Educational Resources Information Center

    Johnston, Lynne Halley; Warwick, Jane; De Ste Croix, Mark; Crone, Diane; Sldford, Adrienne

    2005-01-01

    Objective: The aim of this study was to evaluate the impact of a centralised referral mechanism (CRM) upon the number and type of "inappropriate referrals" made to a countywide physical activity referral scheme. Design: Case study. Method: Phase 1: Hierarchical Content Analysis of 458 "inappropriate referrals" made to a countywide scheme over a…

  7. Direct Z-scheme TiO2/CdS hierarchical photocatalyst for enhanced photocatalytic H2-production activity

    NASA Astrophysics Data System (ADS)

    Meng, Aiyun; Zhu, Bicheng; Zhong, Bo; Zhang, Liuyang; Cheng, Bei

    2017-11-01

    Photocatalytic H2 evolution, which utilizes solar energy via water splitting, is a promising route to deal with concerns about energy and environment. Herein, a direct Z-scheme TiO2/CdS binary hierarchical photocatalyst was fabricated via a successive ionic layer adsorption and reaction (SILAR) technique, and photocatalytic H2 production was measured afterwards. The as-prepared TiO2/CdS hybrid photocatalyst exhibited noticeably promoted photocatalytic H2-production activity of 51.4 μmol h-1. The enhancement of photocatalytic activity was ascribed to the hierarchical structure, as well as the efficient charge separation and migration from TiO2 nanosheets to CdS nanoparticles (NPs) at their tight contact interfaces. Moreover, the direct Z-scheme photocatalytic reaction mechanism was demonstrated to elucidate the improved photocatalytic performance of TiO2/CdS composite photocatalyst. The photoluminescence (PL) analysis of hydroxyl radicals were conducted to provide clues for the direct Z-scheme mechanism. This work provides a facile route for the construction of redox mediator-free Z-scheme photocatalytic system for photocatalytic water splitting.

  8. Active High-Latitude Dune-Gullies

    NASA Image and Video Library

    2015-06-17

    Gully and defrosting activity have been visible here along the edge of a dune field, along with blocks of frost. Observations from NASA Mars Reconnaissance Orbiter of the same area help check for repeat activity, as well as measuring those meter-scale blocks that we've seen prior. In this case, we want to compare any possible changes with a previous observation, which we acquired in 2011. We've also seen images where carbon dioxide frost was the driving process in creating new gullies, so we know their formation is occurring to this day. Tracking for changes, especially when we look at the 1-kilometer enhanced color swath, can help us find more. http://photojournal.jpl.nasa.gov/catalog/PIA19843

  9. Rural health prepayment schemes in China: towards a more active role for government.

    PubMed

    Bloom, G; Shenglan, T

    1999-04-01

    A large majority of China's rural population were members of health prepayment schemes in the 1970's. Most of these schemes collapsed during the transition to a market economy. Some localities subsequently reestablished schemes. In early 1997 a new government policy identified health prepayment as a major potential source of rural health finance. This paper draws on the experience of existing schemes to explore how government can support implementation of this policy. The decision to support the establishment of health prepayment schemes is part of the government's effort to establish new sources of finance for social services. It believes that individuals are more likely to accept voluntary contributions to a prepayment scheme than tax increases. The voluntary nature of the contributions limits the possibilities for risk-sharing and redistribution between rich and poor. This underlines the need for the government to fund a substantial share of health expenditure out of general revenues, particularly in poor localities. The paper notes that many successful prepayment schemes depend on close supervision by local political leaders. It argues that the national programme will have to translate these measures into a regulatory system which defines the responsibilities of scheme management bodies and local governments. A number of prepayment schemes have collapsed because members did not feel they got value for money. Local health bureaux will have to cooperate with prepayment schemes to ensure that health facilities provide good quality services at a reasonable cost. Users' representatives can also monitor performance. The paper concludes that government needs to clarify the relationship between health prepayment schemes and other actors in rural localities in order to increase the chance that schemes will become a major source rural health finance.

  10. Social capital and active membership in the Ghana National Health Insurance Scheme - a mixed method study.

    PubMed

    Fenenga, Christine J; Nketiah-Amponsah, Edward; Ogink, Alice; Arhinful, Daniel K; Poortinga, Wouter; Hutter, Inge

    2015-11-02

    People's decision to enroll in a health insurance scheme is determined by socio-cultural and socio-economic factors. On request of the National health Insurance Authority (NHIA) in Ghana, our study explores the influence of social relationships on people's perceptions, behavior and decision making to enroll in the National Health Insurance Scheme. This social scheme, initiated in 2003, aims to realize accessible quality healthcare services for the entire population of Ghana. We look at relationships of trust and reciprocity between individuals in the communities (so called horizontal social capital) and between individuals and formal health institutions (called vertical social capital) in order to determine whether these two forms of social capital inhibit or facilitate enrolment of clients in the scheme. Results can support the NHIA in exploiting social capital to reach their objective and strengthen their policy and practice. We conducted 20 individual- and seven key-informant interviews, 22 focus group discussions, two stakeholder meetings and a household survey, using a random sample of 1903 households from the catchment area of 64 primary healthcare facilities. The study took place in Greater Accra Region and Western Regions in Ghana between June 2011 and March 2012. While social developments and increased heterogeneity seem to reduce community solidarity in Ghana, social networks remain common in Ghana and are valued for their multiple benefits (i.e. reciprocal trust and support, information sharing, motivation, risk sharing). Trusting relations with healthcare and insurance providers are, according healthcare clients, based on providers' clear communication, attitude, devotion, encouragement and reliability of services. Active membership of the NHIS is positive associated with community trust, trust in healthcare providers and trust in the NHIS (p-values are .009, .000 and .000 respectively). Social capital can motivate clients to enroll in health insurance

  11. Immersion freezing of supermicron mineral dust particles: freezing results, testing different schemes for describing ice nucleation, and ice nucleation active site densities.

    PubMed

    Wheeler, M J; Mason, R H; Steunenberg, K; Wagstaff, M; Chou, C; Bertram, A K

    2015-05-14

    Ice nucleation on mineral dust particles is known to be an important process in the atmosphere. To accurately implement ice nucleation on mineral dust particles in atmospheric simulations, a suitable theory or scheme is desirable to describe laboratory freezing data in atmospheric models. In the following, we investigated ice nucleation by supermicron mineral dust particles [kaolinite and Arizona Test Dust (ATD)] in the immersion mode. The median freezing temperature for ATD was measured to be approximately -30 °C compared with approximately -36 °C for kaolinite. The freezing results were then used to test four different schemes previously used to describe ice nucleation in atmospheric models. In terms of ability to fit the data (quantified by calculating the reduced chi-squared values), the following order was found for ATD (from best to worst): active site, pdf-α, deterministic, single-α. For kaolinite, the following order was found (from best to worst): active site, deterministic, pdf-α, single-α. The variation in the predicted median freezing temperature per decade change in the cooling rate for each of the schemes was also compared with experimental results from other studies. The deterministic model predicts the median freezing temperature to be independent of cooling rate, while experimental results show a weak dependence on cooling rate. The single-α, pdf-α, and active site schemes all agree with the experimental results within roughly a factor of 2. On the basis of our results and previous results where different schemes were tested, the active site scheme is recommended for describing the freezing of ATD and kaolinite particles. We also used our ice nucleation results to determine the ice nucleation active site (INAS) density for the supermicron dust particles tested. Using the data, we show that the INAS densities of supermicron kaolinite and ATD particles studied here are smaller than the INAS densities of submicron kaolinite and ATD particles

  12. Occurrence of pharmaceutically active and non-steroidal estrogenic compounds in three different wastewater recycling schemes in Australia.

    PubMed

    Al-Rifai, Jawad H; Gabelish, Candace L; Schäfer, Andrea I

    2007-10-01

    The discovery that natural and synthetic chemicals, in the form of excreted hormones and pharmaceuticals, as well as a vast array of compounds with domestic and industrial applications, can enter the environment via wastewater treatment plants and cause a wide variety of environmental and health problems even at very low concentrations, suggests the need for improvement of water recycling. Three Australian wastewater recycling schemes, two of which employ reverse osmosis (RO) technology, the other applying ozonation and biological activated carbon filtration, have been studied for their ability to remove trace organic contaminants including 11 pharmaceutically active compounds and two non-steroidal estrogenic compounds. Contaminant concentrations were determined using a sensitive analytical method comprising solid phase extraction, derivatization and GC with MS using selected ion monitoring. In raw wastewater, concentrations of analgesics and non-steroidal anti-inflammatory medications were comparable to those found in wastewaters around the world. Remarkably, removal efficiencies for the three schemes were superior to literature values and RO was responsible for the greatest proportion of contaminant removal. The ability of RO membranes to concentrate many of the compounds was demonstrated and highlights the need for continued research into monitoring wastewater treatment, concentrate disposal, improved water recycling schemes and ultimately, safer water and a cleaner environment.

  13. Enhanced photocatalytic activity of graphitic carbon nitride/carbon nanotube/Bi2WO6 ternary Z-scheme heterojunction with carbon nanotube as efficient electron mediator.

    PubMed

    Jiang, Deli; Ma, Wanxia; Xiao, Peng; Shao, Leqiang; Li, Di; Chen, Min

    2018-02-15

    All-solid-state Z-scheme heterojunction has attracted much attention in photocatalytic field because of its strong ability in charge separation and transfer. In the present study, all-solid-state ternary Z-scheme heterojunction constructed by graphitic carbon nitride (CN) nanosheet, carbon nanotube (CNT), and Bi 2 WO 6 (BWO) nanosheet, in which CNT was employed as the electron mediator. The CN/CNT/BWO ternary Z-scheme heterojunction shows the enhanced photocatalytic activity towards the degradation of tetracycline hydrochloride (TC) as compared to the pristine g-C 3 N 4 , Bi 2 WO 6 , CNT/BWO, CNT/CN, and CN/BWO. The significantly improved photocatalytic activity can be mainly ascribed to the formed CNT-mediated Z-scheme heterojunction, which facilitates the separation and transfer of photogenerated electron-hole pairs. Our work provides a rational design of all-solid-state Z-scheme heterojunction with CNT as the electron mediator for highly efficient photocatalysis. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Self-jumping Mechanism of Melting Frost on Superhydrophobic Surfaces.

    PubMed

    Liu, Xiaolin; Chen, Huawei; Zhao, Zehui; Wang, Yamei; Liu, Hong; Zhang, Deyuan

    2017-11-07

    Frost accretion on surfaces may cause severe problems and the high-efficiency defrosting methods are still urgently needed in many application fields like heat transfer, optical and electric power system, etc. In this study, a nano-needle superhydrophobic surface is prepared and the frosting/defrosting experiments are conducted on it. Three steps are found in the defrosting process: melting frost shrinking and splitting, instantaneous self-triggered deforming followed by deformation-induced movements (namely, in-situ shaking, rotating, rolling, and self-jumping). The self-jumping performance of the melting frost is extremely fascinating and worth studying due to its capability of evidently shortening the defrosting process and reducing (even avoiding) residual droplets after defrosting. The study on the melting frost self-jumping phenomena demonstrates that the kinetic energy transformed from instantaneous superficial area change in self-triggered deforming step is the intrinsic reason for various melting frost self-propelled movements, and when the transformed energy reaches a certain amount, the self-jumping phenomena occur. And some facilitating conditions for melting frost self-jumping phenomena are also discussed. This work will provide an efficient way for defrosting or an inspiration for further research on defrosting.

  15. 77 FR 3559 - Energy Conservation Program for Consumer Products: Test Procedures for Refrigerators...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-25

    ..., which is typical of an approach enabled by more sophisticated electronic controls. Id. The interim final... and long- time automatic defrost or variable defrost control and adjust the default values of maximum... accurate measurement of the energy use of products with variable defrost control. DATES: The amendments are...

  16. Sequential Feedback Scheme Outperforms the Parallel Scheme for Hamiltonian Parameter Estimation.

    PubMed

    Yuan, Haidong

    2016-10-14

    Measurement and estimation of parameters are essential for science and engineering, where the main quest is to find the highest achievable precision with the given resources and design schemes to attain it. Two schemes, the sequential feedback scheme and the parallel scheme, are usually studied in the quantum parameter estimation. While the sequential feedback scheme represents the most general scheme, it remains unknown whether it can outperform the parallel scheme for any quantum estimation tasks. In this Letter, we show that the sequential feedback scheme has a threefold improvement over the parallel scheme for Hamiltonian parameter estimations on two-dimensional systems, and an order of O(d+1) improvement for Hamiltonian parameter estimation on d-dimensional systems. We also show that, contrary to the conventional belief, it is possible to simultaneously achieve the highest precision for estimating all three components of a magnetic field, which sets a benchmark on the local precision limit for the estimation of a magnetic field.

  17. Indirect Z-Scheme BiOI/g-C3N4 Photocatalysts with Enhanced Photoreduction CO2 Activity under Visible Light Irradiation.

    PubMed

    Wang, Ji-Chao; Yao, Hong-Chang; Fan, Ze-Yu; Zhang, Lin; Wang, Jian-She; Zang, Shuang-Quan; Li, Zhong-Jun

    2016-02-17

    Rational design and construction of Z-scheme photocatalysts has received much attention in the field of CO2 reduction because of its great potential to solve the current energy and environmental crises. In this study, a series of Z-scheme BiOI/g-C3N4 photocatalysts are synthesized and their photocatalytic performance for CO2 reduction to produce CO, H2 and/or CH4 is evaluated under visible light irradiation (λ > 400 nm). The results show that the as-synthesized composites exhibit more highly efficient photocatalytic activity than pure g-C3N4 and BiOI and that the product yields change remarkably depending on the reaction conditions such as irradiation light wavelength. Emphasis is placed on identifying how the charge transfers across the heterojunctions and an indirect Z-scheme charge transfer mechanism is verified by detecting the intermediate I3(-) ions. The reaction mechanism is further proposed based on the detection of the intermediate (•)OH and H2O2. This work may be useful for rationally designing of new types of Z-scheme photocatalyst and provide some illuminating insights into the Z-scheme transfer mechanism.

  18. Research on the system scheme and experiment for the active laser polarization imaging

    NASA Astrophysics Data System (ADS)

    Fu, Qiang; Duan, Jin; Zhao, Rui; Li, Zheng; Zhang, Su; Zhan, Juntong; Zhu, Yong; Jiang, Hui-Lin

    2015-10-01

    The polarization imaging detection technology increased the polarization information on the basis of the intensity imaging, which is extensive application in the military and civil and other fields. The research present and development trend of polarization imaging detection technology was introduce, the system scheme of the active polarization imaging detection was put forward, and the key technologies such as the polarization information detection, optical system design, polarization radiation calibration and image fusion approach was analyzed. On this basis, detection system by existing equipment of laboratory was set up, and on the different materials such as wood, metal, plastic and goal was detected by polarization imaging to realize the active polarization imaging detection. The results show that image contrast of the metal and man-made objects is higher, the polarization effect is better, which provided the basis on the better performance of the polarization imaging instruments.

  19. Psychosocial mediators of change in physical activity in the Welsh national exercise referral scheme: secondary analysis of a randomised controlled trial.

    PubMed

    Littlecott, Hannah J; Moore, Graham F; Moore, Laurence; Murphy, Simon

    2014-08-27

    While an increasing number of randomised controlled trials report impacts of exercise referral schemes (ERS) on physical activity, few have investigated the mechanisms through which increases in physical activity are produced. This study examines whether a National Exercise Referral Scheme (NERS) in Wales is associated with improvements in autonomous motivation, self-efficacy and social support, and whether change in physical activity is mediated by change in these psychosocial processes. A pragmatic randomised controlled trial of NERS across 12 LHBs in Wales. Questionnaires measured demographic data and physical activity at baseline. Participants (N = 2160) with depression, anxiety or CHD risk factors were referred by health professionals and randomly assigned to control or intervention. At six months psychological process measures were collected by questionnaire. At 12 months physical activity was assessed by 7 Day PAR telephone interview. Regressions tested intervention effects on psychosocial variables, physical activity before and after adjusting for mediators and socio demographic patterning. Significant intervention effects were found for autonomous motivation and social support for exercise at 6 months. No intervention effect was observed for self-efficacy. The data are consistent with a hypothesis of partial mediation of the intervention effect by autonomous motivation. Analysis of moderators showed significant improvements in relative autonomy in all subgroups. The greatest improvements in autonomous motivation were observed among patients who were least active at baseline. The present study offered key insights into psychosocial processes of change in an exercise referral scheme, with effects on physical activity mediated by autonomous motivation. Findings support the use of self-determination theory as a framework for ERS. Further research is required to explain socio-demographic patterning in responses to ERS, with changes in motivation occurring among

  20. 'Just another incentive scheme': a qualitative interview study of a local pay-for-performance scheme for primary care.

    PubMed

    Hackett, Julia; Glidewell, Liz; West, Robert; Carder, Paul; Doran, Tim; Foy, Robbie

    2014-10-25

    A range of policy initiatives have addressed inequalities in healthcare and health outcomes. Local pay-for-performance schemes for primary care have been advocated as means of enhancing clinical ownership of the quality agenda and better targeting local need compared with national schemes such as the UK Quality and Outcomes Framework (QOF). We investigated whether professionals' experience of a local scheme in one English National Health Service (NHS) former primary care trust (PCT) differed from that of the national QOF in relation to the goal of reducing inequalities. We conducted retrospective semi-structured interviews with primary care professionals implementing the scheme and those involved in its development. We purposively sampled practices with varying levels of population socio-economic deprivation and achievement. Interviews explored perceptions of the scheme and indicators, likely mechanisms of influence on practice, perceived benefits and harms, and how future schemes could be improved. We used a framework approach to analysis. Thirty-eight professionals from 16 general practices and six professionals involved in developing local indicators participated. Our findings cover four themes: ownership, credibility of the indicators, influences on behaviour, and exacerbated tensions. We found little evidence that the scheme engendered any distinctive sense of ownership or experiences different from the national scheme. Although the indicators and their evidence base were seldom actively questioned, doubts were expressed about their focus on health promotion given that eventual benefits relied upon patient action and availability of local resources. Whilst practices serving more affluent populations reported status and patient benefit as motivators for participating in the scheme, those serving more deprived populations highlighted financial reward. The scheme exacerbated tensions between patient and professional consultation agendas, general practitioners

  1. Seasonal activity and morphological changes in martian gullies

    USGS Publications Warehouse

    Dundas, Colin M.; Diniega, Serina; Hansen, Candice J.; Byrne, Shane; McEwen, Alfred S.

    2012-01-01

    Recent studies of martian dune and non-dune gullies have suggested a seasonal control on present-day gully activity. The timing of current gully activity, especially activity involving the formation or modification of channels (which commonly have been taken as evidence of fluvial processes), has important implications regarding likely gully formation processes and necessary environmental conditions. In this study, we describe the results of frequent meter-scale monitoring of several active gully sites by the High Resolution Imaging Science Experiment (HiRISE) on the Mars Reconnaissance Orbiter (MRO). The aim is to better assess the scope and nature of current morphological changes and to provide improved constraints on timing of gully activity on both dune and non-dune slopes. Our observations indicate that (1) gully formation on Mars is ongoing today and (2) the most significant morphological changes are strongly associated with seasonal frost and defrosting activity. Observed changes include formation of all major components of typical gully landforms, although we have not observed alcove formation in coherent bedrock. These results reduce the need to invoke recent climate change or present-day groundwater seepage to explain the many martian gullies with pristine appearance.

  2. [PICS: pharmaceutical inspection cooperation scheme].

    PubMed

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  3. 10 CFR Appendix B1 to Subpart B of... - Uniform Test Method for Measuring the Energy Consumption of Freezers

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... defrost control. The energy consumption in kilowatt-hours per day shall be calculated equivalent to: ET... though the consumer-activated compartment temperature controls were preset so that the desired... calculated effect of operating a freezer for a period of 24 hours with the consumer-activated controls other...

