Science.gov

Sample records for active defrost scheme

  1. Activating the Microscale Edge Effect in a Hierarchical Surface for Frosting Suppression and Defrosting Promotion

    PubMed Central

    Chen, Xuemei; Ma, Ruiyuan; Zhou, Hongbo; Zhou, Xiaofeng; Che, Lufeng; Yao, Shuhuai; Wang, Zuankai

    2013-01-01

    Despite extensive progress, current icephobic materials are limited by the breakdown of their icephobicity in the condensation frosting environment. In particular, the frost formation over the entire surface is inevitable as a result of undesired inter-droplet freezing wave propagation initiated by the sample edges. Moreover, the frost formation directly results in an increased frost adhesion, posing severe challenges for the subsequent defrosting process. Here, we report a hierarchical surface which allows for interdroplet freezing wave propagation suppression and efficient frost removal. The enhanced performances are mainly owing to the activation of the microscale edge effect in the hierarchical surface, which increases the energy barrier for ice bridging as well as engendering the liquid lubrication during the defrosting process. We believe the concept of harnessing the surface morphology to achieve superior performances in two opposite phase transition processes might shed new light on the development of novel materials for various applications. PMID:23981909

  2. Defrosting Sand

    NASA Technical Reports Server (NTRS)

    2005-01-01

    19 June 2005 This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows dark spots formed in carbon dioxide frost that covers the surfaces of patches of sand in the south polar region. As spring arrived this year in the martian southern hemisphere, so began the annual defrosting process. The fact that sand dunes begin to defrost earlier than other surfaces, and that the defrosting process involves the formation of spots like these, has been known since the earliest days of the MGS mission.

    Location near: 66.8oS, 15.7oW Image width: 3 km (1.9 mi) Illumination from: upper left Season: Southern Spring

  3. Apparatus and method for evaporator defrosting

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Domitrovic, Ronald E.

    2001-01-01

    An apparatus and method for warm-liquid defrosting of the evaporator of a refrigeration system. The apparatus includes a first refrigerant expansion device that selectively expands refrigerant for cooling the evaporator, a second refrigerant expansion device that selectively expands the refrigerant after the refrigerant has passed through the evaporator, and a defrosting control for the first refrigerant expansion device and second refrigerant expansion device to selectively defrost the evaporator by causing warm refrigerant to flow through the evaporator. The apparatus is alternately embodied with a first refrigerant bypass and/or a second refrigerant bypass for selectively directing refrigerant to respectively bypass the first refrigerant expansion device and the second refrigerant expansion device, and with the defrosting control connected to the first refrigerant bypass and/or the second refrigerant bypass to selectively activate and deactivate the bypasses depending upon the current cycle of the refrigeration system. The apparatus alternately includes an accumulator for accumulating liquid and/or gaseous refrigerant that is then pumped either to a refrigerant receiver or the first refrigerant expansion device for enhanced evaporator defrosting capability. The inventive method of defrosting an evaporator in a refrigeration system includes the steps of compressing refrigerant in a compressor and cooling the refrigerant in the condenser such that the refrigerant is substantially in liquid form, passing the refrigerant substantially in liquid form through the evaporator, and expanding the refrigerant with a refrigerant expansion device after the refrigerant substantially passes through the evaporator.

  4. Defrosting Richardson Dunes

    NASA Technical Reports Server (NTRS)

    2003-01-01

    MGS MOC Release No. MOC2-492, 23 September 2003

    This is a mid-southern spring view, taken in August 2003, of defrosting patterns on sand dunes in Richardson Crater. The picture was acquired by the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC). The frost on these dunes might be a combination of frozen carbon dioxide left over from the previous winter, and water ice. As the ices sublime away, they create dark spots. Winds create dark streaks, either by moving the dark sand that underlies the frost, or by removing frost to expose the sand. Alternatively, the frost itself is roughened by the wind or has been made coarse by wind and sublimation processes. The Richardson dune field undergoes a long series of changes as it defrosts from late winter through spring and into early summer. Summer will arrive at the end of September 2003. This picture is located near 72oS, 181oW, and covers an area 3 km (1.9 mi) across. Sunlight illuminates the scene from the upper left.

  5. Defrost Temperature Termination in Supermarket Refrigeration Systems

    SciTech Connect

    Fricke, Brian A; Sharma, Vishaldeep

    2011-11-01

    The objective of this project was to determine the potential energy savings associated with implementing demand defrost strategies to defrost supermarket refrigerated display case evaporators, as compared to the widely accepted current practice of controlling display case defrost cycles with a preset timer. The defrost heater energy use of several representative display case types was evaluated. In addition, demand defrost strategies for refrigerated display cases as well as those used in residential refrigerator/freezers were evaluated. Furthermore, it is anticipated that future work will include identifying a preferred defrost strategy, with input from Retail Energy Alliance members. Based on this strategy, a demand defrost system will be designed which is suitable for supermarket refrigerated display cases. Limited field testing of the preferred defrost strategy will be performed in a supermarket environment.