  4. Frost Growth CFD Model of an Integrated Active Desiccant Rooftop Unit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geoghegan, Patrick J; Petrov, Andrei Y; Vineyard, Edward Allan

    2008-01-01

    A frost growth model is incorporated into a Computational Fluid Dynamics (CFD) simulation of a heat pump by means of a user-defined function in FLUENT, a commercial CFD code. The transient model is applied to the outdoor section of an Integrated Active Desiccant Rooftop (IADR) unit in heating mode. IADR is a hybrid vapor compression and active desiccant unit capable of handling 100% outdoor air (dedicated outdoor air system) or as a total conditioning system, handling both outdoor air and space cooling or heating loads. The predicted increase in flow resistance and loss in heat transfer capacity due to frostmore » build-up are compared to experimental pressure drop readings and thermal imaging. The purpose of this work is to develop a CFD model that is capable of predicting frost growth, an invaluable tool in evaluating the effectiveness of defrost-on-demand cycles.« less

  5. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  6. Room-temperature in situ fabrication of Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced photocatalytic activity

    NASA Astrophysics Data System (ADS)

    He, Rongan; Zhou, Jiaqian; Fu, Huiqing; Zhang, Shiying; Jiang, Chuanjia

    2018-02-01

    Constructing direct Z-scheme heterojunction is an effective approach to separating photogenerated charge carriers and improving the activity of semiconductor photocatalysts. Herein, a composite of bismuth(III) oxide (Bi2O3) and graphitic carbon nitride (g-C3N4) was in situ fabricated at room temperature by photoreductive deposition of Bi3+ and subsequent air-oxidation of the resultant metallic Bi. Quantum-sized ω-Bi2O3 nanoparticles approximately 6 nm in diameter were uniformly distributed on the surface of mesoporous g-C3N4. The as-prepared Bi2O3/g-C3N4 composite exhibited higher photocatalytic activity than pure Bi2O3 and g-C3N4 for photocatalytic degradation of phenol under visible light. Reactive species trapping experiments revealed that superoxide radicals and photogenerated holes played important roles in the photocatalytic degradation of phenol. The enhanced photocatalytic activity, identification of reactive species and higher rate of charge carrier recombination (as indicated by stronger photoluminescence intensity) collectively suggest that the charge migration within the Bi2O3/g-C3N4 composite followed a Z-scheme mechanism. Photogenerated electrons on the conduction band of Bi2O3 migrate to the valence band of g-C3N4 and combine with photogenerated holes therein. At the cost of these less reactive charge carriers, the Z-scheme heterojunction enables efficient charge separation, while preserving the photogenerated electrons and holes with stronger redox abilities, which is beneficial for enhanced photocatalytic activity.

  7. Enhancing visible light photocatalytic activity of direct Z-scheme SnS{sub 2}/Ag{sub 3}PO{sub 4} heterojunction photocatalysts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luo, Jin, E-mail: lj328520504@126.com; Zhou, Xiaosong; Ma, Lin

    Highlights: • Novel direct Z-scheme SnS{sub 2}/Ag{sub 3}PO{sub 4} heterojunction photocatalysts are synthesized. • SnS{sub 2}/Ag{sub 3}PO{sub 4} exhibits much higher photocatalytic activity than pure SnS{sub 2} and Ag{sub 3}PO{sub 4}. • A possible photocatalytic mechanism was discussed in detail. - Abstract: Novel direct Z-scheme SnS{sub 2}/Ag{sub 3}PO{sub 4} heterojunction photocatalysts were successfully fabricated with SnS{sub 2} nanoplates hybridized by Ag{sub 3}PO{sub 4} nanoparticals via a facile hydrothermal and precipitation method and applied for the photocatalytic degradation of methyl orange in aqueous solution under visible light irradiation (λ > 420 nm). It was found that the photocatalytic performance of themore » SnS{sub 2} (2.0 wt%)/Ag{sub 3}PO{sub 4} heterojunction photocatalyst with 2.0 wt% SnS{sub 2} content was much higher than that of individual SnS{sub 2} and Ag{sub 3}PO{sub 4}. The enhanced photocatalytic activity could be ascribed to the efficient separation of photogenerated electrons and holes through the formation of direct Z-scheme system composed of SnS{sub 2} and Ag{sub 3}PO{sub 4}. Furthermore, the recycling experiments revealed that the photocorrosion behavior of Ag{sub 3}PO{sub 4} was strongly inhibited by SnS{sub 2}, it may be due to the photogenerated electrons of Ag{sub 3}PO{sub 4} would be quickly combined with the photogenerated holes of SnS{sub 2}. This work will be useful for the design of other direct Z-scheme visible-light-driven photocatalytic systems for application in energy conversion and environmental remediation.« less

  8. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  9. New Driving Scheme to Improve Hysteresis Characteristics of Organic Thin Film Transistor-Driven Active-Matrix Organic Light Emitting Diode Display

    NASA Astrophysics Data System (ADS)

    Yamamoto, Toshihiro; Nakajima, Yoshiki; Takei, Tatsuya; Fujisaki, Yoshihide; Fukagawa, Hirohiko; Suzuki, Mitsunori; Motomura, Genichi; Sato, Hiroto; Tokito, Shizuo; Fujikake, Hideo

    2011-02-01

    A new driving scheme for an active-matrix organic light emitting diode (AMOLED) display was developed to prevent the picture quality degradation caused by the hysteresis characteristics of organic thin film transistors (OTFTs). In this driving scheme, the gate electrode voltage of a driving-OTFT is directly controlled through the storage capacitor so that the operating point for the driving-OTFT is on the same hysteresis curve for every pixel after signal data are stored in the storage capacitor. Although the number of OTFTs in each pixel for the AMOLED display is restricted because OTFT size should be large enough to drive organic light emitting diodes (OLEDs) due to their small carrier mobility, it can improve the picture quality for an OTFT-driven flexible OLED display with the basic two transistor-one capacitor circuitry.

  10. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    PubMed

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  11. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  12. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  13. 78 FR 41609 - Energy Conservation Program for Consumer Products: Test Procedures for Refrigerators...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    .... Incomplete Cycling 6. Mechanical Temperature Controls 7. Ambient Temperature Gradient 8. Definitions.... at 29846-29847. A broad group of stakeholders \\1\\ submitted a joint comment supporting DOE's proposal... for variable defrost control (a control type in which the time interval between successive defrost...

  14. Pixel-Level Digital-to-Analog Conversion Scheme with Compensation of Thin-Film-Transistor Variations for Compact Integrated Data Drivers of Active Matrix Organic Light Emitting Diodes

    NASA Astrophysics Data System (ADS)

    Kim, Tae-Wook; Park, Sang-Gyu; Choi, Byong-Deok

    2011-03-01

    The previous pixel-level digital-to-analog-conversion (DAC) scheme that implements a part of a DAC in a pixel circuit turned out to be very efficient for reducing the peripheral area of an integrated data driver fabricated with low-temperature polycrystalline silicon thin-film transistors (LTPS TFTs). However, how the pixel-level DAC can be compatible with the existing pixel circuits including compensation schemes of TFT variations and IR drops on supply rails, which is of primary importance for active matrix organic light emitting diodes (AMOLEDs) is an issue in this scheme, because LTPS TFTs suffer from random variations in their characteristics. In this paper, we show that the pixel-level DAC scheme can be successfully used with the previous compensation schemes by giving two examples of voltage- and current-programming pixels. The previous pixel-level DAC schemes require additional two TFTs and one capacitor, but for these newly proposed pixel circuits, the overhead is no more than two TFTs by utilizing the already existing capacitor. In addition, through a detailed analysis, it has been shown that the pixel-level DAC can be expanded to a 4-bit resolution, or be applied together with 1:2 demultiplexing driving for 6- to 8-in. diagonal XGA AMOLED display panels.

  15. Meal box schemes a convenient way to avoid convenience food? Uses and understandings of meal box schemes among Danish consumers.

    PubMed

    Hertz, Frej Daniel; Halkier, Bente

    2017-07-01

    The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. A Suboptimal Power-Saving Transmission Scheme in Multiple Component Carrier Networks

    NASA Astrophysics Data System (ADS)

    Chung, Yao-Liang; Tsai, Zsehong

    Power consumption due to transmissions in base stations (BSs) has been a major contributor to communication-related CO2 emissions. A power optimization model is developed in this study with respect to radio resource allocation and activation in a multiple Component Carrier (CC) environment. We formulate and solve the power-minimization problem of the BS transceivers for multiple-CC networks with carrier aggregation, while maintaining the overall system and respective users' utilities above minimum levels. The optimized power consumption based on this model can be viewed as a lower bound of that of other algorithms employed in practice. A suboptimal scheme with low computation complexity is proposed. Numerical results show that the power consumption of our scheme is much better than that of the conventional one in which all CCs are always active, if both schemes maintain the same required utilities.

  17. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    NASA Astrophysics Data System (ADS)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  18. Understanding the types of fraud in claims to South African medical schemes.

    PubMed

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  19. Study on launch scheme of space-net capturing system.

    PubMed

    Gao, Qingyu; Zhang, Qingbin; Feng, Zhiwei; Tang, Qiangang

    2017-01-01

    With the continuous progress in active debris-removal technology, scientists are increasingly concerned about the concept of space-net capturing system. The space-net capturing system is a long-range-launch flexible capture system, which has great potential to capture non-cooperative targets such as inactive satellites and upper stages. In this work, the launch scheme is studied by experiment and simulation, including two-step ejection and multi-point-traction analyses. The numerical model of the tether/net is based on finite element method and is verified by full-scale ground experiment. The results of the ground experiment and numerical simulation show that the two-step ejection and six-point traction scheme of the space-net system is superior to the traditional one-step ejection and four-point traction launch scheme.

  20. Study on launch scheme of space-net capturing system

    PubMed Central

    Zhang, Qingbin; Feng, Zhiwei; Tang, Qiangang

    2017-01-01

    With the continuous progress in active debris-removal technology, scientists are increasingly concerned about the concept of space-net capturing system. The space-net capturing system is a long-range-launch flexible capture system, which has great potential to capture non-cooperative targets such as inactive satellites and upper stages. In this work, the launch scheme is studied by experiment and simulation, including two-step ejection and multi-point-traction analyses. The numerical model of the tether/net is based on finite element method and is verified by full-scale ground experiment. The results of the ground experiment and numerical simulation show that the two-step ejection and six-point traction scheme of the space-net system is superior to the traditional one-step ejection and four-point traction launch scheme. PMID:28877187

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boreyko, Jonathan B.; Srijanto, Bernadeta R.; Nguyen, Trung Dac

    Water suspended on chilled superhydrophobic surfaces exhibits delayed freezing; however, the interdrop growth of frost through subcooled condensate forming on the surface seems unavoidable in humid environments. It is therefore of great practical importance to determine whether facile defrosting is possible on superhydrophobic surfaces. Here in this paper, we report that nanostructured superhydrophobic surfaces promote the growth of frost in a suspended Cassie state, enabling its dynamic removal upon partial melting at low tilt angles (<15°). The dynamic removal of the melting frost occurred in two stages: spontaneous dewetting followed by gravitational mobilization. This dynamic defrosting phenomenon is driven bymore » the low contact angle hysteresis of the defrosted meltwater relative to frost on microstructured superhydrophobic surfaces, which forms in the impaled Wenzel state. Dynamic defrosting on nanostructured superhydrophobic surfaces minimizes the time, heat, and gravitational energy required to remove frost from the surface, and is of interest for a variety of systems in cold and humid environments.« less

  2. Convergence of generalized MUSCL schemes

    NASA Technical Reports Server (NTRS)

    Osher, S.

    1984-01-01

    Semi-discrete generalizations of the second order extension of Godunov's scheme, known as the MUSCL scheme, are constructed, starting with any three point E scheme. They are used to approximate scalar conservation laws in one space dimension. For convex conservation laws, each member of a wide class is proven to be a convergent approximation to the correct physical solution. Comparison with another class of high resolution convergent schemes is made.

  3. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  4. a Study of Multiplexing Schemes for Voice and Data.

    NASA Astrophysics Data System (ADS)

    Sriram, Kotikalapudi

    Voice traffic variations are characterized by on/off transitions of voice calls, and talkspurt/silence transitions of speakers in conversations. A speaker is known to be in silence for more than half the time during a telephone conversation. In this dissertation, we study some schemes which exploit speaker silences for an efficient utilization of the transmission capacity in integrated voice/data multiplexing and in digital speech interpolation. We study two voice/data multiplexing schemes. In each scheme, any time slots momentarily unutilized by the voice traffic are made available to data. In the first scheme, the multiplexer does not use speech activity detectors (SAD), and hence the voice traffic variations are due to call on/off only. In the second scheme, the multiplexer detects speaker silences using SAD and transmits voice only during talkspurts. The multiplexer with SAD performs digital speech interpolation (DSI) as well as dynamic channel allocation to voice and data. The performance of the two schemes is evaluated using discrete-time modeling and analysis. The data delay performance for the case of English speech is compared with that for the case of Japanese speech. A closed form expression for the mean data message delay is derived for the single-channel single-talker case. In a DSI system, occasional speech losses occur whenever the number of speakers in simultaneous talkspurt exceeds the number of TDM voice channels. In a buffered DSI system, speech loss is further reduced at the cost of delay. We propose a novel fixed-delay buffered DSI scheme. In this scheme, speech fill-in/hangover is not required because there are no variable delays. Hence, all silences that naturally occur in speech are fully utilized. Consequently, a substantial improvement in the DSI performance is made possible. The scheme is modeled and analyzed in discrete -time. Its performance is evaluated in terms of the probability of speech clipping, packet rejection ratio, DSI

  5. Finite spaces and schemes

    NASA Astrophysics Data System (ADS)

    Sancho de Salas, Fernando

    2017-12-01

    A ringed finite space is a ringed space whose underlying topological space is finite. The category of ringed finite spaces contains, fully faithfully, the category of finite topological spaces and the category of affine schemes. Any ringed space, endowed with a finite open covering, produces a ringed finite space. We introduce the notions of schematic finite space and schematic morphism, showing that they behave, with respect to quasi-coherence, like schemes and morphisms of schemes do. Finally, we construct a fully faithful and essentially surjective functor from a localization of a full subcategory of the category of schematic finite spaces and schematic morphisms to the category of quasi-compact and quasi-separated schemes.

  6. A factorial assessment of the sensitivity of the BATS land-surface parameterization scheme. [BATS (Biosphere-Atmosphere Transfer Scheme)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henderson-Sellers, A.

    Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology andmore » (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.« less

  7. Matroids and quantum-secret-sharing schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarvepalli, Pradeep; Raussendorf, Robert

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less

  8. A Memory Efficient Network Encryption Scheme

    NASA Astrophysics Data System (ADS)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  9. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  10. Comparison of different incremental analysis update schemes in a realistic assimilation system with Ensemble Kalman Filter

    NASA Astrophysics Data System (ADS)

    Yan, Y.; Barth, A.; Beckers, J. M.; Brankart, J. M.; Brasseur, P.; Candille, G.

    2017-07-01

    In this paper, three incremental analysis update schemes (IAU 0, IAU 50 and IAU 100) are compared in the same assimilation experiments with a realistic eddy permitting primitive equation model of the North Atlantic Ocean using the Ensemble Kalman Filter. The difference between the three IAU schemes lies on the position of the increment update window. The relevance of each IAU scheme is evaluated through analyses on both thermohaline and dynamical variables. The validation of the assimilation results is performed according to both deterministic and probabilistic metrics against different sources of observations. For deterministic validation, the ensemble mean and the ensemble spread are compared to the observations. For probabilistic validation, the continuous ranked probability score (CRPS) is used to evaluate the ensemble forecast system according to reliability and resolution. The reliability is further decomposed into bias and dispersion by the reduced centred random variable (RCRV) score. The obtained results show that 1) the IAU 50 scheme has the same performance as the IAU 100 scheme 2) the IAU 50/100 schemes outperform the IAU 0 scheme in error covariance propagation for thermohaline variables in relatively stable region, while the IAU 0 scheme outperforms the IAU 50/100 schemes in dynamical variables estimation in dynamically active region 3) in case with sufficient number of observations and good error specification, the impact of IAU schemes is negligible. The differences between the IAU 0 scheme and the IAU 50/100 schemes are mainly due to different model integration time and different instability (density inversion, large vertical velocity, etc.) induced by the increment update. The longer model integration time with the IAU 50/100 schemes, especially the free model integration, on one hand, allows for better re-establishment of the equilibrium model state, on the other hand, smooths the strong gradients in dynamically active region.

  11. Using Steffe's Advanced Fraction Schemes

    ERIC Educational Resources Information Center

    McCloskey, Andrea V.; Norton, Anderson H.

    2009-01-01

    Recognizing schemes, which are different from strategies, can help teachers understand their students' thinking about fractions. Using Steffe's advanced fraction schemes, the authors describe a progression of development that upper elementary and middle school students might follow in understanding fractions. Each scheme can be viewed as a…

  12. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  13. Motives of Log Schemes

    NASA Astrophysics Data System (ADS)

    Howell, Nicholas L.

    This thesis introduces two notions of motive associated to a log scheme. We introduce a category of log motives a la Voevodsky, and prove that the embedding of Voevodsky motives is an equivalence, in particular proving that any homotopy-invariant cohomology theory of schemes extends uniquely to log schemes. In the case of a log smooth degeneration, we give an explicit construction of the motivic Albanese of the degeneration, and show that the Hodge realization of this construction gives the Albanese of the limit Hodge structure.

  14. Students' Whole Number Multiplicative Concepts: A Critical Constructive Resource for Fraction Composition Schemes

    ERIC Educational Resources Information Center

    Hackenberg, Amy J.; Tillema, Erik S.

    2009-01-01

    This article reports on the activity of two pairs of sixth grade students who participated in an 8-month teaching experiment that investigated the students' construction of fraction composition schemes. A fraction composition scheme consists of the operations and concepts used to determine, for example, the size of 1/3 of 1/5 of a whole in…

  15. Tunical Outer Layer Plays an Essential Role in Penile Veno-occlusive Mechanism Evidenced from Electrocautery Effects to the Corpora Cavernosa in Defrosted Human Cadavers.

    PubMed

    Hsieh, Cheng-Hsing; Huang, Yi-Ping; Tsai, Mang-Hung; Chen, Heng-Shen; Huang, Po-Cheng; Lin, Chung-Wu; Hsu, Geng-Long

    2015-12-01

    To determine the exact anatomical structure for establishing penile veno-occlusive function, we sought to conduct a hemodynamic study on defrosted human cadavers. Thirteen penises were used for this experiment, and 11 intact penises were allocated into the electrocautery group (EG, n = 6) and the ligation group (LG, n = 5). A circumcision was made on the penis to access the veins. Two #19 scalp needles were fixed in the 3 and 9 o'clock positions in the distal penis for colloid infusion and intracavernous pressure (ICP) monitoring, respectively. For the EG, the deep dorsal vein and cavernosal vein trunks were freed for 3-5 cm where at least 3 emissary veins were identified via opening Buck's fascia; these veins underwent electrocautery at 45 watts, while the ICP was maintained at 0, 50, 75, 100, 125, and 150 mmHg, respectively. For control, venous ligation was made but at the ICP of 150 mmHg. A tissue block including the emissary vein was then obtained for histological analysis. Except all in the EG and those whose ICP exceed 125 mmHg in the EG, the sinusoids of the corpora cavernosa sustained varied fulgurated fibrosis in every specimen and the severity appeared reversely commensurate with the ICP regarding sinusoidal clumping and darkish bands (P <.02 and .01 respectively). We conclude that the tunica albuginea can prevent the electrocautery damage to intracavernous sinusoids once the ICP reached a level corresponding to a rigid erection. The outer tunica plays an essential role in fulfilling the veno-occlusive mechanism. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  16. In situ polymerization synthesis of Z-scheme tungsten trioxide/polyimide photocatalyst with enhanced visible-light photocatalytic activity

    NASA Astrophysics Data System (ADS)

    Meng, Pengcheng; Heng, Huimin; Sun, Yanhong; Liu, Xia

    2018-01-01

    A novel direct Z-scheme P-containing tungsten trioxide/polyimide (PWO/PI) photocatalyst was synthesized by an in-situ solid-state polymerization strategy to enhance the visible-light photocatalytic oxidation capacity of PI. The effects of polymerization temperature and PWO content on the physicochemical properties of PWO/PI composites and photocatalytic degradation efficiency of imidacloprid were investigated. The photocatalysts were characterized by X-ray powder diffraction, Fourier transformed infrared spectra, X-ray photoelectron spectroscopy, scanning electron microscopy, transmission electron microscopy, UV-vis diffused reflection spectra and N2 adsorption-desorption isothermals. The results showed that the photocatalysts with visible-light photocatalytic activity can already be prepared at 300 °C. The PWO/PI composites exhibited a lamellar structure and PWO was wrapped by PI. After PWO was introduced, there was a significant interaction between PWO and PI, and the visible light response of photocatalysts was also improved. The visible-light photocatalytic degradation efficiency of imidacloprid on 3% PWO/PI-300 composite was about 3.2 times of commercial P25, and the corresponding pseudo-first-order rate constant was about 2.9 times of pristine PI. The Z-scheme photocatalytic system of PWO/PI composites was confirmed by the electron spin resonance technology, terephthalic acid photoluminescence probing technique, reactive species trapping experiments, X-ray photoelectron spectroscopy and photoluminescence of PWO/PI composites and pristine photocatalysts.