  6. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., and Facility Requirements § 590.539 Defrosting operations. (a) Frozen egg products which are to be defrosted shall be defrosted in a sanitary manner. (b) Each container of frozen eggs shall be checked for condition and odor just prior to being emptied into the crusher or receiving tank. Frozen eggs which...

  7. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., and Facility Requirements § 590.539 Defrosting operations. (a) Frozen egg products which are to be defrosted shall be defrosted in a sanitary manner. (b) Each container of frozen eggs shall be checked for condition and odor just prior to being emptied into the crusher or receiving tank. Frozen eggs which...

  8. Shortening the Defrost Time on a Heat Pump Air Conditioner

    NASA Astrophysics Data System (ADS)

    Kuwahara, Eiji; Yamazaki, Masaya; Kawamura, Toshiaki

    Methods to shorten the defrost time have been studied on a heat pump air conditioner. The experiment has been carried out using a 0.75kW heat pump and the energy balance during defrosting has been analyzed. We have found that the following methods are effective to shorten the defrost time; (1) Increase in power inqut to the compressor during defrosting, (2) Utilization of the compressor for thermal energy storage, (3) Reduction of the water left on the outdoor heat exchanger fins. The heat pump with the new defrosting system has been made on an experimental basis. lts defrost time is 1 minute and 55 seconds under the defrost condition of the Japanese Industrial Standard. The defrost time of a conventional heat pump is about 4 or 5 minutes.

  9. Determination of coil defrosting loads. Part 5: Analysis of loads

    SciTech Connect

    Al-Mutawa, N.K.; Sherif, S.A.

    1998-10-01

    This paper (Part 5) provides load analysis for a hot-gas defrosted finned-tube freezer coil for entering air dry-bulb temperatures of {minus}8 F and {minus}13 F. The load analysis covers the total refrigeration load rate, average load sensible heat ratio, defrost heat input, defrost efficiency, and other relevant parameters that lead to the determination of the heat loads due to coil hot-gas defrosting. The intent is to provide some insight into the energy penalty associated with defrosting these types of coils using the hot-gas refrigerant method.

  10. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Defrosting operations. 590.539 Section 590.539 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION INSPECTION OF EGGS AND EGG PRODUCTS (EGG PRODUCTS INSPECTION ACT) Sanitary, Processing, and Facility Requirements §...

  11. 9 CFR 590.538 - Defrosting facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Defrosting facilities. 590.538 Section 590.538 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION INSPECTION OF EGGS AND EGG PRODUCTS (EGG PRODUCTS INSPECTION ACT) Sanitary,...

  12. 9 CFR 590.538 - Defrosting facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Defrosting facilities. 590.538 Section 590.538 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION INSPECTION OF EGGS AND EGG PRODUCTS (EGG PRODUCTS INSPECTION ACT) Sanitary, Processing, and Facility Requirements §...

  13. 9 CFR 590.539 - Defrosting operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 590.539 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG... objectionable odors and are unfit for human food (e.g., sour, musty, fermented, or decomposed odors) shall be.... Defrosted liquid shall not be held more than 16 hours prior to processing or drying. (e) Sanitary...

  14. Heat pump having improved defrost system

    DOEpatents

    Chen, Fang C.; Mei, Viung C.; Murphy, Richard W.

    1998-01-01

    A heat pump system includes, in an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant: a compressor; an interior heat exchanger; an exterior heat exchanger; an accumulator; and means for heating the accumulator in order to defrost the exterior heat exchanger.

  15. Determination of coil-defrosting loads. Part 4: Refrigeration/defrost cycle dynamics

    SciTech Connect

    Al-Mutawa, N.K.; Sherif, S.A.; Steadham, J.M.