  17. Structure of Z-scheme CdS/CQDs/BiOCl heterojunction with enhanced photocatalytic activity for environmental pollutant elimination

    NASA Astrophysics Data System (ADS)

    Pan, Jinbo; Liu, Jianjun; Zuo, Shengli; Khan, Usman Ali; Yu, Yingchun; Li, Baoshan

    2018-06-01

    Z-scheme CdS/CQDs/BiOCl heterojunction was synthesized by a facile region-selective deposition process. Owing to the electronegativity of the groups on the surface of Carbon Quantum Dots (CQDs), they can be sandwiched between CdS and BiOCl, based on the stepwise region-selective deposition process. The samples were systematically characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), high resolution TEM (HRTEM), X-ray photoelectron spectroscopy (XPS), UV-vis diffuse reflectance spectroscopy (UV-vis DRS), photoelectrochemical measurements and photoluminescence (PL). The results indicate that CQDs with size of 2-5 nm and CdS nanoparticles with size of 5-10 nm dispersed uniformly on the surface of cuboid BiOCl nanosheets. The photocatalytic performance tests reveal that the CdS/CQDs/BiOCl heterojunction exhibits much higher photocatalytic activity than that of BiOCl, CdS/BiOCl and CQDs/BiOCl for Rhodamine B (RhB) and phenol photodegradation under visible and UV light illumination, respectively. The enhanced photocatalytic performance should be attributed to the Z-scheme structure of CdS/CQDs/BiOCl, which not only improves visible light absorption and the migration efficiency of the photogenerated electron-holes but also keeps high redox ability of CdS/CQDs/BiOCl composite.

  18. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  19. Syllabic Schemes and Knowledge of the Alphabet in Reading Acquisition: "Onset" or "Nucleus" Variation

    ERIC Educational Resources Information Center

    Díaz-Cárdenas, A. F.; Díaz-Furlong, H. A.; Díaz-Furlong, A.; Sankey-García, M. R.

    2016-01-01

    Although there is a growing consensus that, in reading acquisition, it is essential to provide children with learning activities that promote the development of reading cognitive schemes, particularly intra-syllabic related patterns, there is no agreement on which kind of syllabic schemes should be worked out in the first place. The main aim of…

  20. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  1. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1993-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  2. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  3. Adaptive Packet Combining Scheme in Three State Channel Model

    NASA Astrophysics Data System (ADS)

    Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak

    2018-01-01

    The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.

  4. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  5. Compact Spreader Schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Placidi, M.; Jung, J. -Y.; Ratti, A.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibilitymore » when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.« less

  6. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  7. Does Kaniso activate CASINO?: input coding schemes and phonology in visual-word recognition.

    PubMed

    Acha, Joana; Perea, Manuel

    2010-01-01

    Most recent input coding schemes in visual-word recognition assume that letter position coding is orthographic rather than phonological in nature (e.g., SOLAR, open-bigram, SERIOL, and overlap). This assumption has been drawn - in part - by the fact that the transposed-letter effect (e.g., caniso activates CASINO) seems to be (mostly) insensitive to phonological manipulations (e.g., Perea & Carreiras, 2006, 2008; Perea & Pérez, 2009). However, one could argue that the lack of a phonological effect in prior research was due to the fact that the manipulation always occurred in internal letter positions - note that phonological effects tend to be stronger for the initial syllable (Carreiras, Ferrand, Grainger, & Perea, 2005). To reexamine this issue, we conducted a masked priming lexical decision experiment in which we compared the priming effect for transposed-letter pairs (e.g., caniso-CASINO vs. caviro-CASINO) and for pseudohomophone transposed-letter pairs (kaniso-CASINO vs. kaviro-CASINO). Results showed a transposed-letter priming effect for the correctly spelled pairs, but not for the pseudohomophone pairs. This is consistent with the view that letter position coding is (primarily) orthographic in nature.

  8. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  9. Two-level schemes for the advection equation

    NASA Astrophysics Data System (ADS)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  10. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

    PubMed Central

    Yang, Bin; Zhang, Jianfeng

    2017-01-01

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588

  11. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    PubMed

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  12. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-04-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  13. Ponzi scheme diffusion in complex networks

    NASA Astrophysics Data System (ADS)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  14. Health Professionals' Perspectives on Exercise Referral and Physical Activity Promotion in Primary Care: Findings from a Process Evaluation of the National Exercise Referral Scheme in Wales

    ERIC Educational Resources Information Center

    Din, Nafees U.; Moore, Graham F.; Murphy, Simon; Wilkinson, Clare; Williams, Nefyn H.

    2015-01-01

    Background and objectives: Referring clinicians' experiences of exercise referral schemes (ERS) can provide valuable insights into their uptake. However, most qualitative studies focus on patient views only. This paper explores health professionals' perceptions of their role in promoting physical activity and experiences of a National Exercise…

  15. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Modification of schemes. 167.15...) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.15 Modification of schemes. (a) A traffic separation scheme or precautionary area described in this part may be permanently...

  16. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Modification of schemes. 167.15...) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.15 Modification of schemes. (a) A traffic separation scheme or precautionary area described in this Part may be permanently...

  17. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Modification of schemes. 167.15...) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.15 Modification of schemes. (a) A traffic separation scheme or precautionary area described in this part may be permanently...

  18. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Modification of schemes. 167.15...) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.15 Modification of schemes. (a) A traffic separation scheme or precautionary area described in this part may be permanently...

  19. 33 CFR 167.15 - Modification of schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Modification of schemes. 167.15...) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.15 Modification of schemes. (a) A traffic separation scheme or precautionary area described in this part may be permanently...

  20. Finite difference schemes for long-time integration

    NASA Technical Reports Server (NTRS)

    Haras, Zigo; Taasan, Shlomo

    1993-01-01

    Finite difference schemes for the evaluation of first and second derivatives are presented. These second order compact schemes were designed for long-time integration of evolution equations by solving a quadratic constrained minimization problem. The quadratic cost function measures the global truncation error while taking into account the initial data. The resulting schemes are applicable for integration times fourfold, or more, longer than similar previously studied schemes. A similar approach was used to obtain improved integration schemes.

  1. Simulating complex atomistic processes: On-the-fly kinetic Monte Carlo scheme with selective active volumes

    NASA Astrophysics Data System (ADS)

    Xu, Haixuan; Osetsky, Yury N.; Stoller, Roger E.

    2011-10-01

    An accelerated atomistic kinetic Monte Carlo (KMC) approach for evolving complex atomistic structures has been developed. The method incorporates on-the-fly calculations of transition states (TSs) with a scheme for defining active volumes (AVs) in an off-lattice (relaxed) system. In contrast to conventional KMC models that require all reactions to be predetermined, this approach is self-evolving and any physically relevant motion or reaction may occur. Application of this self-evolving atomistic kinetic Monte Carlo (SEAK-MC) approach is illustrated by predicting the evolution of a complex defect configuration obtained in a molecular dynamics (MD) simulation of a displacement cascade in Fe. Over much longer times, it was shown that interstitial clusters interacting with other defects may change their structure, e.g., from glissile to sessile configuration. The direct comparison with MD modeling confirms the atomistic fidelity of the approach, while the longer time simulation demonstrates the unique capability of the model.

  2. New schemes for internally contracted multi-reference configuration interaction

    NASA Astrophysics Data System (ADS)

    Wang, Yubin; Han, Huixian; Lei, Yibo; Suo, Bingbing; Zhu, Haiyan; Song, Qi; Wen, Zhenyi

    2014-10-01

    In this work we present a new internally contracted multi-reference configuration interaction (MRCI) scheme by applying the graphical unitary group approach and the hole-particle symmetry. The latter allows a Distinct Row Table (DRT) to split into a number of sub-DRTs in the active space. In the new scheme a contraction is defined as a linear combination of arcs within a sub-DRT, and connected to the head and tail of the DRT through up-steps and down-steps to generate internally contracted configuration functions. The new scheme deals with the closed-shell (hole) orbitals and external orbitals in the same manner and thus greatly simplifies calculations of coupling coefficients and CI matrix elements. As a result, the number of internal orbitals is no longer a bottleneck of MRCI calculations. The validity and efficiency of the new ic-MRCI code are tested by comparing with the corresponding WK code of the MOLPRO package. The energies obtained from the two codes are essentially identical, and the computational efficiencies of the two codes have their own advantages.

  3. On central-difference and upwind schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli

    1990-01-01

    A class of numerical dissipation models for central-difference schemes constructed with second- and fourth-difference terms is considered. The notion of matrix dissipation associated with upwind schemes is used to establish improved shock capturing capability for these models. In addition, conditions are given that guarantee that such dissipation models produce a Total Variation Diminishing (TVD) scheme. Appropriate switches for this type of model to ensure satisfaction of the TVD property are presented. Significant improvements in the accuracy of a central-difference scheme are demonstrated by computing both inviscid and viscous transonic airfoil flows.

  4. 7 CFR 1450.11 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...

  5. 7 CFR 1450.11 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...

  6. 7 CFR 1450.11 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...

  7. 7 CFR 1450.11 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...

  8. Student’s scheme in solving mathematics problems

    NASA Astrophysics Data System (ADS)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  9. The Effect of Funding Scheme on the Performance of Navy Repair Activities

    DTIC Science & Technology

    2005-03-01

    and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project... managed to wedge in a thesis review along with his fiscal year end frenzy. The author would also like to thank his wonderful wife, Rita, for the extra...a funding scheme called Navy Working Capital Fund while others in the same region were under the Resource Management System (also referred to as

  10. A Target Coverage Scheduling Scheme Based on Genetic Algorithms in Directional Sensor Networks

    PubMed Central

    Gil, Joon-Min; Han, Youn-Hee

    2011-01-01

    As a promising tool for monitoring the physical world, directional sensor networks (DSNs) consisting of a large number of directional sensors are attracting increasing attention. As directional sensors in DSNs have limited battery power and restricted angles of sensing range, maximizing the network lifetime while monitoring all the targets in a given area remains a challenge. A major technique to conserve the energy of directional sensors is to use a node wake-up scheduling protocol by which some sensors remain active to provide sensing services, while the others are inactive to conserve their energy. In this paper, we first address a Maximum Set Covers for DSNs (MSCD) problem, which is known to be NP-complete, and present a greedy algorithm-based target coverage scheduling scheme that can solve this problem by heuristics. This scheme is used as a baseline for comparison. We then propose a target coverage scheduling scheme based on a genetic algorithm that can find the optimal cover sets to extend the network lifetime while monitoring all targets by the evolutionary global search technique. To verify and evaluate these schemes, we conducted simulations and showed that the schemes can contribute to extending the network lifetime. Simulation results indicated that the genetic algorithm-based scheduling scheme had better performance than the greedy algorithm-based scheme in terms of maximizing network lifetime. PMID:22319387

  11. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  12. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  13. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  14. ID-based encryption scheme with revocation

    NASA Astrophysics Data System (ADS)

    Othman, Hafizul Azrie; Ismail, Eddie Shahril

    2017-04-01

    In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.

  15. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  16. Mediator-free direct Z-scheme photocatalytic system: BiVO4/g-C3N4 organic-inorganic hybrid photocatalyst with highly efficient visible-light-induced photocatalytic activity.

    PubMed

    Tian, Na; Huang, Hongwei; He, Ying; Guo, Yuxi; Zhang, Tierui; Zhang, Yihe

    2015-03-07

    We disclose the fabrication of a mediator-free direct Z-scheme photocatalyst system BiVO4/g-C3N4 using a mixed-calcination method based on the more reliable interfacial interaction. The facet coupling occurred between the g-C3N4 (002) and BiVO4 (121), and it was revealed by X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS) and transmission electron microscope (TEM). The crystal structure and optical properties of the as-prepared samples have also been characterized by Fourier-transform infrared (FTIR), scanning electron microscopy (SEM) and UV-vis diffuse reflectance spectra (DRS) in details. The photocatalytic experiments indicated that the BiVO4/g-C3N4 composite photocatalysts display a significantly enhanced photocatalytic activity pertaining to RhB degradation and photocurrent generation (PC) compared to the pristine BiVO4 and g-C3N4. This remarkably improved photocatalytic performance should be attributed to the fabrication of a direct Z-scheme system of BiVO4/g-C3N4, which can result in a more efficient separation of photoinduced charge carriers than band-band transfer, thus endowing it with the much more powerful oxidation and reduction capability, as confirmed by the photoluminescence (PL) spectra and electrochemical impedance spectra (EIS). The Z-scheme mechanism of BiVO4/g-C3N4 heterostructure was verified by a series of combined techniques, including the active species trapping experiments, NBT transformation and terephthalic acid photoluminescence probing technique (TA-PL) over BiVO4/g-C3N4 composites and the pristine samples. The present work not only furthered the understanding of mediator-free Z-scheme photocatalysis, but also shed new light on the design of heterostructural photocatalysts with high-performance.

  17. Convergence Acceleration for Multistage Time-Stepping Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.

    2006-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.

  18. Well-balanced Schemes for Gravitationally Stratified Media

    NASA Astrophysics Data System (ADS)

    Käppeli, R.; Mishra, S.

    2015-10-01

    We present a well-balanced scheme for the Euler equations with gravitation. The scheme is capable of maintaining exactly (up to machine precision) a discrete hydrostatic equilibrium without any assumption on a thermodynamic variable such as specific entropy or temperature. The well-balanced scheme is based on a local hydrostatic pressure reconstruction. Moreover, it is computationally efficient and can be incorporated into any existing algorithm in a straightforward manner. The presented scheme improves over standard ones especially when flows close to a hydrostatic equilibrium have to be simulated. The performance of the well-balanced scheme is demonstrated on an astrophysically relevant application: a toy model for core-collapse supernovae.

  19. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  20. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  1. New high order schemes in BATS-R-US

    NASA Astrophysics Data System (ADS)

    Toth, G.; van der Holst, B.; Daldorff, L.; Chen, Y.; Gombosi, T. I.

    2013-12-01

    The University of Michigan global magnetohydrodynamics code BATS-R-US has long relied on the block-adaptive mesh refinement (AMR) to increase accuracy in regions of interest, and we used a second order accurate TVD scheme. While AMR can in principle produce arbitrarily accurate results, there are still practical limitations due to computational resources. To further improve the accuracy of the BATS-R-US code, recently, we have implemented a 4th order accurate finite volume scheme (McCorquodale and Colella, 2011}), the 5th order accurate Monotonicity Preserving scheme (MP5, Suresh and Huynh, 1997) and the 5th order accurate CWENO5 scheme (Capdeville, 2008). In the first implementation the high order accuracy is achieved in the uniform parts of the Cartesian grids, and we still use the second order TVD scheme at resolution changes. For spherical grids the new schemes are only second order accurate so far, but still much less diffusive than the TVD scheme. We show a few verification tests that demonstrate the order of accuracy as well as challenging space physics applications. The high order schemes are less robust than the TVD scheme, and it requires some tricks and effort to make the code work. When the high order scheme works, however, we find that in most cases it can obtain similar or better results than the TVD scheme on twice finer grids. For three dimensional time dependent simulations this means that the high order scheme is almost 10 times faster requires 8 times less storage than the second order method.

  2. Notes on two multiparty quantum secret sharing schemes

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    In the paper [H. Abulkasim et al., Int. J. Quantum Inform. 15 (2017) 1750023], Abulkasim et al. proposed a quantum secret sharing scheme based on Bell states. We study the security of the multiparty case in the proposed scheme and detect that it is not secure. In the paper [Y. Du and W. Bao, Opt. Commun. 308 (2013) 159], Du and Bao listed Gao’s scheme and gave a attack strategy on the listed scheme. We point out that their listing scheme is not the genuine Gao’s scheme and their research method is not advisable.

  3. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  4. Multigrid schemes for viscous hypersonic flows

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.

    1993-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving two different hypersonic flow problems. Some new multigrid schemes, based on semicoarsening strategies, are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 x 10(exp 6).

  5. Efficient multiparty quantum-secret-sharing schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao Li; Deng Fuguo; Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] wheremore » all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.« less

  6. Additive schemes for certain operator-differential equations

    NASA Astrophysics Data System (ADS)

    Vabishchevich, P. N.

    2010-12-01

    Unconditionally stable finite difference schemes for the time approximation of first-order operator-differential systems with self-adjoint operators are constructed. Such systems arise in many applied problems, for example, in connection with nonstationary problems for the system of Stokes (Navier-Stokes) equations. Stability conditions in the corresponding Hilbert spaces for two-level weighted operator-difference schemes are obtained. Additive (splitting) schemes are proposed that involve the solution of simple problems at each time step. The results are used to construct splitting schemes with respect to spatial variables for nonstationary Navier-Stokes equations for incompressible fluid. The capabilities of additive schemes are illustrated using a two-dimensional model problem as an example.

  7. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  8. Total Variation Diminishing (TVD) schemes of uniform accuracy

    NASA Technical Reports Server (NTRS)

    Hartwich, PETER-M.; Hsu, Chung-Hao; Liu, C. H.

    1988-01-01

    Explicit second-order accurate finite-difference schemes for the approximation of hyperbolic conservation laws are presented. These schemes are nonlinear even for the constant coefficient case. They are based on first-order upwind schemes. Their accuracy is enhanced by locally replacing the first-order one-sided differences with either second-order one-sided differences or central differences or a blend thereof. The appropriate local difference stencils are selected such that they give TVD schemes of uniform second-order accuracy in the scalar, or linear systems, case. Like conventional TVD schemes, the new schemes avoid a Gibbs phenomenon at discontinuities of the solution, but they do not switch back to first-order accuracy, in the sense of truncation error, at extrema of the solution. The performance of the new schemes is demonstrated in several numerical tests.

  9. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  10. Rapid Parameterization Schemes for Aircraft Shape Optimization

    NASA Technical Reports Server (NTRS)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  11. Developing a contributing factor classification scheme for Rasmussen's AcciMap: Reliability and validity evaluation.

    PubMed

    Goode, N; Salmon, P M; Taylor, N Z; Lenné, M G; Finch, C F

    2017-10-01

    One factor potentially limiting the uptake of Rasmussen's (1997) Accimap method by practitioners is the lack of a contributing factor classification scheme to guide accident analyses. This article evaluates the intra- and inter-rater reliability and criterion-referenced validity of a classification scheme developed to support the use of Accimap by led outdoor activity (LOA) practitioners. The classification scheme has two levels: the system level describes the actors, artefacts and activity context in terms of 14 codes; the descriptor level breaks the system level codes down into 107 specific contributing factors. The study involved 11 LOA practitioners using the scheme on two separate occasions to code a pre-determined list of contributing factors identified from four incident reports. Criterion-referenced validity was assessed by comparing the codes selected by LOA practitioners to those selected by the method creators. Mean intra-rater reliability scores at the system (M = 83.6%) and descriptor (M = 74%) levels were acceptable. Mean inter-rater reliability scores were not consistently acceptable for both coding attempts at the system level (M T1  = 68.8%; M T2  = 73.9%), and were poor at the descriptor level (M T1  = 58.5%; M T2  = 64.1%). Mean criterion referenced validity scores at the system level were acceptable (M T1  = 73.9%; M T2  = 75.3%). However, they were not consistently acceptable at the descriptor level (M T1  = 67.6%; M T2  = 70.8%). Overall, the results indicate that the classification scheme does not currently satisfy reliability and validity requirements, and that further work is required. The implications for the design and development of contributing factors classification schemes are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  13. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  14. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  15. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  16. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  17. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  18. Investigation of nonlinear motion simulator washout schemes

    NASA Technical Reports Server (NTRS)

    Riedel, S. A.; Hofmann, L. G.

    1978-01-01

    An overview is presented of some of the promising washout schemes which have been devised. The four schemes presented fall into two basic configurations; crossfeed and crossproduct. Various nonlinear modifications further differentiate the four schemes. One nonlinear scheme is discussed in detail. This washout scheme takes advantage of subliminal motions to speed up simulator cab centering. It exploits so-called perceptual indifference thresholds to center the simulator cab at a faster rate whenever the input to the simulator is below the perceptual indifference level. The effect is to reduce the angular and translational simulation motion by comparison with that for the linear washout case. Finally, the conclusions and implications for further research in the area of nonlinear washout filters are presented.

  19. A Novel Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Guo, Wei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-05-01

    A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie's delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.

  20. A maternal health voucher scheme: what have we learned from the demand-side financing scheme in Bangladesh?

    PubMed

    Ahmed, Shakil; Khan, M Mahmud

    2011-01-01

    It is now more than 2 years since the Ministry of Health and Family Welfare of the Government of Bangladesh implemented the Maternal Health Voucher Scheme, a specialized form of demand-side financing programme. To analyse the early lessons from the scheme, information was obtained through semi-structured interviews with stakeholders at the sub-district level. The analysis identified a number of factors affecting the efficiency and performance of the scheme in the program area: delay in the release of voucher funds, selection criteria used for enrolling pregnant women in the programme, incentives created by the reimbursement system, etc. One of the objectives of the scheme was to encourage market competition among health care providers, but it failed to increase market competitiveness in the area. The resources made available through the scheme did not attract any new providers into the market and public facilities remained the only eligible provider both before and after scheme implementation. However, incentives provided through the voucher system did motivate public providers to offer a higher level of services. The beneficiaries expressed their overall satisfaction with the scheme as well. Since the local facility was not technically ready to provide all types of maternal health care services, providing vouchers may not improve access to care for many pregnant women. To improve the performance of the demand-side strategy, it has become important to adopt some supply-side interventions. In poor developing countries, a demand-side strategy may not be very effective without significant expansion of the service delivery capacity of health facilities at the sub-district level.

  1. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  2. Defrosting Gully Aprons

    NASA Technical Reports Server (NTRS)

    2003-01-01

    MGS MOC Release No. MOC2-398, 21 June 2003

    This is a late winter Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) picture of frost-covered gullies in a crater in the martian southern hemisphere. The dark spots are areas where the frost has begun to change or sublime away. The gullies are formed by a combination of mass movement (landsliding) and possibly fluid flow through the channels--whether the fluid was liquid water or some other material is unknown. Today, the surfaces are dry and subjected to the seasonal coming-and-going of carbon dioxide frost. The image is located near 71.0oS, 95.5oW. Sunlight illuminates the scene from the upper left.

  3. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-02-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  4. Improvement of a Quantum Proxy Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  5. Optimisation of colour schemes to accurately display mass spectrometry imaging data based on human colour perception.

    PubMed

    Race, Alan M; Bunch, Josephine

    2015-03-01

    The choice of colour scheme used to present data can have a dramatic effect on the perceived structure present within the data. This is of particular significance in mass spectrometry imaging (MSI), where ion images that provide 2D distributions of a wide range of analytes are used to draw conclusions about the observed system. Commonly employed colour schemes are generally suboptimal for providing an accurate representation of the maximum amount of data. Rainbow-based colour schemes are extremely popular within the community, but they introduce well-documented artefacts which can be actively misleading in the interpretation of the data. In this article, we consider the suitability of colour schemes and composite image formation found in MSI literature in the context of human colour perception. We also discuss recommendations of rules for colour scheme selection for ion composites and multivariate analysis techniques such as principal component analysis (PCA).

  6. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  7. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  8. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  9. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  10. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  11. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  12. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  13. Modified Mean-Pyramid Coding Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  14. Hampshire Probation Sports Counselling Scheme.

    ERIC Educational Resources Information Center

    Waldman, Keith

    A sports counseling scheme for young people on criminal probation in Hampshire (England) was developed in the 1980s as a partnership between the Sports Council and the Probation Service. The scheme aims to encourage offenders, aged 14 and up, to make constructive use of their leisure time; to allow participants the opportunity to have positive…

  15. Generalized interpretation scheme for arbitrary HR InSAR image pairs

    NASA Astrophysics Data System (ADS)

    Boldt, Markus; Thiele, Antje; Schulz, Karsten

    2013-10-01

    Land cover classification of remote sensing imagery is an important topic of research. For example, different applications require precise and fast information about the land cover of the imaged scenery (e.g., disaster management and change detection). Focusing on high resolution (HR) spaceborne remote sensing imagery, the user has the choice between passive and active sensor systems. Passive systems, such as multispectral sensors, have the disadvantage of being dependent from weather influences (fog, dust, clouds, etc.) and time of day, since they work in the visible part of the electromagnetic spectrum. Here, active systems like Synthetic Aperture Radar (SAR) provide improved capabilities. As an interactive method analyzing HR InSAR image pairs, the CovAmCohTM method was introduced in former studies. CovAmCoh represents the joint analysis of locality (coefficient of variation - Cov), backscatter (amplitude - Am) and temporal stability (coherence - Coh). It delivers information on physical backscatter characteristics of imaged scene objects or structures and provides the opportunity to detect different classes of land cover (e.g., urban, rural, infrastructure and activity areas). As example, railway tracks are easily distinguishable from other infrastructure due to their characteristic bluish coloring caused by the gravel between the sleepers. In consequence, imaged objects or structures have a characteristic appearance in CovAmCoh images which allows the development of classification rules. In this paper, a generalized interpretation scheme for arbitrary InSAR image pairs using the CovAmCoh method is proposed. This scheme bases on analyzing the information content of typical CovAmCoh imagery using the semisupervised k-means clustering. It is shown that eight classes model the main local information content of CovAmCoh images sufficiently and can be used as basis for a classification scheme.

  16. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  17. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  18. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  19. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  20. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  1. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  2. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  3. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  4. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  5. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  6. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  7. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  8. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  9. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  10. Investigating the scale-adaptivity of a shallow cumulus parameterization scheme with LES

    NASA Astrophysics Data System (ADS)

    Brast, Maren; Schemann, Vera; Neggers, Roel

    2017-04-01

    In this study we investigate the scale-adaptivity of a new parameterization scheme for shallow cumulus clouds in the gray zone. The Eddy-Diffusivity Multiple Mass-Flux (or ED(MF)n ) scheme is a bin-macrophysics scheme, in which subgrid transport is formulated in terms of discretized size densities. While scale-adaptivity in the ED-component is achieved using a pragmatic blending approach, the MF-component is filtered such that only the transport by plumes smaller than the grid size is maintained. For testing, ED(MF)n is implemented in a large-eddy simulation (LES) model, replacing the original subgrid-scheme for turbulent transport. LES thus plays the role of a non-hydrostatic testing ground, which can be run at different resolutions to study the behavior of the parameterization scheme in the boundary-layer gray zone. In this range convective cumulus clouds are partially resolved. We find that at high resolutions the clouds and the turbulent transport are predominantly resolved by the LES, and the transport represented by ED(MF)n is small. This partitioning changes towards coarser resolutions, with the representation of shallow cumulus clouds becoming exclusively carried by the ED(MF)n. The way the partitioning changes with grid-spacing matches the results of previous LES studies, suggesting some scale-adaptivity is captured. Sensitivity studies show that a scale-inadaptive ED component stays too active at high resolutions, and that the results are fairly insensitive to the number of transporting updrafts in the ED(MF)n scheme. Other assumptions in the scheme, such as the distribution of updrafts across sizes and the value of the area fraction covered by updrafts, are found to affect the location of the gray zone.

  11. New, Improved Bulk-microphysical Schemes for Studying Precipitation Processes in WRF. Part 1; Comparisons with Other Schemes

    NASA Technical Reports Server (NTRS)

    Tao, W.-K.; Shi, J.; Chen, S. S> ; Lang, S.; Hong, S.-Y.; Thompson, G.; Peters-Lidard, C.; Hou, A.; Braun, S.; hide

    2007-01-01

    Advances in computing power allow atmospheric prediction models to be mn at progressively finer scales of resolution, using increasingly more sophisticated physical parameterizations and numerical methods. The representation of cloud microphysical processes is a key component of these models, over the past decade both research and operational numerical weather prediction models have started using more complex microphysical schemes that were originally developed for high-resolution cloud-resolving models (CRMs). A recent report to the United States Weather Research Program (USWRP) Science Steering Committee specifically calls for the replacement of implicit cumulus parameterization schemes with explicit bulk schemes in numerical weather prediction (NWP) as part of a community effort to improve quantitative precipitation forecasts (QPF). An improved Goddard bulk microphysical parameterization is implemented into a state-of the-art of next generation of Weather Research and Forecasting (WRF) model. High-resolution model simulations are conducted to examine the impact of microphysical schemes on two different weather events (a midlatitude linear convective system and an Atllan"ic hurricane). The results suggest that microphysics has a major impact on the organization and precipitation processes associated with a summer midlatitude convective line system. The 31CE scheme with a cloud ice-snow-hail configuration led to a better agreement with observation in terms of simulated narrow convective line and rainfall intensity. This is because the 3ICE-hail scheme includes dense ice precipitating (hail) particle with very fast fall speed (over 10 m/s). For an Atlantic hurricane case, varying the microphysical schemes had no significant impact on the track forecast but did affect the intensity (important for air-sea interaction)

  12. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  13. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  14. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  15. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  16. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  17. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  18. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  19. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  20. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  1. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  2. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  3. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  4. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  5. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  6. 7 CFR 625.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  7. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  8. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  9. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  10. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  11. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  12. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  13. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  14. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  15. National mental health programme: Manpower development scheme of eleventh five-year plan.

    PubMed

    Sinha, Suman K; Kaur, Jagdish

    2011-07-01

    Mental disorders impose a massive burden in the society. The National Mental Health Programme (NMHP) is being implemented by the Government of India to support state governments in providing mental health services in the country. India is facing shortage of qualified mental health manpower for District Mental Health Programme (DMHP) in particular and for the whole mental health sector in general. Recognizing this key constraint Government of India has formulated manpower development schemes under NMHP to address this issue. Under the scheme 11 centers of excellence in mental health, 120 PG departments in mental health specialties, upgradation of psychiatric wings of medical colleges, modernization of state-run mental hospitals will be supported. The expected outcome of the Manpower Development schemes is 104 psychiatrists, 416 clinical psychologists, 416 PSWs and 820 psychiatric nurses annually once these institutes/ departments are established. Together with other components such as DMHP with added services, Information, education and communication activities, NGO component, dedicated monitoring mechanism, research and training, this scheme has the potential to make a facelift of the mental health sector in the country which is essentially dependent on the availability and equitable distribution mental health manpower in the country.

  16. National mental health programme: Manpower development scheme of eleventh five-year plan

    PubMed Central

    Sinha, Suman K.; Kaur, Jagdish

    2011-01-01

    Mental disorders impose a massive burden in the society. The National Mental Health Programme (NMHP) is being implemented by the Government of India to support state governments in providing mental health services in the country. India is facing shortage of qualified mental health manpower for District Mental Health Programme (DMHP) in particular and for the whole mental health sector in general. Recognizing this key constraint Government of India has formulated manpower development schemes under NMHP to address this issue. Under the scheme 11 centers of excellence in mental health, 120 PG departments in mental health specialties, upgradation of psychiatric wings of medical colleges, modernization of state-run mental hospitals will be supported. The expected outcome of the Manpower Development schemes is 104 psychiatrists, 416 clinical psychologists, 416 PSWs and 820 psychiatric nurses annually once these institutes/ departments are established. Together with other components such as DMHP with added services, Information, education and communication activities, NGO component, dedicated monitoring mechanism, research and training, this scheme has the potential to make a facelift of the mental health sector in the country which is essentially dependent on the availability and equitable distribution mental health manpower in the country. PMID:22135448

  17. Secure Wake-Up Scheme for WBANs

    NASA Astrophysics Data System (ADS)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  18. Finite-volume scheme for anisotropic diffusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Es, Bram van, E-mail: bramiozo@gmail.com; FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands"1; Koren, Barry

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  19. Development of a new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    The use of a new splitting scheme, the advection upstream splitting method, for model aerodynamic problems where Van Leer and Roe schemes had failed previously is discussed. The present scheme is based on splitting in which the convective and pressure terms are separated and treated differently depending on the underlying physical conditions. The present method is found to be both simple and accurate.

  20. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  1. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  2. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  3. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  4. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  5. Recovery Schemes for Primitive Variables in General-relativistic Magnetohydrodynamics

    NASA Astrophysics Data System (ADS)

    Siegel, Daniel M.; Mösta, Philipp; Desai, Dhruv; Wu, Samantha

    2018-05-01

    General-relativistic magnetohydrodynamic (GRMHD) simulations are an important tool to study a variety of astrophysical systems such as neutron star mergers, core-collapse supernovae, and accretion onto compact objects. A conservative GRMHD scheme numerically evolves a set of conservation equations for “conserved” quantities and requires the computation of certain primitive variables at every time step. This recovery procedure constitutes a core part of any conservative GRMHD scheme and it is closely tied to the equation of state (EOS) of the fluid. In the quest to include nuclear physics, weak interactions, and neutrino physics, state-of-the-art GRMHD simulations employ finite-temperature, composition-dependent EOSs. While different schemes have individually been proposed, the recovery problem still remains a major source of error, failure, and inefficiency in GRMHD simulations with advanced microphysics. The strengths and weaknesses of the different schemes when compared to each other remain unclear. Here we present the first systematic comparison of various recovery schemes used in different dynamical spacetime GRMHD codes for both analytic and tabulated microphysical EOSs. We assess the schemes in terms of (i) speed, (ii) accuracy, and (iii) robustness. We find large variations among the different schemes and that there is not a single ideal scheme. While the computationally most efficient schemes are less robust, the most robust schemes are computationally less efficient. More robust schemes may require an order of magnitude more calls to the EOS, which are computationally expensive. We propose an optimal strategy of an efficient three-dimensional Newton–Raphson scheme and a slower but more robust one-dimensional scheme as a fall-back.

  6. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  7. Implicit Space-Time Conservation Element and Solution Element Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda; Wang, Xiao-Yen

    1999-01-01

    Artificial numerical dissipation is in important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate implicit numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The new schemes presented are two highly accurate implicit solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to convection-dominated equations with very small viscosity. The stability and consistency of the schemes are analysed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme.

  8. Parallel discrete-event simulation schemes with heterogeneous processing elements.

    PubMed

    Kim, Yup; Kwon, Ikhyun; Chae, Huiseung; Yook, Soon-Hyung

    2014-07-01

    To understand the effects of nonidentical processing elements (PEs) on parallel discrete-event simulation (PDES) schemes, two stochastic growth models, the restricted solid-on-solid (RSOS) model and the Family model, are investigated by simulations. The RSOS model is the model for the PDES scheme governed by the Kardar-Parisi-Zhang equation (KPZ scheme). The Family model is the model for the scheme governed by the Edwards-Wilkinson equation (EW scheme). Two kinds of distributions for nonidentical PEs are considered. In the first kind computing capacities of PEs are not much different, whereas in the second kind the capacities are extremely widespread. The KPZ scheme on the complex networks shows the synchronizability and scalability regardless of the kinds of PEs. The EW scheme never shows the synchronizability for the random configuration of PEs of the first kind. However, by regularizing the arrangement of PEs of the first kind, the EW scheme is made to show the synchronizability. In contrast, EW scheme never shows the synchronizability for any configuration of PEs of the second kind.

  9. A cascaded coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Shu, L.; Kasami, T.

    1985-01-01

    A cascade coding scheme for error control is investigated. The scheme employs a combination of hard and soft decisions in decoding. Error performance is analyzed. If the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit-error-rate. Some example schemes are evaluated. They seem to be quite suitable for satellite down-link error control.

  10. A cascaded coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Lin, S.

    1985-01-01

    A cascaded coding scheme for error control was investigated. The scheme employs a combination of hard and soft decisions in decoding. Error performance is analyzed. If the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit-error-rate. Some example schemes are studied which seem to be quite suitable for satellite down-link error control.

  11. Simulation of the Australian Mobilesat signalling scheme

    NASA Technical Reports Server (NTRS)

    Rahman, Mushfiqur

    1990-01-01

    The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.

  12. Development of a new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    The successful use of a novel splitting scheme, the advection upstream splitting method, for model aerodynamic problems where Van Leer and Roe schemes had failed previously is discussed. The present scheme is based on splitting in which the convective and pressure terms are separated and treated differently depending on the underlying physical conditions. The present method is found to be both simple and accurate.

  13. Standardization of 64Cu using an improved decay scheme

    NASA Astrophysics Data System (ADS)

    Amiot, M. N.; Bé, M. M.; Branger, T.; Cassette, P.; Lépy, M. C.; Ménesguen, Y.; Da Silva, I.

    2012-08-01

    A 64Cu solution was standardized by means of liquid scintillation counting. The activity of the solution was also determined with an ionization chamber whose response was simulated by using a Monte Carlo code. The photon emission intensities including K X-rays were determined to be I511=35.1 (3)%; I1346=0.472 (12)%, IKα=14.41 (15)%, IKβ=2.01 (3)%, respectively. 64Cu half-life was also determined as 12.718 (23) h. The new decay scheme used in the present work was established following the EURAMET 1085 exercise where a good agreement between activity measurement techniques was found.

  14. The effects of residual platelets in plasma on plasminogen activator inhibitor-1 and plasminogen activator inhibitor-1-related assays.

    PubMed

    Pieters, Marlien; Barnard, Sunelle A; Loots, Du Toit; Rijken, Dingeman C

    2017-01-01

    Due to controversial evidence in the literature pertaining to the activity of plasminogen activator inhibitor-1 in platelets, we examined the effects of residual platelets present in plasma (a potential pre-analytical variable) on various plasminogen activator inhibitor-1 and plasminogen activator inhibitor-1-related assays. Blood samples were collected from 151 individuals and centrifuged at 352 and 1500 g to obtain plasma with varying numbers of platelet. In a follow-up study, blood samples were collected from an additional 23 individuals, from whom platelet-poor (2000 g), platelet-containing (352 g) and platelet-rich plasma (200 g) were prepared and analysed as fresh-frozen and after five defrost-refreeze cycles (to determine the contribution of in vitro platelet degradation). Plasminogen activator inhibitor-1 activity, plasminogen activator inhibitor-1 antigen, tissue plasminogen activator/plasminogen activator inhibitor-1 complex, plasma clot lysis time, β-thromboglobulin and plasma platelet count were analysed. Platelet α-granule release (plasma β-thromboglobulin) showed a significant association with plasminogen activator inhibitor-1 antigen levels but weak associations with plasminogen activator inhibitor-1 activity and a functional marker of fibrinolysis, clot lysis time. Upon dividing the study population into quartiles based on β-thromboglobulin levels, plasminogen activator inhibitor-1 antigen increased significantly across the quartiles while plasminogen activator inhibitor-1 activity and clot lysis time tended to increase in the 4th quartile only. In the follow-up study, plasma plasminogen activator inhibitor-1 antigen was also significantly influenced by platelet count in a concentration-dependent manner. Plasma plasminogen activator inhibitor-1 antigen levels increased further after complete platelet degradation. Residual platelets in plasma significantly influence plasma plasminogen activator inhibitor-1 antigen levels mainly through release of

  15. A modified symplectic PRK scheme for seismic wave modeling

    NASA Astrophysics Data System (ADS)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  16. Finite Difference Schemes as Algebraic Correspondences between Layers

    NASA Astrophysics Data System (ADS)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  17. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme.