    1998-10-01

    This is the fourth part of a paper intended to quantify heat loads due to coil defrosting using the hot-gas refrigerant method. Experience with defrosting industrial freezer coils suggests that the defrost heat input is partially removed with the melt, partially warms the coil and refrigerant, and partially escapes to the refrigerated space as sensible heat by convection and radiation or as latent heat by evaporation and sublimation. The evaporated and sublimated portions return again, both as a refrigeration load and as part of another defrosting cycle. The purpose of this part of the paper is to provide a time-dependent history of the variations of key variables during the complete refrigeration/defrost (R/D) cycle. In order to simulate the actual performance of freezer coils during the R/D cycle, three complete consecutive cycles are considered at several FCU-T entering air dry-bulb temperatures (EAT). The variables measured during the R/D cycles are described in detail in Part 2. Some of these variables were measured and plotted as a function of time for all cases tested. While the experimental program on which this paper partly reports examined FCU-T entering air dry-bulb temperatures of 0 F, {minus}8 F, and {minus}13 F, only the last two cases will be included in this paper.

  16. Defrosting Polar Dunes--'The Snow Leopard'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The patterns created by dark spots on defrosting south polar dunes are often strange and beautiful. This picture, which the Mars Orbiter Camera team has dubbed, 'the snow leopard,' shows a dune field located at 61.5oS, 18.9oW, as it appeared on July 1, 1999. The spots are areas where dark sand has been exposed from beneath bright frost as the south polar winter cap begins to retreat. Many of the spots have a diffuse, bright ring around them this is thought to be fresh frost that was re-precipitated after being removed from the dark spot. The spots seen on defrosting polar dunes are a new phenomenon that was not observed by previous spacecraft missions to Mars. Thus, there is much about these features that remains unknown. For example, no one yet knows why the dunes become defrosted by forming small spots that grow and grow over time. No one knows for sure if the bright rings around the dark spots are actually composed of re-precipitated frost. And no one knows for sure why some dune show spots that appear to be 'lined-up' (as they do in the picture shown here).

    This Mars Global Surveyor Mars Orbiter Camera image is illuminated from the upper left. North is toward the upper right. The scale bar indicates a distance of 200 meters (656 feet).

    Malin Space Science Systems and the California Institute of Technology built the MOC using spare hardware from the Mars Observer mission. MSSS operates the camera from its facilities in San Diego, CA. The Jet Propulsion Laboratory's Mars Surveyor Operations Project operates the Mars Global Surveyor spacecraft with its industrial partner, Lockheed Martin Astronautics, from facilities in Pasadena, CA and Denver, CO.

  17. Development of a high efficiency, automatic defrosting refrigerator-freezer

    NASA Astrophysics Data System (ADS)

    Topping, R. F.; Lee, W. D.

    The development of an energy efficient refrigerator freezer prototype to accelerate the commercialization of residential, high efficiency refrigerator freezers is described. A computer model developed to simulate the cabinet and refrigeration unit performance was used to evaluate alternative designs and optimize the cabinet insulation as well as the refrigeration component integration. Placement of polyurethane foam insulation in the cabinet and thicker insulation in the doors were used to reduce the closed door heat load of the prototype. Modifications to the evaporator system provide automatic frost-free operation with a significantly reduced defrost energy requirement. Resulting higher moisture levels in the refrigerator compartment enhance fresh food storage. A dual control system, different from most models which use only one active control, provides precise temperature regulation in both the freezer and refrigerator compartments.

  18. Development of a demand defrost controller. Final report

    SciTech Connect

    Borton, D.N.; Walker, D.H.

    1993-10-01

    The purpose of this project was to develop and commercialize a demand defrost controller that initiates defrosts of refrigeration systems only when required. The standard method of control is a time clock that usually defrosts too often, which wastes energy. The controller developed by this project uses an algorithm based on the temperature difference between the discharge and return of the display case air curtain along with several time settings to defrost only when needed. This controller was field tested in a supermarket where it controlled defrost of the low-temperature display cases. According to test results the controller could reduce annual energy consumption by 20,000 and 62,000 kWh for hot gas and electric defrost, respectively. The controller saves electric demand as well as energy, is adaptable to ambient air conditions, and provides valuable savings throughout the year. The savings are greatest for low-temperature systems that use the most energy. A less tangible benefit of the demand controller is the improvement in food quality that results from fewer defrosts.

  19. Refrigerated display case demand defrost controller: Field demonstration results. Final report

    SciTech Connect

    Hindmond, J.

    1998-12-01

    EPRI in partnership with Johnson Controls/Encore has developed a new demand defrost controller for use in refrigerated display cases in supermarkets. This ``sensorless`` defrost system uses a control algorithm -- currently being patented by EPRI -- that uses the microprocessor power of the energy management system to learn from the defrost pattern to automatically create a new defrost schedule. This algorithm offers a significant advantage over conventional demand defrost technology, which typically requires additional sensors to be installed in the cases. Demand defrost sensors are usually expensive, difficult to install, and not as reliable as existing defrost termination sensors. The algorithm was implemented on three low-temperature reach-in frozen food cases with electric defrost in the Grand Union supermarket. The defrost algorithm increased the time between defrost cycles from the nominal value of one day to the maximum limit of three days. This maximum limit is programmed in the software, and can be changed. Less frequent defrost operation reduced electric heater consumption by an average of 63%. Applying the algorithm to all 15 cases with electric defrost at the store would save 38,000 kWh on an annual basis. The measured results have also confirmed that demand defrost can reduce the impact of defrost operation on average case temperatures.