    PubMed

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved.

  18. Service Evaluation of an Exercise on Referral Scheme for Adults with Existing Health Conditions in the United Kingdom.

    PubMed

    McGeechan, Grant J; Phillips, Dawn; Wilson, Lynn; Whittaker, Vicki J; O'Neill, Gillian; Newbury-Birch, Dorothy

    2018-06-01

    This paper outlines a service evaluation of an exercise referral scheme for adults suffering from a variety of physical or mental health conditions or who were deemed are at risk of developing such conditions. The evaluation aimed to assess the impact of the scheme at increasing physical activity and at reducing BMI and waist circumference. This was a retrospective evaluation looking at levels of physical activity and changes to anthropometric measures over a period of 6 months. Each participant self-reported their levels of physical activity for the previous 7 days at three time points: baseline (T1), at 12-week exit from the scheme (T2), and at 6-month follow-up (T3). Waist circumference and BMI were also recorded by either a health professional or self-reported at these time points. Six hundred seventy participants were referred during the evaluation period, of whom 494 were eligible. Of those 494, 211 completed the 12-week scheme and 135 completed a 6-month follow-up. Significant increases in levels of physical activity were recorded between T1 and T2 and between T1 and T3. Furthermore, significant reductions in waist circumference were noted between T1 and T2 and between T1 and T3, and BMI significantly decreased between T1 and T2 but significantly increased between T2 and T3. The service has proven effective at increasing levels of physical activity among participants and has had a positive impact on waist circumference and body for clients who remain engaged with the programme.

  19. Factorizable Upwind Schemes: The Triangular Unstructured Grid Formulation

    NASA Technical Reports Server (NTRS)

    Sidilkover, David; Nielsen, Eric J.

    2001-01-01

    The upwind factorizable schemes for the equations of fluid were introduced recently. They facilitate achieving the Textbook Multigrid Efficiency (TME) and are expected also to result in the solvers of unparalleled robustness. The approach itself is very general. Therefore, it may well become a general framework for the large-scale, Computational Fluid Dynamics. In this paper we outline the triangular grid formulation of the factorizable schemes. The derivation is based on the fact that the factorizable schemes can be expressed entirely using vector notation. without explicitly mentioning a particular coordinate frame. We, describe the resulting discrete scheme in detail and present some computational results verifying the basic properties of the scheme/solver.

  20. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  1. The New Zealand accident compensation scheme.

    PubMed

    Barter, R W

    1977-05-01

    Reference is made to legislation concerned with the introduction of the New Zealand Accident Compensation Scheme in 1974. The author's experience of the Scheme is based on an exchange visit in 1975. The basic principles are community responsibility and universal entitlement to compensation. Earnings-related benefits are paid to the injured person, and flat-rate payments to non-earners. The Scheme is administered by a three-man Commission with wide responsibilities for accident prevention, rehabilitation services, administration of funds, records, public relations, and an independent Appeals Authority. There have been far reaching consequences on medical practice. The Commission construe the phrase 'Personal Injury by Accident' as damage to the human system which is not designed by the person injured: the implications of such a definition are briefly discussed. The administrative costs of any similar Scheme in the United Kingdom would be enormous and it is doubtful whether the benefits would justify the cost.

  2. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  3. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  4. Rigorous-two-Steps scheme of TRIPOLI-4® Monte Carlo code validation for shutdown dose rate calculation

    NASA Astrophysics Data System (ADS)

    Jaboulay, Jean-Charles; Brun, Emeric; Hugot, François-Xavier; Huynh, Tan-Dat; Malouch, Fadhel; Mancusi, Davide; Tsilanizara, Aime

    2017-09-01

    After fission or fusion reactor shutdown the activated structure emits decay photons. For maintenance operations the radiation dose map must be established in the reactor building. Several calculation schemes have been developed to calculate the shutdown dose rate. These schemes are widely developed in fusion application and more precisely for the ITER tokamak. This paper presents the rigorous-two-steps scheme implemented at CEA. It is based on the TRIPOLI-4® Monte Carlo code and the inventory code MENDEL. The ITER shutdown dose rate benchmark has been carried out, results are in a good agreement with the other participant.

  5. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks.

    PubMed

    Al Ameen, Moshaddique; Hong, Choong Seon

    2015-12-04

    The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  6. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks

    PubMed Central

    Al Ameen, Moshaddique; Hong, Choong Seon

    2015-01-01

    The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime. PMID:26690161

  7. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  8. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme

    PubMed Central

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved. PMID:29432435

  9. Evaluation of the end user (dentist) experience of undertaking clinical audit in the post April 2001 general dental services (GDS) scheme.

    PubMed

    Cannell, P J

    2012-09-01

    A mandatory scheme for clinical audit in the general dental services (GDS) was launched in April 2001. No evaluation of this mandatory scheme exists in the literature. This study provides an evaluation of this scheme. More recently a new dental contract was introduced in the general dental services (GDS) in April 2006. Responsibility for clinical audit activities was devolved to primary care trusts (PCTs) as part of their clinical governance remit. All GDPs within Essex were contacted by letter and invited to participate in the research. A qualitative research method was selected for this evaluation, utilising audio-taped semi-structured research interviews with eight general dental practitioners (GDPs) who had taken part in the GDS clinical audit scheme and who fitted the sampling criteria and strategy. The evaluation focused on dentists' experiences of the scheme. The main findings from the analysis of the GDS scheme data suggest that there is clear evidence of change following audit activities occurring within practices and for the benefit of patients. However, often it is the dentist only that undertakes a clinical audit project rather than the dental team, there is a lack of dissemination of project findings beyond the individual participating practices, very little useful feedback provided to participants who have completed a project and very limited use of formal re-auditing of a particular topic. This study provides evaluation of the GDS clinical audit scheme. Organisations who propose to undertake clinical audit activities in conjunction with dentistry in the future may benefit from incorporating and/or developing some findings from this evaluation into their project design and avoiding others.

  10. Study for new hardmask process scheme

    NASA Astrophysics Data System (ADS)

    Lee, Daeyoup; Tatti, Phillip; Lee, Richard; Chang, Jack; Cho, Winston; Bae, Sanggil

    2017-03-01

    Hardmask processes are a key technique to enable low-k semiconductors, but they can have an impact on patterning control, influencing defectivity, alignment, and overlay. Specifically, amorphous carbon layer (ACL) hardmask schemes can negatively affect overlay by creating distorted alignment signals. A new scheme needs to be developed that can be inserted where amorphous carbon is used but provide better alignment performance. Typical spin-on carbon (SOC) materials used in other hardmask schemes have issues with DCD-FCD skew. In this paper we will evaluate new spin-on carbon material with a higher carbon content that could be a candidate to replace amorphous carbon.

  11. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  12. Programming scheme based optimization of hybrid 4T-2R OxRAM NVSRAM

    NASA Astrophysics Data System (ADS)

    Majumdar, Swatilekha; Kingra, Sandeep Kaur; Suri, Manan

    2017-09-01

    In this paper, we present a novel single-cycle programming scheme for 4T-2R NVSRAM, exploiting pulse engineered input signals. OxRAM devices based on 3 nm thick bi-layer active switching oxide and 90 nm CMOS technology node were used for all simulations. The cell design is implemented for real-time non-volatility rather than last-bit, or power-down non-volatility. Detailed analysis of the proposed single-cycle, parallel RRAM device programming scheme is presented in comparison to the two-cycle sequential RRAM programming used for similar 4T-2R NVSRAM bit-cells. The proposed single-cycle programming scheme coupled with the 4T-2R architecture leads to several benefits such as- possibility of unconventional transistor sizing, 50% lower latency, 20% improvement in SNM and ∼20× reduced energy requirements, when compared against two-cycle programming approach.

  13. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  14. Comparison of two SVD-based color image compression schemes.

    PubMed

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR.

  15. Comparison of two SVD-based color image compression schemes

    PubMed Central

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR. PMID:28257451

  16. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.800-2 Section 75.800-2 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the...

  17. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  18. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  19. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  20. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  1. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Approved circuit schemes. 75.800-2 Section 75.800-2 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the...

  2. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  3. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.800-2 Section 75.800-2 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the...

  4. MIMO transmit scheme based on morphological perceptron with competitive learning.

    PubMed

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  6. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  7. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  8. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  9. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  10. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  11. Analysis of a Teacher's Pedagogical Arguments Using Toulmin's Model and Argumentation Schemes

    ERIC Educational Resources Information Center

    Metaxas, N.; Potari, D.; Zachariades, T.

    2016-01-01

    In this article, we elaborate methodologies to study the argumentation speech of a teacher involved in argumentative activities. The standard tool of analysis of teachers' argumentation concerning pedagogical matters is Toulmin's model. The theory of argumentation schemes offers an alternative perspective on the analysis of arguments. We propose…

  12. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  13. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    DOE PAGES

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    2016-01-01

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  14. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  15. Coupling WRF Double-Moment 6-Class Microphysics Schemes to RRTMG Radiation Scheme in Weather Research Forecasting Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bae, Soo Ya; Hong, Song-You; Lim, Kyo-Sun Sunny

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. A spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  16. Evolutional schemes for objects with active nuclei

    NASA Technical Reports Server (NTRS)

    Komberg, B. V.

    1979-01-01

    The observational properties of quasistellar objects (QSO) reveal that they are extremely violent nuclei of distant galaxies, but the evolutionary stage of these galaxies is still undetermined. Various published attempts to classify QSO under different criteria - including the one based on the morphological type of the surrounding galaxy E- or S- are analyzed. There are evidences that radioactive quasars reside in E-, while radio-quiet quasars reside in both E- and S- systems. The latter may be evolutionary connected to Seyfert-like objects. A correlation between the nuclei activity level in systems of different morphological type and the relative amount of gas in them is noted. From the point of view of activity level and the duration of active stage of nuclei it is concluded that an interaction of galaxies with the intergalactic medium is of particular importance and must be most conspicuous in spheriodal systems of central regions of rich clusters, in tight groups and binary galaxies.

  17. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  18. A Two-Timescale Discretization Scheme for Collocation

    NASA Technical Reports Server (NTRS)

    Desai, Prasun; Conway, Bruce A.

    2004-01-01

    The development of a two-timescale discretization scheme for collocation is presented. This scheme allows a larger discretization to be utilized for smoothly varying state variables and a second finer discretization to be utilized for state variables having higher frequency dynamics. As such. the discretization scheme can be tailored to the dynamics of the particular state variables. In so doing. the size of the overall Nonlinear Programming (NLP) problem can be reduced significantly. Two two-timescale discretization architecture schemes are described. Comparison of results between the two-timescale method and conventional collocation show very good agreement. Differences of less than 0.5 percent are observed. Consequently. a significant reduction (by two-thirds) in the number of NLP parameters and iterations required for convergence can be achieved without sacrificing solution accuracy.

  19. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Fujiwara, T.; Lin, S.

    1986-01-01

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error (or decoding error) of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughput efficiency of the proposed error control scheme incorporated with a selective-repeat ARQ retransmission strategy is also analyzed. Three specific examples are presented. One of the examples is proposed for error control in the NASA Telecommand System.

  20. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  1. Explicit Von Neumann Stability Conditions for the c-tau Scheme: A Basic Scheme in the Development of the CE-SE Courant Number Insensitive Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung

    2005-01-01

    As part of the continuous development of the space-time conservation element and solution element (CE-SE) method, recently a set of so call ed "Courant number insensitive schemes" has been proposed. The key advantage of these new schemes is that the numerical dissipation associa ted with them generally does not increase as the Courant number decre ases. As such, they can be applied to problems with large Courant number disparities (such as what commonly occurs in Navier-Stokes problem s) without incurring excessive numerical dissipation.

  2. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    NASA Astrophysics Data System (ADS)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  3. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  4. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  5. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    PubMed

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  6. An improved biometrics-based remote user authentication scheme with user anonymity.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  7. Observations of the north polar water ice annulus on Mars using THEMIS and TES

    USGS Publications Warehouse

    Wagstaff, K.L.; Titus, T.N.; Ivanov, A.B.; Castano, R.; Bandfield, J.L.

    2008-01-01

    The Martian seasonal CO2 ice caps advance and retreat each year. In the spring, as the CO2 cap gradually retreats, it leaves behind an extensive defrosting zone from the solid CO2 cap to the location where all CO2 frost has sublimated. We have been studying this phenomenon in the north polar region using data from the THermal EMission Imaging System (THEMIS), a visible and infra-red (IR) camera on the Mars Odyssey spacecraft, and the Thermal Emission Spectrometer (TES) on Mars Global Surveyor. Recently, we discovered that some THEMIS images of the CO2 defrosting zone contain evidence for a distinct defrosting phenomenon: some areas just south of the CO2 cap edge are too bright in visible wavelengths to be defrosted terrain, but too warm in the IR to be CO2 ice. We hypothesize that we are seeing evidence for a seasonal annulus of water ice (frost) that recedes with the seasonal CO2 cap, as predicted by previous workers. In this paper, we describe our observations with THEMIS and compare them to simultaneous observations by TES and OMEGA. All three instruments find that this phenomenon is distinct from the CO2 cap and most likely composed of water ice. We also find strong evidence that the annulus widens as it recedes. Finally, we show that this annulus can be detected in the raw THEMIS data as it is collected, enabling future long-term onboard monitoring. ?? 2007.

  8. Research on multi-user encrypted search scheme in cloud environment

    NASA Astrophysics Data System (ADS)

    Yu, Zonghua; Lin, Sui

    2017-05-01

    Aiming at the existing problems of multi-user encrypted search scheme in cloud computing environment, a basic multi-user encrypted scheme is proposed firstly, and then the basic scheme is extended to an anonymous hierarchical management authority. Compared with most of the existing schemes, the scheme not only to achieve the protection of keyword information, but also to achieve the protection of user identity privacy; the same time, data owners can directly control the user query permissions, rather than the cloud server. In addition, through the use of a special query key generation rules, to achieve the hierarchical management of the user's query permissions. The safety analysis shows that the scheme is safe and that the performance analysis and experimental data show that the scheme is practicable.

  9. Dropping out of Ethiopia's community-based health insurance scheme.

    PubMed

    Mebratie, Anagaw D; Sparrow, Robert; Yilma, Zelalem; Alemu, Getnet; Bedi, Arjun S

    2015-12-01

    Low contract renewal rates have been identified as one of the challenges facing the development of community-based health insurance (CBHI) schemes. This article uses longitudinal household survey data gathered in 2012 and 2013 to examine dropout in the case of Ethiopia's pilot CBHI scheme. We treat dropout as a function of scheme affordability, health status, scheme understanding and quality of care. The scheme saw enrolment increase from 41% 1 year after inception to 48% a year later. An impressive 82% of those who enrolled in the first year renewed their subscriptions, while 25% who had not enrolled joined the scheme. The analysis shows that socioeconomic status, a greater understanding of health insurance and experience with and knowledge of the CBHI scheme are associated with lower dropout rates. While there are concerns about the quality of care and the treatment meted out to the insured by providers, the overall picture is that returns from the scheme are overwhelmingly positive. For the bulk of households, premiums do not seem to be onerous, basic understanding of health insurance is high and almost all those who are currently enrolled signalled their desire to renew contracts. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2015; all rights reserved.

  10. Maternal healthcare financing: Gujarat's Chiranjeevi Scheme and its beneficiaries.

    PubMed

    Bhat, Ramesh; Mavalankar, Dileep V; Singh, Prabal V; Singh, Neelu

    2009-04-01

    Maternal mortality is an important public-health issue in India, specifically in Gujarat. Contributing factors are the Government's inability to operationalize the First Referral Units and to provide an adequate level of skilled birth attendants, especially to the poor. In response, the Gujarat state has developed a unique public-private partnership called the Chiranjeevi Scheme. This scheme focuses on institutional delivery, specifically emergency obstetric care for the poor. The objective of the study was to explore the targeting of the scheme, its coverage, and socioeconomic profile of the beneficiaries and to assess financial protection offered by the scheme, if any, in Dahod, one of the initial pilot districts of Gujarat. A household-level survey of beneficiaries (n=262) and non-users (n=394) indicated that the scheme is well-targeted to the poor but many poor people do not use the services. The beneficiaries saved more than Rs 3000 (US$ 75) in delivery-related expenses and were generally satisfied with the scheme. The study provided insights on how to improve the scheme further. Such a financing scheme could be replicated in other states and countries to address the cost barrier, especially in areas where high numbers of private specialists are available.

  11. Comparison of the AUSM(+) and H-CUSP Schemes for Turbomachinery Applications

    NASA Technical Reports Server (NTRS)

    Chima, Rodrick V.; Liou, Meng-Sing

    2003-01-01

    Many turbomachinery CFD codes use second-order central-difference (C-D) schemes with artificial viscosity to control point decoupling and to capture shocks. While C-D schemes generally give accurate results, they can also exhibit minor numerical problems including overshoots at shocks and at the edges of viscous layers, and smearing of shocks and other flow features. In an effort to improve predictive capability for turbomachinery problems, two C-D codes developed by Chima, RVCQ3D and Swift, were modified by the addition of two upwind schemes: the AUSM+ scheme developed by Liou, et al., and the H-CUSP scheme developed by Tatsumi, et al. Details of the C-D scheme and the two upwind schemes are described, and results of three test cases are shown. Results for a 2-D transonic turbine vane showed that the upwind schemes eliminated viscous layer overshoots. Results for a 3-D turbine vane showed that the upwind schemes gave improved predictions of exit flow angles and losses, although the HCUSP scheme predicted slightly higher losses than the other schemes. Results for a 3-D supersonic compressor (NASA rotor 37) showed that the AUSM+ scheme predicted exit distributions of total pressure and temperature that are not generally captured by C-D codes. All schemes showed similar convergence rates, but the upwind schemes required considerably more CPU time per iteration.

  12. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  13. Exact density functional and wave function embedding schemes based on orbital localization

    NASA Astrophysics Data System (ADS)

    Hégely, Bence; Nagy, Péter R.; Ferenczy, György G.; Kállay, Mihály

    2016-08-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  14. Scheme variations of the QCD coupling

    NASA Astrophysics Data System (ADS)

    Boito, Diogo; Jamin, Matthias; Miravitllas, Ramon

    2017-03-01

    The Quantum Chromodynamics (QCD) coupling αs is a central parameter in the Standard Model of particle physics. However, it depends on theoretical conventions related to renormalisation and hence is not an observable quantity. In order to capture this dependence in a transparent way, a novel definition of the QCD coupling, denoted by â, is introduced, whose running is explicitly renormalisation scheme invariant. The remaining renormalisation scheme dependence is related to transformations of the QCD scale Λ, and can be parametrised by a single parameter C. Hence, we call â the C-scheme coupling. The dependence on C can be exploited to study and improve perturbative predictions of physical observables. This is demonstrated for the QCD Adler function and hadronic decays of the τ lepton.

  15. Color encryption scheme based on adapted quantum logistic map

    NASA Astrophysics Data System (ADS)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  16. Modeling and Analysis of Energy Conservation Scheme Based on Duty Cycling in Wireless Ad Hoc Sensor Network

    PubMed Central

    Chung, Yun Won; Hwang, Ho Young

    2010-01-01

    In sensor network, energy conservation is one of the most critical issues since sensor nodes should perform a sensing task for a long time (e.g., lasting a few years) but the battery of them cannot be replaced in most practical situations. For this purpose, numerous energy conservation schemes have been proposed and duty cycling scheme is considered the most suitable power conservation technique, where sensor nodes alternate between states having different levels of power consumption. In order to analyze the energy consumption of energy conservation scheme based on duty cycling, it is essential to obtain the probability of each state. In this paper, we analytically derive steady state probability of sensor node states, i.e., sleep, listen, and active states, based on traffic characteristics and timer values, i.e., sleep timer, listen timer, and active timer. The effect of traffic characteristics and timer values on the steady state probability and energy consumption is analyzed in detail. Our work can provide sensor network operators guideline for selecting appropriate timer values for efficient energy conservation. The analytical methodology developed in this paper can be extended to other energy conservation schemes based on duty cycling with different sensor node states, without much difficulty. PMID:22219676

  17. Parallelization of implicit finite difference schemes in computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Decker, Naomi H.; Naik, Vijay K.; Nicoules, Michel

    1990-01-01

    Implicit finite difference schemes are often the preferred numerical schemes in computational fluid dynamics, requiring less stringent stability bounds than the explicit schemes. Each iteration in an implicit scheme involves global data dependencies in the form of second and higher order recurrences. Efficient parallel implementations of such iterative methods are considerably more difficult and non-intuitive. The parallelization of the implicit schemes that are used for solving the Euler and the thin layer Navier-Stokes equations and that require inversions of large linear systems in the form of block tri-diagonal and/or block penta-diagonal matrices is discussed. Three-dimensional cases are emphasized and schemes that minimize the total execution time are presented. Partitioning and scheduling schemes for alleviating the effects of the global data dependencies are described. An analysis of the communication and the computation aspects of these methods is presented. The effect of the boundary conditions on the parallel schemes is also discussed.

  18. Phase II Evaluation of Clinical Coding Schemes

    PubMed Central

    Campbell, James R.; Carpenter, Paul; Sneiderman, Charles; Cohn, Simon; Chute, Christopher G.; Warren, Judith

    1997-01-01

    Abstract Objective: To compare three potential sources of controlled clinical terminology (READ codes version 3.1, SNOMED International, and Unified Medical Language System (UMLS) version 1.6) relative to attributes of completeness, clinical taxonomy, administrative mapping, term definitions and clarity (duplicate coding rate). Methods: The authors assembled 1929 source concept records from a variety of clinical information taken from four medical centers across the United States. The source data included medical as well as ample nursing terminology. The source records were coded in each scheme by an investigator and checked by the coding scheme owner. The codings were then scored by an independent panel of clinicians for acceptability. Codes were checked for definitions provided with the scheme. Codes for a random sample of source records were analyzed by an investigator for “parent” and “child” codes within the scheme. Parent and child pairs were scored by an independent panel of medical informatics specialists for clinical acceptability. Administrative and billing code mapping from the published scheme were reviewed for all coded records and analyzed by independent reviewers for accuracy. The investigator for each scheme exhaustively searched a sample of coded records for duplications. Results: SNOMED was judged to be significantly more complete in coding the source material than the other schemes (SNOMED* 70%; READ 57%; UMLS 50%; *p <.00001). SNOMED also had a richer clinical taxonomy judged by the number of acceptable first-degree relatives per coded concept (SNOMED* 4.56; UMLS 3.17; READ 2.14, *p <.005). Only the UMLS provided any definitions; these were found for 49% of records which had a coding assignment. READ and UMLS had better administrative mappings (composite score: READ* 40.6%; UMLS* 36.1%; SNOMED 20.7%, *p <. 00001), and SNOMED had substantially more duplications of coding assignments (duplication rate: READ 0%; UMLS 4.2%; SNOMED* 13.9%, *p

  19. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    PubMed Central

    Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272

  20. Costs and economic consequences of a help-at-home scheme for older people in England.

    PubMed

    Bauer, Annette; Knapp, Martin; Wistow, Gerald; Perkins, Margaret; King, Derek; Iemmi, Valentina

    2017-03-01

    Solutions to support older people to live independently and reduce the cost of an ageing population are high on the political agenda of most developed countries. Help-at-home schemes offer a mix of community support with the aim to address a range of well-being needs. However, not much is currently known about the costs, outcomes and economic consequences of such schemes. Understanding their impact on individuals' well-being and the economic consequences for local and central government can contribute to decisions about sustainable long-term care financing. This article presents results from a mixed-methods study of a voluntary sector-provided help-at-home scheme in England for people of 55 years and older. The study followed a participatory approach, which involved staff and volunteers. Data were collected during 2012 and 2013. Social care-related quality of life was measured with the Adult Social Care Outcomes Toolkit for 24 service users (59% response rate) when they started using the scheme and 4-6 months later. A customised questionnaire that captured resource use and well-being information was sent to 1064 service users (63% response rate). The same tool was used in assessment with service users who started using the scheme between November 2012 and April 2013 (100% response rate). Costs of the scheme were established from local budget and activity data. The scheme was likely to achieve a mean net benefit of £1568 per person from a local government and National Health Service (NHS) perspective and £3766 from the perspective of the individual. An expenditure of £2851 per person accrued to central government for the additional redistribution of benefit payments to older people. This article highlights the potential contribution of voluntary sector-run help-at-home schemes to an affordable welfare system for ageing societies. © 2016 John Wiley & Sons Ltd.

  1. China's Rural Cooperative Medical Scheme: a type of health insurance or a type of health cooperative?

    PubMed

    Wang, Fang; Liang, Yuan

    2017-03-01

    The Cooperative Medical Scheme (CMS) was popular in rural China in the 1960s and 1970s, having garnered praise from the World Bank and World Health Organization as an unprecedented example of a successful health care model in a low-income developing country. However, the CMS almost collapsed in the 1980s. Based on its historical origins and main activities, we think the CMS functioned as a health cooperative rather than a health insurance scheme. Perhaps, however, the importance to the CMS of cooperation between institutions has been overestimated. Overlooked, yet equally important, has been the cooperation between health workers and farmers to target health-related risk factors associated with agricultural work and ways of life. The 'cooperative' character of the CMS includes two aspects: cooperative institutions and cooperative behaviour. Although the CMS collapsed in China, similar schemes are flourishing elsewhere in the world. In the future, in-depth analysis of these schemes is required.

  2. Enhanced visible light activity on direct contact Z-scheme g-C3N4-TiO2 photocatalyst

    NASA Astrophysics Data System (ADS)

    Li, Juan; Zhang, Min; Li, Qiuye; Yang, Jianjun

    2017-01-01

    Direct contact Z-scheme g-C3N4-TiO2 nanocomposites without an electron mediator are prepared via simple annealing the mixture of bulk g-C3N4 and nanotube titanic acid (NTA) in air at 600 °C for 2 h. In the process of annealing, the bulk g-C3N4 transformed to ultra-thin g-C3N4 nanosheets, and NTA converted to a novel anatase TiO2, then the two components formed a close interaction. The XPS result reveals that some amount of nitrogen is doped into this novel-TiO2, and g-C3N4 nanosheets exist in the composites. The results of XRD, TEM and TG indicate that the thickness of g-C3N4 nanosheets is very thin. The ESR spectrum shows the existence of Ti3+ and single-electron-trapped oxygen vacancy in the 30%g-C3N4-TiO2 composites. In photocatalytic activity test, the 30%g-C3N4-TiO2 nanocomposites showed an excellent photo-oxidation activity of propylene under visible light irradiation (λ≥ 420 nm), and the removal efficiency of propylene reached as high as 56.6%, and the activity kept nearly 82% after four consecutive recycles. Photoluminescence (PL) result using terephthalic acid (TA) as a probe molecule indicated that the g-C3N4-TiO2 nanocomposites displayed a Z-sheme photocatalytic reaction system and this should be the main reason for the high photocatalytic activity. A possible photocatalytic mechanism was proposed on the basis of PL result and transient photocurrent-time curves.

  3. Vectorized schemes for conical potential flow using the artificial density method

    NASA Technical Reports Server (NTRS)

    Bradley, P. F.; Dwoyer, D. L.; South, J. C., Jr.; Keen, J. M.

    1984-01-01

    A method is developed to determine solutions to the full-potential equation for steady supersonic conical flow using the artificial density method. Various update schemes used generally for transonic potential solutions are investigated. The schemes are compared for speed and robustness. All versions of the computer code have been vectorized and are currently running on the CYBER-203 computer. The update schemes are vectorized, where possible, either fully (explicit schemes) or partially (implicit schemes). Since each version of the code differs only by the update scheme and elements other than the update scheme are completely vectorizable, comparisons of computational effort and convergence rate among schemes are a measure of the specific scheme's performance. Results are presented for circular and elliptical cones at angle of attack for subcritical and supercritical crossflows.

  4. Double-moment cloud microphysics scheme for the deep convection parameterization in the GFDL AM3

    NASA Astrophysics Data System (ADS)

    Belochitski, A.; Donner, L.

    2014-12-01

    A double-moment cloud microphysical scheme originally developed by Morrision and Gettelman (2008) for the stratiform clouds and later adopted for the deep convection by Song and Zhang (2011) has been implemented in to the Geophysical Fluid Dynamics Laboratory's atmospheric general circulation model AM3. The scheme treats cloud drop, cloud ice, rain, and snow number concentrations and mixing ratios as diagnostic variables and incorporates processes of autoconversion, self-collection, collection between hydrometeor species, sedimentation, ice nucleation, drop activation, homogeneous and heterogeneous freezing, and the Bergeron-Findeisen process. Such detailed representation of microphysical processes makes the scheme suitable for studying the interactions between aerosols and convection, as well as aerosols' indirect effects on clouds and their roles in climate change. The scheme is first tested in the single column version of the GFDL AM3 using forcing data obtained at the U.S. Department of Energy Atmospheric Radiation Measurment project's Southern Great Planes site. Scheme's impact on SCM simulations is discussed. As the next step, runs of the full atmospheric GCM incorporating the new parameterization are compared to the unmodified version of GFDL AM3. Global climatological fields and their variability are contrasted with those of the original version of the GCM. Impact on cloud radiative forcing and climate sensitivity is investigated.

  5. Double-moment Cloud Microphysics Scheme for the Deep Convection Parameterization in the GFDL AM3

    NASA Astrophysics Data System (ADS)

    Belochitski, A.; Donner, L.

    2013-12-01

    A double-moment cloud microphysical scheme originally developed by Morrision and Gettelman (2008) for the stratiform clouds and later adopted for the deep convection by Song and Zhang (2011) is being implemented in to the deep convection parameterization of Geophysical Fluid Dynamics Laboratory's atmospheric general circulation model AM3. The scheme treats cloud drop, cloud ice, rain, and snow number concentrations and mixing ratios as diagnostic variables and incorporates processes of autoconversion, self-collection, collection between hydrometeor species, sedimentation, ice nucleation, drop activation, homogeneous and heterogeneous freezing, and the Bergeron-Findeisen process. Detailed representation of microphysical processes makes the scheme suitable for studying the interactions between aerosols and convection, as well as aerosols' indirect effects on clouds and the roles of these effects in climate change. The scheme is implemented into the single column version of the GFDL AM3 and evaluated using large scale forcing data obtained at the U.S. Department of Energy Atmospheric Radiation Measurment project's Southern Great Planes and Tropical West Pacific sites. Sensitivity of the scheme to formulations for autoconversion of cloud water and its accretion by rain, self-collection of rain and self-collection of snow, as well as the formulation for heterogenous ice nucleation is investigated. In the future, tests with the full atmospheric GCM will be conducted.

  6. Studies of Inviscid Flux Schemes for Acoustics and Turbulence Problems

    NASA Technical Reports Server (NTRS)

    Morris, Chris

    2013-01-01

    Five different central difference schemes, based on a conservative differencing form of the Kennedy and Gruber skew-symmetric scheme, were compared with six different upwind schemes based on primitive variable reconstruction and the Roe flux. These eleven schemes were tested on a one-dimensional acoustic standing wave problem, the Taylor-Green vortex problem and a turbulent channel flow problem. The central schemes were generally very accurate and stable, provided the grid stretching rate was kept below 10%. As near-DNS grid resolutions, the results were comparable to reference DNS calculations. At coarser grid resolutions, the need for an LES SGS model became apparent. There was a noticeable improvement moving from CD-2 to CD-4, and higher-order schemes appear to yield clear benefits on coarser grids. The UB-7 and CU-5 upwind schemes also performed very well at near-DNS grid resolutions. The UB-5 upwind scheme does not do as well, but does appear to be suitable for well-resolved DNS. The UF-2 and UB-3 upwind schemes, which have significant dissipation over a wide spectral range, appear to be poorly suited for DNS or LES.

  7. [The effect of long-term preservation of microbial cells immobilized in poly(vinyl alcohol) cryogel on their viability and biosynthesis of target metabolites].

    PubMed

    Efremenko, E N; Tatarinova, N Iu

    2007-01-01

    The effect of cell storage at -18 degrees C for 18-24 months on reproductive capacity was investigated for various microorganisms (gram-positive and gram-negative bacteria, yeasts, and filamentous fungi) immobilized in poly(vinyl alcohol) cryogel. To examine the viability of immobilized cells after defrosting, the bioluminescent method of intracellular ATP determination was used. A high level of metabolic activity of immobilized cells after various periods of storage was recorded for Streptomyces anulatus, Rhizopus orvzae, and Escherichia coli, which are producers of the antibiotic aurantin, L(+)-lactic acid, and the recombinant enzyme organophosphate hydrolase, respectively. It was shown that the initial concentration of immobilized cells in cryogel granules plays an important role in the survival of Str. anulatus and Pseudomonas putida after 1.5 years of storage. It was found that, after slow defrosting in the storage medium at 50C for 18 h of immobilized cells of the yeast Saccharomvces cerevisiae that had been stored for nine months, the number of reproductive cells increased due to the formation of ascospores.

  8. A Practical and Secure Coercion-Resistant Scheme for Internet Voting

    NASA Astrophysics Data System (ADS)

    Araújo, Roberto; Foulle, Sébastien; Traoré, Jacques

    Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show that Smith's scheme is insecure. Then we present a new coercion-resistant election scheme with a linear work factor that overcomes the flaw of Smith's proposal. Our solution is based on the group signature scheme of Camenisch and Lysyanskaya (Crypto 2004).

  9. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  10. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  11. Degradation in urban air quality from construction activity and increased traffic arising from a road widening scheme.

    PubMed

    Font, Anna; Baker, Timothy; Mudway, Ian S; Purdie, Esme; Dunster, Christina; Fuller, Gary W

    2014-11-01

    Road widening schemes in urban areas are often proposed as a solution to traffic congestion and as a means of stimulating economic growth. There is however clear evidence that new or expanded roads rapidly fill with either displaced or induced traffic, offsetting any short-term gains in eased traffic flows. What has not been addressed in any great detail is the impact of such schemes on air quality, with modelled impact predictions seldom validated by measurements after the expansion of road capacity. In this study we made use of a road widening project in London to investigate the impact on ambient air quality (particulate matter, NOX, NO2) during and after the completion of the road works. PM10 increased during the construction period up to 15 μg m(-3) during working hours compared to concentrations before the road works. A box modelling approach was used to determine a median emission factor of 0.0022 kg PM10 m(-2) month(-1), three times larger than that used in the UK emission inventory (0.0007 kg PM10 m(-2) month(-1)). Peaks of activity released 0.0130 kg PM10 m(-2) month(-1), three and eight times smaller than the peak values used in the European and US inventories. After the completion of the widening there was an increase in all pollutants from the road during rush hour: 2-4 μg m(-3) for PM10; 1 μg m(-3) for PM2.5; 40 and 8 μg m(-3) for NOX and NO2, respectively. NO2 EU Limit Value was breached after the road development illustrating a notable deterioration in residential air quality. Additionally, PM10, but not PM2.5, glutathione dependent oxidative potential increased after the road was widened consistent with an increase in pro-oxidant components in the coarse particle mode, related to vehicle abrasion processes. These increased air pollution indices were associated with an increase in the number of cars, taxis and LGVs. Copyright © 2014. Published by Elsevier B.V.

  12. A study of design approach of spreading schemes for viral marketing based on human dynamics

    NASA Astrophysics Data System (ADS)

    Yang, Jianmei; Zhuang, Dong; Xie, Weicong; Chen, Guangrong

    2013-12-01

    Before launching a real viral marketing campaign, it is needed to design a spreading scheme by simulations. Based on a categorization of spreading patterns in real world and models, we point out that the existing research (especially Yang et al. (2010) Ref. [16]) implicitly assume that if a user decides to post a received message (is activated), he/she will take the reposting action promptly (Prompt Action After Activation, or PAAA). After a careful analysis on a real dataset however, it is found that the observed time differences between action and activation exhibit a heavy-tailed distribution. A simulation model for heavy-tailed pattern is then proposed and performed. Similarities and differences of spreading processes between the heavy-tailed and PAAA patterns are analyzed. Consequently, a more practical design approach of spreading scheme for viral marketing on QQ platform is proposed. The design approach can be extended and applied to the contexts of non-heavy-tailed pattern, and viral marketing on other instant messaging platforms.

  13. A New Quantum Gray-Scale Image Encoding Scheme

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Abdolmaleky, Mona; Parandin, Fariborz; Fatahi, Negin; Farouk, Ahmed; Nazari, Reza

    2018-02-01

    In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the original one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images. Supported by Kermanshah Branch, Islamic Azad University, Kermanshah, IRAN

  14. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    NASA Technical Reports Server (NTRS)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  15. Renormalization scheme dependence of high-order perturbative QCD predictions

    NASA Astrophysics Data System (ADS)

    Ma, Yang; Wu, Xing-Gang

    2018-02-01

    Conventionally, one adopts typical momentum flow of a physical observable as the renormalization scale for its perturbative QCD (pQCD) approximant. This simple treatment leads to renormalization scheme-and-scale ambiguities due to the renormalization scheme and scale dependence of the strong coupling and the perturbative coefficients do not exactly cancel at any fixed order. It is believed that those ambiguities will be softened by including more higher-order terms. In the paper, to show how the renormalization scheme dependence changes when more loop terms have been included, we discuss the sensitivity of pQCD prediction on the scheme parameters by using the scheme-dependent {βm ≥2}-terms. We adopt two four-loop examples, e+e-→hadrons and τ decays into hadrons, for detailed analysis. Our results show that under the conventional scale setting, by including more-and-more loop terms, the scheme dependence of the pQCD prediction cannot be reduced as efficiently as that of the scale dependence. Thus a proper scale-setting approach should be important to reduce the scheme dependence. We observe that the principle of minimum sensitivity could be such a scale-setting approach, which provides a practical way to achieve optimal scheme and scale by requiring the pQCD approximate be independent to the "unphysical" theoretical conventions.

  16. Performance improvement of robots using a learning control scheme

    NASA Technical Reports Server (NTRS)

    Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.

    1987-01-01

    Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.

  17. Convergence Analysis of the Graph Allen-Cahn Scheme

    DTIC Science & Technology

    2016-02-01

    CONVERGENCE ANALYSIS OF THE GRAPH ALLEN-CAHN SCHEME ∗ XIYANG LUO† AND ANDREA L. BERTOZZI† Abstract. Graph partitioning problems have a wide range of...optimization, convergence and monotonicity are shown for a class of schemes under a graph-independent timestep restriction. We also analyze the effects of...spectral truncation, a common technique used to save computational cost. Convergence of the scheme with spectral truncation is also proved under a

  18. Numerical viscosity and the entropy condition for conservative difference schemes

    NASA Technical Reports Server (NTRS)

    Tadmor, E.

    1983-01-01

    Consider a scalar, nonlinear conservative difference scheme satisfying the entropy condition. It is shown that difference schemes containing more numerical viscosity will necessarily converge to the unique, physically relevant weak solution of the approximated conservation equation. In particular, entropy satisfying convergence follows for E schemes - those containing more numerical viscosity than Godunov's scheme.

  19. Upwind schemes and bifurcating solutions in real gas computations

    NASA Technical Reports Server (NTRS)

    Suresh, Ambady; Liou, Meng-Sing

    1992-01-01

    The area of high speed flow is seeing a renewed interest due to advanced propulsion concepts such as the National Aerospace Plane (NASP), Space Shuttle, and future civil transport concepts. Upwind schemes to solve such flows have become increasingly popular in the last decade due to their excellent shock capturing properties. In the first part of this paper the authors present the extension of the Osher scheme to equilibrium and non-equilibrium gases. For simplicity, the source terms are treated explicitly. Computations based on the above scheme are presented to demonstrate the feasibility, accuracy and efficiency of the proposed scheme. One of the test problems is a Chapman-Jouguet detonation problem for which numerical solutions have been known to bifurcate into spurious weak detonation solutions on coarse grids. Results indicate that the numerical solution obtained depends both on the upwinding scheme used and the limiter employed to obtain second order accuracy. For example, the Osher scheme gives the correct CJ solution when the super-bee limiter is used, but gives the spurious solution when the Van Leer limiter is used. With the Roe scheme the spurious solution is obtained for all limiters.

  20. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  1. Practical scheme for error control using feedback

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarovar, Mohan; Milburn, Gerard J.; Ahn, Charlene

    2004-05-01

    We describe a scheme for quantum-error correction that employs feedback and weak measurement rather than the standard tools of projective measurement and fast controlled unitary gates. The advantage of this scheme over previous protocols [for example, Ahn et al. Phys. Rev. A 65, 042301 (2001)], is that it requires little side processing while remaining robust to measurement inefficiency, and is therefore considerably more practical. We evaluate the performance of our scheme by simulating the correction of bit flips. We also consider implementation in a solid-state quantum-computation architecture and estimate the maximal error rate that could be corrected with current technology.

  2. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.

  3. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    NASA Astrophysics Data System (ADS)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.

  4. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Xia, E-mail: cui_xia@iapcm.ac.cn; Yuan, Guang-wei; Shen, Zhi-jun

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-ordermore » accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.« less

  5. Improved finite difference schemes for transonic potential calculations

    NASA Technical Reports Server (NTRS)

    Hafez, M.; Osher, S.; Whitlow, W., Jr.

    1984-01-01

    Engquist and Osher (1980) have introduced a finite difference scheme for solving the transonic small disturbance equation, taking into account cases in which only compression shocks are admitted. Osher et al. (1983) studied a class of schemes for the full potential equation. It is proved that these schemes satisfy a new discrete 'entropy inequality' which rules out expansion shocks. However, the conducted analysis is restricted to steady two-dimensional flows. The present investigation is concerned with the adoption of a heuristic approach. The full potential equation in conservation form is solved with the aid of a modified artificial density method, based on flux biasing. It is shown that, with the current scheme, expansion shocks are not possible.

  6. Factorizable Schemes for the Equations of Fluid Flow

    NASA Technical Reports Server (NTRS)

    Sidilkover, David

    1999-01-01

    We present an upwind high-resolution factorizable (UHF) discrete scheme for the compressible Euler equations that allows to distinguish between full-potential and advection factors at the discrete level. The scheme approximates equations in their general conservative form and is related to the family of genuinely multidimensional upwind schemes developed previously and demonstrated to have good shock-capturing capabilities. A unique property of this scheme is that in addition to the aforementioned features it is also factorizable, i.e., it allows to distinguish between full-potential and advection factors at the discrete level. The latter property facilitates the construction of optimally efficient multigrid solvers. This is done through a relaxation procedure that utilizes the factorizability property.

  7. Unification of some advection schemes in two dimensions

    NASA Technical Reports Server (NTRS)

    Sidilkover, D.; Roe, P. L.

    1995-01-01

    The relationship between two approaches towards construction of genuinely two-dimensional upwind advection schemes is established. One of these approaches is of the control volume type applicable on structured cartesian meshes. It resulted in the compact high resolution schemes capable of maintaining second order accuracy in both homogeneous and inhomogeneous cases. Another one is the fluctuation splitting approach, which is well suited for triangular (and possibly) unstructured meshes. Understanding the relationship between these two approaches allows us to formulate here a new fluctuation splitting high resolution (i.e. possible use of artificial compression, while maintaining positivity property) scheme. This scheme is shown to be linearity preserving in inhomogeneous as well as homogeneous cases.

  8. A classification scheme for risk assessment methods.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that amore » method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In Section 2 we provide context for

  9. A proposed harmonized LPS molecular-subtyping scheme for Cronobacter species.

    PubMed

    Yan, Qiongqiong; Jarvis, Karen G; Chase, Hannah R; Hébert, Karine; Trach, Larisa H; Lee, Chloe; Sadowski, Jennifer; Lee, Boram; Hwang, Seongeun; Sathyamoorthy, Venugopal; Mullane, Niall; Pava-Ripoll, Monica; Iversen, Carol; Pagotto, Franco; Fanning, Séamus; Tall, Ben D

    2015-09-01

    Cronobacter are opportunistic pathogens, which cause infections in all age groups. To aid the characterization of Cronobacter in foods and environments a harmonized LPS identification scheme for molecular serotyping is needed. To this end, we studied 409 Cronobacter isolates representing the seven Cronobacter species using two previously reported molecular serotyping schemes, described here as Mullane-Jarvis (M-J) and Sun schemes. PCR analysis revealed many overlapping results that were obtained when independently applying the two serotyping schemes. There were complete agreements between the two PCR schemes for Cronobacter sakazakii (Csak) O:1, Csak O:3, and Csak O:7 serotypes. However, only thirty-five of 41 Csak O:4 strains, identified using the M-J scheme, were PCR-positive with the Sun scheme primers. Also the Sun scheme Csak O:5 primers failed to identify this serotype in any of the C. sakazakii strains tested, but did recognize seven Cronobacter turicensis strains, which were identified as Ctur O:3 using the M-J scheme. Similarly, the Sun scheme Csak O:6 primers recognized 30 Cronobacter malonaticus O:2 strains identified with the M-J scheme, but failed to identify this serotype in any C. sakazakii strain investigated. In this report, these findings are summarized and a harmonized molecular-serotyping scheme is proposed which is predicated on the correct identification of Cronobacter species, prior to serotype determination. In summary, fourteen serotypes were identified using the combined protocol, which consists of Csak O:1-O:4, and Csak O:7; Cmal O:1-O:2; Cdub O:1-O:2, Cmuy O:1-O:2, Cuni O:1, as well as Ctur O:1 and Ctur O:3. Published by Elsevier Ltd.

  10. Verification and accreditation schemes for climate change activities: A review of requirements for verification of greenhouse gas reductions and accreditation of verifiers—Implications for long-term carbon sequestration

    NASA Astrophysics Data System (ADS)

    Roed-Larsen, Trygve; Flach, Todd

    The purpose of this chapter is to provide a review of existing national and international requirements for verification of greenhouse gas reductions and associated accreditation of independent verifiers. The credibility of results claimed to reduce or remove anthropogenic emissions of greenhouse gases (GHG) is of utmost importance for the success of emerging schemes to reduce such emissions. Requirements include transparency, accuracy, consistency, and completeness of the GHG data. The many independent verification processes that have developed recently now make up a quite elaborate tool kit for best practices. The UN Framework Convention for Climate Change and the Kyoto Protocol specifications for project mechanisms initiated this work, but other national and international actors also work intensely with these issues. One initiative gaining wide application is that taken by the World Business Council for Sustainable Development with the World Resources Institute to develop a "GHG Protocol" to assist companies in arranging for auditable monitoring and reporting processes of their GHG activities. A set of new international standards developed by the International Organization for Standardization (ISO) provides specifications for the quantification, monitoring, and reporting of company entity and project-based activities. The ISO is also developing specifications for recognizing independent GHG verifiers. This chapter covers this background with intent of providing a common understanding of all efforts undertaken in different parts of the world to secure the reliability of GHG emission reduction and removal activities. These verification schemes may provide valuable input to current efforts of securing a comprehensive, trustworthy, and robust framework for verification activities of CO2 capture, transport, and storage.

  11. A Review of the Case of a Levy-Grant Scheme (LGS) in the UK Construction Industry

    ERIC Educational Resources Information Center

    Abdel-Wahab, Mohamed; Dainty, Andrew; Ison, Stephen

    2010-01-01

    A Levy-Grant Scheme (LGS) has existed in the UK construction industry since 1964 to provide financial support for companies undertaking training activities. Despite the support of the LGS for various training activities, notably apprenticeships, the construction industry continues to suffer from both labour shortages and an under-investment in…

  12. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  13. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  14. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  15. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  16. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  17. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  18. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  19. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  20. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  1. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  2. Symplectic partitioned Runge-Kutta scheme for Maxwell's equations

    NASA Astrophysics Data System (ADS)

    Huang, Zhi-Xiang; Wu, Xian-Liang

    Using the symplectic partitioned Runge-Kutta (PRK) method, we construct a new scheme for approximating the solution to infinite dimensional nonseparable Hamiltonian systems of Maxwell's equations for the first time. The scheme is obtained by discretizing the Maxwell's equations in the time direction based on symplectic PRK method, and then evaluating the equation in the spatial direction with a suitable finite difference approximation. Several numerical examples are presented to verify the efficiency of the scheme.

  3. A fuzzy call admission control scheme in wireless networks

    NASA Astrophysics Data System (ADS)

    Ma, Yufeng; Gong, Shenguang; Hu, Xiulin; Zhang, Yunyu

    2007-11-01

    Scarcity of the spectrum resource and mobility of users make quality of service (QoS) provision a critical issue in wireless networks. This paper presents a fuzzy call admission control scheme to meet the requirement of the QoS. A performance measure is formed as a weighted linear function of new call and handoff call blocking probabilities. Simulation compares the proposed fuzzy scheme with an adaptive channel reservation scheme. Simulation results show that fuzzy scheme has a better robust performance in terms of average blocking criterion.

  4. Comparison of Several Dissipation Algorithms for Central Difference Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.; Turkel, E.

    1997-01-01

    Several algorithms for introducing artificial dissipation into a central difference approximation to the Euler and Navier Stokes equations are considered. The focus of the paper is on the convective upwind and split pressure (CUSP) scheme, which is designed to support single interior point discrete shock waves. This scheme is analyzed and compared in detail with scalar and matrix dissipation (MATD) schemes. Resolution capability is determined by solving subsonic, transonic, and hypersonic flow problems. A finite-volume discretization and a multistage time-stepping scheme with multigrid are used to compute solutions to the flow equations. Numerical results are also compared with either theoretical solutions or experimental data. For transonic airfoil flows the best accuracy on coarse meshes for aerodynamic coefficients is obtained with a simple MATD scheme.

  5. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    NASA Astrophysics Data System (ADS)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  6. Vehicle scheduling schemes for commercial and emergency logistics integration.

    PubMed

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models.

  7. A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems

    PubMed Central

    Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok

    2018-01-01

    Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target’s trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes. PMID:29562621

  8. Genetic and economic evaluation of Japanese Black (Wagyu) cattle breeding schemes.

    PubMed

    Kahi, A K; Hirooka, H

    2005-09-01

    Deterministic simulation was used to evaluate 10 breeding schemes for genetic gain and profitability and in the context of maximizing returns from investment in Japanese Black cattle breeding. A breeding objective that integrated the cow-calf and feedlot segments was considered. Ten breeding schemes that differed in the records available for use as selection criteria were defined. The schemes ranged from one that used carcass traits currently available to Japanese Black cattle breeders (Scheme 1) to one that also included linear measurements and male and female reproduction traits (Scheme 10). The latter scheme represented the highest level of performance recording. In all breeding schemes, sires were chosen from the proportion selected during the first selection stage (performance testing), modeling a two-stage selection process. The effect on genetic gain and profitability of varying test capacity and number of progeny per sire and of ultrasound scanning of live animals was examined for all breeding schemes. Breeding schemes that selected young bulls during performance testing based on additional individual traits and information on carcass traits from their relatives generated additional genetic gain and profitability. Increasing test capacity resulted in an increase in genetic gain in all schemes. Profitability was optimal in Scheme 2 (a scheme similar to Scheme 1, but selection of young bulls also was based on information on carcass traits from their relatives) to 10 when 900 to 1,000 places were available for performance testing. Similarly, as the number of progeny used in the selection of sires increased, genetic gain first increased sharply and then gradually in all schemes. Profit was optimal across all breeding schemes when sires were selected based on information from 150 to 200 progeny. Additional genetic gain and profitability were generated in each breeding scheme with ultrasound scanning of live animals for carcass traits. Ultrasound scanning of live

  9. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  10. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  11. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  12. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  13. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  14. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  15. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  16. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  17. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  18. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  19. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  20. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  1. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  2. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  3. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  4. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  5. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  6. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  7. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  8. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  9. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  10. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  11. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  12. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  13. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  14. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  15. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  16. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  17. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  18. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  19. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  20. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  1. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  2. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  3. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  4. One Decade Later: KF Canadian Adaptation Scheme.

    ERIC Educational Resources Information Center

    Rashid, H.

    1984-01-01

    Provides background and rationale for formulation and use of the KF Canadian Adaptation Scheme in Canadian law libraries and describes methodological approaches and applications of the scheme to diverse and specific situations. Recent developments in its maintenance and updating and suggestions for its potential use are highlighted. (EJS)

  5. A computationally efficient scheme for the non-linear diffusion equation

    NASA Astrophysics Data System (ADS)

    Termonia, P.; Van de Vyver, H.

    2009-04-01

    This Letter proposes a new numerical scheme for integrating the non-linear diffusion equation. It is shown that it is linearly stable. Some tests are presented comparing this scheme to a popular decentered version of the linearized Crank-Nicholson scheme, showing that, although this scheme is slightly less accurate in treating the highly resolved waves, (i) the new scheme better treats highly non-linear systems, (ii) better handles the short waves, (iii) for a given test bed turns out to be three to four times more computationally cheap, and (iv) is easier in implementation.

  6. An extrapolation scheme for solid-state NMR chemical shift calculations

    NASA Astrophysics Data System (ADS)

    Nakajima, Takahito

    2017-06-01

    Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.

  7. The Impact of Hospital Payment Schemes on Healthcare and Mortality: Evidence from Hospital Payment Reforms in OECD Countries.

    PubMed

    Wubulihasimu, Parida; Brouwer, Werner; van Baal, Pieter

    2016-08-01

    In this study, aggregate-level panel data from 20 Organization for Economic Cooperation and Development countries over three decades (1980-2009) were used to investigate the impact of hospital payment reforms on healthcare output and mortality. Hospital payment schemes were classified as fixed-budget (i.e. not directly based on activities), fee-for-service (FFS) or patient-based payment (PBP) schemes. The data were analysed using a difference-in-difference model that allows for a structural change in outcomes due to payment reform. The results suggest that FFS schemes increase the growth rate of healthcare output, whereas PBP schemes positively affect life expectancy at age 65 years. However, these results should be interpreted with caution, as results are sensitive to model specification. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  8. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  9. Improved Readout Scheme for SQUID-Based Thermometry

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin

    2007-01-01

    An improved readout scheme has been proposed for high-resolution thermometers, (HRTs) based on the use of superconducting quantum interference devices (SQUIDs) to measure temperature- dependent magnetic susceptibilities. The proposed scheme would eliminate counting ambiguities that arise in the conventional scheme, while maintaining the superior magnetic-flux sensitivity of the conventional scheme. The proposed scheme is expected to be especially beneficial for HRT-based temperature control of multiplexed SQUIDbased bolometer sensor arrays. SQUID-based HRTs have become standard for measuring and controlling temperatures in the sub-nano-Kelvin temperature range in a broad range of low-temperature scientific and engineering applications. A typical SQUIDbased HRT that utilizes the conventional scheme includes a coil wound on a core made of a material that has temperature- dependent magnetic susceptibility in the temperature range of interest. The core and the coil are placed in a DC magnetic field provided either by a permanent magnet or as magnetic flux inside a superconducting outer wall. The aforementioned coil is connected to an input coil of a SQUID. Changes in temperature lead to changes in the susceptibility of the core and to changes in the magnetic flux detected by the SQUID. The SQUID readout instrumentation is capable of measuring magnetic-flux changes that correspond to temperature changes down to a noise limit .0.1 nK/Hz1/2. When the flux exceeds a few fundamental flux units, which typically corresponds to a temperature of .100 nK, the SQUID is reset. The temperature range can be greatly expanded if the reset events are carefully tracked and counted, either by a computer running appropriate software or by a dedicated piece of hardware.

  10. Progress with multigrid schemes for hypersonic flow problems

    NASA Technical Reports Server (NTRS)

    Radespiel, R.; Swanson, R. C.

    1991-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm uses upwind spatial discretization with explicit multistage time stepping. Two level versions of the various multigrid algorithms are applied to the two dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high aspect ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 x 10(exp 6) and Mach numbers up to 25.

  11. Experimental quantum-cryptography scheme based on orthogonal states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Avella, Alessio; Brida, Giorgio; Degiovanni, Ivo Pietro

    2010-12-15

    Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-communication scheme using nonorthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of detecting the spy. Usually, orthogonal states are not used in quantum-cryptography schemes since they can be faithfully cloned without altering the transmitted data. Nevertheless, L. Goldberg and L. Vaidman [Phys. Rev. Lett. 75, 1239 (1995)] proposed a protocol in which, even if the data exchange is realized using two orthogonal states, any attempt to eavesdrop is detectable by the legal users. In this scheme the orthogonal statesmore » are superpositions of two localized wave packets traveling along separate channels. Here we present an experiment realizing this scheme.« less

  12. Nagy-Soper subtraction scheme for multiparton final states

    NASA Astrophysics Data System (ADS)

    Chung, Cheng-Han; Robens, Tania

    2013-04-01

    In this work, we present the extension of an alternative subtraction scheme for next-to-leading order QCD calculations to the case of an arbitrary number of massless final state partons. The scheme is based on the splitting kernels of an improved parton shower and comes with a reduced number of final state momentum mappings. While a previous publication including the setup of the scheme has been restricted to cases with maximally two massless partons in the final state, we here provide the final state real emission and integrated subtraction terms for processes with any number of massless partons. We apply our scheme to three jet production at lepton colliders at next-to-leading order and present results for the differential C parameter distribution.

  13. Cooling schemes for two-component fermions in layered optical lattices

    NASA Astrophysics Data System (ADS)

    Goto, Shimpei; Danshita, Ippei

    2017-12-01

    Recently, a cooling scheme for ultracold atoms in a bilayer optical lattice has been proposed (A. Kantian et al., arXiv:1609.03579). In their scheme, the energy offset between the two layers is increased dynamically such that the entropy of one layer is transferred to the other layer. Using the full-Hilbert-space approach, we compute cooling dynamics subjected to the scheme in order to show that their scheme fails to cool down two-component fermions. We develop an alternative cooling scheme for two-component fermions, in which the spin-exchange interaction of one layer is significantly reduced. Using both full-Hilbert-space and matrix-product-state approaches, we find that our scheme can decrease the temperature of the other layer by roughly half.

  14. A novel quantum group signature scheme without using entangled states

    NASA Astrophysics Data System (ADS)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  15. Upwind and symmetric shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1987-01-01

    The development of numerical methods for hyperbolic conservation laws has been a rapidly growing area for the last ten years. Many of the fundamental concepts and state-of-the-art developments can only be found in meeting proceedings or internal reports. This review paper attempts to give an overview and a unified formulation of a class of shock-capturing methods. Special emphasis is on the construction of the basic nonlinear scalar second-order schemes and the methods of extending these nonlinear scalar schemes to nonlinear systems via the extact Riemann solver, approximate Riemann solvers, and flux-vector splitting approaches. Generalization of these methods to efficiently include real gases and large systems of nonequilibrium flows is discussed. The performance of some of these schemes is illustrated by numerical examples for one-, two- and three-dimensional gas dynamics problems.

  16. Improvement of One Quantum Encryption Scheme

    NASA Astrophysics Data System (ADS)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  17. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  18. 7 CFR 755.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 755.9 Section... GEOGRAPHICALLY DISADVANTAGED FARMERS AND RANCHERS § 755.9 Misrepresentation and scheme or device. (a) In addition... payments under this part if the producer is determined by FSA to have: (1) Adopted any scheme or device...

  19. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  20. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  1. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  2. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  3. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... determined to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2...

  4. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2) Made...

  5. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... determined to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2...

  6. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  7. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  8. 7 CFR 755.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 755.9 Section... GEOGRAPHICALLY DISADVANTAGED FARMERS AND RANCHERS § 755.9 Misrepresentation and scheme or device. (a) In addition... payments under this part if the producer is determined by FSA to have: (1) Adopted any scheme or device...

  9. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  10. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  11. 7 CFR 755.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 755.9 Section... GEOGRAPHICALLY DISADVANTAGED FARMERS AND RANCHERS § 755.9 Misrepresentation and scheme or device. (a) In addition... payments under this part if the producer is determined by FSA to have: (1) Adopted any scheme or device...

  12. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  13. 7 CFR 755.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 755.9 Section... GEOGRAPHICALLY DISADVANTAGED FARMERS AND RANCHERS § 755.9 Misrepresentation and scheme or device. (a) In addition... payments under this part if the producer is determined by FSA to have: (1) Adopted any scheme or device...

  14. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  15. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  16. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  17. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  18. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  19. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  20. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  1. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  2. 7 CFR 1429.111 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1429.111... ASSISTANCE PAYMENT PROGRAM § 1429.111 Misrepresentation and scheme or device. (a) In addition to other... determined by CCC to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program...

  3. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... determined to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2...

  4. 7 CFR 1429.111 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1429.111... ASSISTANCE PAYMENT PROGRAM § 1429.111 Misrepresentation and scheme or device. (a) In addition to other... determined by CCC to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program...

  5. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  6. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  7. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  8. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  9. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  10. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  11. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  12. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  13. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  14. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  15. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  16. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... determined to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2...

  17. 7 CFR 1429.111 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1429.111... ASSISTANCE PAYMENT PROGRAM § 1429.111 Misrepresentation and scheme or device. (a) In addition to other... determined by CCC to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program...

  18. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  19. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  20. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  1. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  2. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  3. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  4. On the Conservation and Convergence to Weak Solutions of Global Schemes

    NASA Technical Reports Server (NTRS)

    Carpenter, Mark H.; Gottlieb, David; Shu, Chi-Wang

    2001-01-01

    In this paper we discuss the issue of conservation and convergence to weak solutions of several global schemes, including the commonly used compact schemes and spectral collocation schemes, for solving hyperbolic conservation laws. It is shown that such schemes, if convergent boundedly almost everywhere, will converge to weak solutions. The results are extensions of the classical Lax-Wendroff theorem concerning conservative schemes.

  5. A fast iterative scheme for the linearized Boltzmann equation

    NASA Astrophysics Data System (ADS)

    Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.

    2017-06-01

    Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference

  6. Some implementational issues of convection schemes for finite volume formulations

    NASA Technical Reports Server (NTRS)

    Thakur, Siddharth; Shyy, Wei

    1993-01-01

    Two higher-order upwind schemes - second-order upwind and QUICK - are examined in terms of their interpretation, implementation as well as performance for a recirculating flow in a lid-driven cavity, in the context of a control volume formulation using the SIMPLE algorithm. The present formulation of these schemes is based on a unified framework wherein the first-order upwind scheme is chosen as the basis, with the remaining terms being assigned to the source term. The performance of these schemes is contrasted with the first-order upwind and second-order central difference schemes. Also addressed in this study is the issue of boundary treatment associated with these higher-order upwind schemes. Two different boundary treatments - one that uses a two-point scheme consistently within a given control volume at the boundary, and the other that maintains consistency of flux across the interior face between the adjacent control volumes - are formulated and evaluated.

  7. Some implementational issues of convection schemes for finite-volume formulations

    NASA Technical Reports Server (NTRS)

    Thakur, Siddharth; Shyy, Wei

    1993-01-01

    Two higher-order upwind schemes - second-order upwind and QUICK - are examined in terms of their interpretation, implementations, as well as performance for a recirculating flow in a lid-driven cavity, in the context of a control-volume formulation using the SIMPLE algorithm. The present formulation of these schemes is based on a unified framework wherein the first-order upwind scheme is chosen as the basis, with the remaining terms being assigned to the source term. The performance of these schemes is contrasted with the first-order upwind and second-order central difference schemes. Also addressed in this study is the issue of boundary treatment associated with these higher-order upwind schemes. Two different boundary treatments - one that uses a two-point scheme consistently within a given control volume at the boundary, and the other that maintains consistency of flux across the interior face between the adjacent control volumes - are formulated and evaluated.

  8. Traffic-aware energy saving scheme with modularization supporting in TWDM-PON

    NASA Astrophysics Data System (ADS)

    Xiong, Yu; Sun, Peng; Liu, Chuanbo; Guan, Jianjun

    2017-01-01

    Time and wavelength division multiplexed passive optical network (TWDM-PON) is considered to be a primary solution for next-generation passive optical network stage 2 (NG-PON2). Due to the feature of multi-wavelength transmission of TWDM-PON, some of the transmitters/receivers at the optical line terminal (OLT) could be shut down to reduce the energy consumption. Therefore, a novel scheme called traffic-aware energy saving scheme with modularization supporting is proposed. Through establishing the modular energy consumption model of OLT, the wavelength transmitters/receivers at OLT could be switched on or shut down adaptively depending on sensing the status of network traffic load, thus the energy consumption of OLT will be effectively reduced. Furthermore, exploring the technology of optical network unit (ONU) modularization, each module of ONU could be switched to sleep or active mode independently in order to reduce the energy consumption of ONU. Simultaneously, the polling sequence of ONU could be changed dynamically via sensing the packet arrival time. In order to guarantee the delay performance of network traffic, the sub-cycle division strategy is designed to transmit the real-time traffic preferentially. Finally, simulation results verify that the proposed scheme is able to reduce the energy consumption of the network while maintaining the traffic delay performance.

  9. The construction of high-accuracy schemes for acoustic equations

    NASA Technical Reports Server (NTRS)

    Tang, Lei; Baeder, James D.

    1995-01-01

    An accuracy analysis of various high order schemes is performed from an interpolation point of view. The analysis indicates that classical high order finite difference schemes, which use polynomial interpolation, hold high accuracy only at nodes and are therefore not suitable for time-dependent problems. Thus, some schemes improve their numerical accuracy within grid cells by the near-minimax approximation method, but their practical significance is degraded by maintaining the same stencil as classical schemes. One-step methods in space discretization, which use piecewise polynomial interpolation and involve data at only two points, can generate a uniform accuracy over the whole grid cell and avoid spurious roots. As a result, they are more accurate and efficient than multistep methods. In particular, the Cubic-Interpolated Psuedoparticle (CIP) scheme is recommended for computational acoustics.

  10. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  11. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  12. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  13. On some Approximation Schemes for Steady Compressible Viscous Flow

    NASA Astrophysics Data System (ADS)

    Bause, M.; Heywood, J. G.; Novotny, A.; Padula, M.

    This paper continues our development of approximation schemes for steady compressible viscous flow based on an iteration between a Stokes like problem for the velocity and a transport equation for the density, with the aim of improving their suitability for computations. Such schemes seem attractive for computations because they offer a reduction to standard problems for which there is already highly refined software, and because of the guidance that can be drawn from an existence theory based on them. Our objective here is to modify a recent scheme of Heywood and Padula [12], to improve its convergence properties. This scheme improved upon an earlier scheme of Padula [21], [23] through the use of a special ``effective pressure'' in linking the Stokes and transport problems. However, its convergence is limited for several reasons. Firstly, the steady transport equation itself is only solvable for general velocity fields if they satisfy certain smallness conditions. These conditions are met here by using a rescaled variant of the steady transport equation based on a pseudo time step for the equation of continuity. Another matter limiting the convergence of the scheme in [12] is that the Stokes linearization, which is a linearization about zero, has an inevitably small range of convergence. We replace it here with an Oseen or Newton linearization, either of which has a wider range of convergence, and converges more rapidly. The simplicity of the scheme offered in [12] was conducive to a relatively simple and clearly organized proof of its convergence. The proofs of convergence for the more complicated schemes proposed here are structured along the same lines. They strengthen the theorems of existence and uniqueness in [12] by weakening the smallness conditions that are needed. The expected improvement in the computational performance of the modified schemes has been confirmed by Bause [2], in an ongoing investigation.

  14. 7 CFR 1413.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Misrepresentation and scheme or device. 1413.110... PROGRAMS Durum Wheat Quality Program § 1413.110 Misrepresentation and scheme or device. (a) In addition to... the DWQP if the producer is determined by CCC to have: (1) Adopted any scheme or device that tends to...

  15. 7 CFR 1413.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Misrepresentation and scheme or device. 1413.110... PROGRAMS Durum Wheat Quality Program § 1413.110 Misrepresentation and scheme or device. (a) In addition to... the DWQP if the producer is determined by CCC to have: (1) Adopted any scheme or device that tends to...

  16. 7 CFR 1413.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Misrepresentation and scheme or device. 1413.110... PROGRAMS Durum Wheat Quality Program § 1413.110 Misrepresentation and scheme or device. (a) In addition to... the DWQP if the producer is determined by CCC to have: (1) Adopted any scheme or device that tends to...

  17. 7 CFR 1413.110 - Misrepresentation and scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Misrepresentation and scheme or device. 1413.110... PROGRAMS Durum Wheat Quality Program § 1413.110 Misrepresentation and scheme or device. (a) In addition to... the DWQP if the producer is determined by CCC to have: (1) Adopted any scheme or device that tends to...

  18. Exploring the Perceptions of Success in an Exercise Referral Scheme: A Mixed Method Investigation

    ERIC Educational Resources Information Center

    Mills, Hayley; Crone, Diane; James, David V. B.; Johnston, Lynne H.

    2012-01-01

    Background: Exercise referral schemes feature as one of the prevalent primary care physical activity interventions in the United Kingdom, without extensive understanding of how those involved in providing and participating view success. The present research explores and reveals the constituents of "success," through comparison,…

  19. Development of advanced control schemes for telerobot manipulators

    NASA Technical Reports Server (NTRS)

    Nguyen, Charles C.; Zhou, Zhen-Lei

    1991-01-01

    To study space applications of telerobotics, Goddard Space Flight Center (NASA) has recently built a testbed composed mainly of a pair of redundant slave arms having seven degrees of freedom and a master hand controller system. The mathematical developments required for the computerized simulation study and motion control of the slave arms are presented. The slave arm forward kinematic transformation is presented which is derived using the D-H notation and is then reduced to its most simplified form suitable for real-time control applications. The vector cross product method is then applied to obtain the slave arm Jacobian matrix. Using the developed forward kinematic transformation and quaternions representation of the slave arm end-effector orientation, computer simulation is conducted to evaluate the efficiency of the Jacobian in converting joint velocities into Cartesian velocities and to investigate the accuracy of the Jacobian pseudo-inverse for various sampling times. In addition, the equivalence between Cartesian velocities and quaternion is also verified using computer simulation. The motion control of the slave arm is examined. Three control schemes, the joint-space adaptive control scheme, the Cartesian adaptive control scheme, and the hybrid position/force control scheme are proposed for controlling the motion of the slave arm end-effector. Development of the Cartesian adaptive control scheme is presented and some preliminary results of the remaining control schemes are presented and discussed.

  20. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  1. The design of composite monitoring scheme for multilevel information in crop early diseases

    NASA Astrophysics Data System (ADS)

    Zhang, Yan; Meng, Qinglong; Shang, Jing

    2018-02-01

    It is difficult to monitor and predict the crops early diseases in that the crop disease monitoring is usually monitored by visible light images and the availabilities in early warning are poor at present. The features of common nondestructive testing technology applied to the crop diseases were analyzed in this paper. Based on the changeable characteristics of the virus from the incubation period to the onset period of crop activities, the multilevel composite information monitoring scheme were designed by applying infrared thermal imaging, visible near infrared hyperspectral imaging, micro-imaging technology to the monitoring of multilevel information of crop disease infection comprehensively. The early warning process and key monitoring parameters of compound monitoring scheme are given by taking the temperature, color, structure and texture of crops as the key monitoring characteristics of disease. With overcoming the deficiency that the conventional monitoring scheme is only suitable for the observation of diseases with naked eyes, the monitoring and early warning of the incubation and early onset of the infection crops can be realized by the composite monitoring program as mentioned in this paper.

  2. Fostering and Inspiring Research Engagement (FIRE): program logic of a research incubator scheme for allied health students.

    PubMed

    Ziviani, Jenny; Feeney, Rachel; Schabrun, Siobhan; Copland, David; Hodges, Paul

    2014-08-01

    The purpose of this study was to present the application of a logic model in depicting the underlying theory of an undergraduate research scheme for occupational therapy, physiotherapy, and speech pathology university students in Queensland, Australia. Data gathered from key written documents on the goals and intended operation of the research incubator scheme were used to create a draft (unverified) logic model. The major components of the logic model were inputs and resources, activities/outputs, and outcomes (immediate/learning, intermediate/action, and longer term/impacts). Although immediate and intermediate outcomes chiefly pertained to students' participation in honours programs, longer-term outcomes (impacts) concerned their subsequent participation in research higher-degree programs and engagement in research careers. Program logic provided an effective means of clarifying program objectives and the mechanisms by which the research incubator scheme was designed to achieve its intended outcomes. This model was developed as the basis for evaluation of the effectiveness of the scheme in achieving its stated goals.

  3. Baseline scheme for polarization preservation and control in the MEIC ion complex

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Derbenev, Yaroslav S.; Lin, Fanglei; Morozov, Vasiliy

    2015-09-01

    The scheme for preservation and control of the ion polarization in the Medium-energy Electron-Ion Collider (MEIC) has been under active development in recent years. The figure-8 configuration of the ion rings provides a unique capability to control the polarization of any ion species including deuterons by means of "weak" solenoids rotating the particle spins by small angles. Insertion of "weak" solenoids into the magnetic lattices of the booster and collider rings solves the problem of polarization preservation during acceleration of the ion beam. Universal 3D spin rotators designed on the basis of "weak" solenoids allow one to obtain any polarizationmore » orientation at an interaction point of MEIC. This paper presents the baseline scheme for polarization preservation and control in the MEIC ion complex.« less

  4. Implicit Total Variation Diminishing (TVD) schemes for steady-state calculations

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Warming, R. F.; Harten, A.

    1983-01-01

    The application of a new implicit unconditionally stable high resolution total variation diminishing (TVD) scheme to steady state calculations. It is a member of a one parameter family of explicit and implicit second order accurate schemes developed by Harten for the computation of weak solutions of hyperbolic conservation laws. This scheme is guaranteed not to generate spurious oscillations for a nonlinear scalar equation and a constant coefficient system. Numerical experiments show that this scheme not only has a rapid convergence rate, but also generates a highly resolved approximation to the steady state solution. A detailed implementation of the implicit scheme for the one and two dimensional compressible inviscid equations of gas dynamics is presented. Some numerical computations of one and two dimensional fluid flows containing shocks demonstrate the efficiency and accuracy of this new scheme.

  5. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.

    PubMed

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-12-09

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes' ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  6. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  7. Experimental quantum-cryptography scheme based on orthogonal states

    NASA Astrophysics Data System (ADS)

    Avella, Alessio; Brida, Giorgio; Degiovanni, Ivo Pietro; Genovese, Marco; Gramegna, Marco; Traina, Paolo

    2010-12-01

    Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-communication scheme using nonorthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of detecting the spy. Usually, orthogonal states are not used in quantum-cryptography schemes since they can be faithfully cloned without altering the transmitted data. Nevertheless, L. Goldberg and L. Vaidman [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.75.1239 75, 1239 (1995)] proposed a protocol in which, even if the data exchange is realized using two orthogonal states, any attempt to eavesdrop is detectable by the legal users. In this scheme the orthogonal states are superpositions of two localized wave packets traveling along separate channels. Here we present an experiment realizing this scheme.

  8. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    NASA Astrophysics Data System (ADS)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  9. Dynamic Restarting Schemes for Eigenvalue Problems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  10. High-Order Central WENO Schemes for Multi-Dimensional Hamilton-Jacobi Equations

    NASA Technical Reports Server (NTRS)

    Bryson, Steve; Levy, Doron; Biegel, Bryan (Technical Monitor)

    2002-01-01

    We present new third- and fifth-order Godunov-type central schemes for approximating solutions of the Hamilton-Jacobi (HJ) equation in an arbitrary number of space dimensions. These are the first central schemes for approximating solutions of the HJ equations with an order of accuracy that is greater than two. In two space dimensions we present two versions for the third-order scheme: one scheme that is based on a genuinely two-dimensional Central WENO reconstruction, and another scheme that is based on a simpler dimension-by-dimension reconstruction. The simpler dimension-by-dimension variant is then extended to a multi-dimensional fifth-order scheme. Our numerical examples in one, two and three space dimensions verify the expected order of accuracy of the schemes.

  11. Asynchronous discrete event schemes for PDEs

    NASA Astrophysics Data System (ADS)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  12. A new scheme of force reflecting control

    NASA Technical Reports Server (NTRS)

    Kim, Won S.

    1992-01-01

    A new scheme of force reflecting control has been developed that incorporates position-error-based force reflection and robot compliance control. The operator is provided with a kinesthetic force feedback which is proportional to the position error between the operator-commanded and the actual position of the robot arm. Robot compliance control, which increases the effective compliance of the robot, is implemented by low pass filtering the outputs of the force/torque sensor mounted on the base of robot hand and using these signals to alter the operator's position command. This position-error-based force reflection scheme combined with shared compliance control has been implemented successfully to the Advanced Teleoperation system consisting of dissimilar master-slave arms. Stability measurements have demonstrated unprecedentedly high force reflection gains of up to 2 or 3, even though the slave arm is much stiffer than operator's hand holding the force reflecting hand controller. Peg-in-hole experiments were performed with eight different operating modes to evaluate the new force-reflecting control scheme. Best task performance resulted with this new control scheme.

  13. Differences exist across insurance schemes in China post-consolidation

    PubMed Central

    Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun

    2017-01-01

    Background In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. Methods A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects’ characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Results Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Conclusions Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences. PMID:29125837

  14. Differences exist across insurance schemes in China post-consolidation.

    PubMed

    Li, Yang; Zhao, Yinjun; Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun; Ma, Shuangge

    2017-01-01

    In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  15. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  16. Elucidation of molecular kinetic schemes from macroscopic traces using system identification

    PubMed Central

    González-Maeso, Javier; Sealfon, Stuart C.; Galocha-Iragüen, Belén; Brezina, Vladimir

    2017-01-01

    Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic) processes from the overall (macroscopic) response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE). SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology can be successfully

  17. Function-Space-Based Solution Scheme for the Size-Modified Poisson-Boltzmann Equation in Full-Potential DFT.

    PubMed

    Ringe, Stefan; Oberhofer, Harald; Hille, Christoph; Matera, Sebastian; Reuter, Karsten

    2016-08-09

    The size-modified Poisson-Boltzmann (MPB) equation is an efficient implicit solvation model which also captures electrolytic solvent effects. It combines an account of the dielectric solvent response with a mean-field description of solvated finite-sized ions. We present a general solution scheme for the MPB equation based on a fast function-space-oriented Newton method and a Green's function preconditioned iterative linear solver. In contrast to popular multigrid solvers, this approach allows us to fully exploit specialized integration grids and optimized integration schemes. We describe a corresponding numerically efficient implementation for the full-potential density-functional theory (DFT) code FHI-aims. We show that together with an additional Stern layer correction the DFT+MPB approach can describe the mean activity coefficient of a KCl aqueous solution over a wide range of concentrations. The high sensitivity of the calculated activity coefficient on the employed ionic parameters thereby suggests to use extensively tabulated experimental activity coefficients of salt solutions for a systematic parametrization protocol.

  18. Galilean invariant resummation schemes of cosmological perturbations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peloso, Marco; Pietroni, Massimo, E-mail: peloso@physics.umn.edu, E-mail: massimo.pietroni@unipr.it

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them inmore » the so called Time-Flow, or TRG, equations.« less

  19. Kinematic reversal schemes for the geomagnetic dipole.

    NASA Technical Reports Server (NTRS)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  20. Quantum blind dual-signature scheme without arbitrator

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.