  20. Measured impacts of supermarket humidity level on defrost performance and refrigerating system energy use

    SciTech Connect

    Henderson, H.I.; Khattar, M.

    1999-07-01

    This paper presents field-monitor data from two supermarkets where the impact of space humidity on refrigerating system energy use was evaluated. Direct digital control (DDC) systems were used at both stores to collect 15-minute monitored data. At Store A in Minneapolis, the DDC system was used to monitor system performance as well as to implement temperature-terminated control in place of time-terminated control on 16 refrigerated zones using hot gas defrost. At Store B in Indianapolis, the DDC system was used to quantify the performance trends for the single compressor rack system with electric defrost. The results at Store B showed that refrigerating system energy use decreases by nearly 10 kWh/day for each 1% drop in space relative humidity, or about 0.4% of average annual system energy use. This value includes the impact of reduced latent loads, the reduction in direct energy use and imposed load from reduced electric defrost heater operation, and the smaller imposed load from reduced anti-sweat heater energy use. The measured reductions agree well with the impact predicted using the calculation methods developed by Howell (1933b) in ASHRAE Research Project 596. At Store A, the measured data show that implementing temperature-terminated defrost reduced refrigerating system energy use by nearly 70 kWh/day over the winter period when the average space humidity was 22% RH. The savings from temperature-terminated defrost increase by 4 kWh/day per each 1% drop in relative humidity. At both stores, the same type of mechanical controls were used to duty cycle the anti-sweat heaters based on store dew point. Anti-sweat heater electricity use was observed to decrease by 4.6 kWh/day at Store B and 3.4 kWh/day at Store A for each 1% drop in relative humidity. At Store A, a more aggressive control scheme was implemented with the DDC system that reduced anti-sweat heater energy use by 7.8 kWh/day per % RH. The more aggressive control approach was reported to properly

  1. Defrosting processes on the Russell crater megadune of Mars: quantitative analysis and interpretation

    NASA Astrophysics Data System (ADS)

    Douté, S.; Wu, C.; Guo, X.; Luo, B.

    2015-10-01

    The megadune located in the Russell Crater of Mars is the siege of a complex defrosting sequence imply- ing seasonal CO2 and a small amount of water ice in each spring [3]. Besides on its pole facing slope, the dune displays gullies thought to have been carved by liquid water although they could also be related to dry avalanches triggered by the defrosting activity. In order to improve our understanding of seasonal versus secular phenomena, we conducted a quantitative analysis of a time series of joint image pairs : hyperspectral(CRISM) and high-resolution panchromatic (HiRISE),both sensors operating on board MRO. Automatic extraction and characterization of sublimation structures(e.g. dark spots) in the HiRISE images is performed on the basis of their geometry or their texture with image processing methods. The different conditions of CO2 ice are mapped by applying unsupervised linear spec- tral unmixing methods on the CRISM images. Modeling the spectral signatures with a radiative transfer model reveals the structural organization of the ice and its level of dust contamination. Finally we propose a joint interpretation of all the resulting products for understanding the defrosting processes and their role in shaping the dune.

  2. Frost sensor for use in defrost controls for refrigeration

    DOEpatents

    French, Patrick D.; Butz, James R.; Veatch, Bradley D.; O'Connor, Michael W.

    2002-01-01

    An apparatus and method for measuring the total thermal resistance to heat flow from the air to the evaporative cooler fins of a refrigeration system. The apparatus is a frost sensor that measures the reduction in heat flow due to the added thermal resistance of ice (reduced conduction) as well as the reduction in heat flow due to the blockage of airflow (reduced convection) from excessive ice formation. The sensor triggers a defrost cycle when needed, instead of on a timed interval. The invention is also a method for control of frost in a system that transfers heat from air to a refrigerant along a thermal path. The method involves measuring the thermal conductivity of the thermal path from the air to the refrigerant, recognizing a reduction in thermal conductivity due to the thermal insulation effect of the frost and due to the loss of airflow from excessive ice formation; and controlling the defrosting of the system.

  3. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  4. 16 CFR Appendix B1 to Part 305 - Upright Freezers With Manual Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Upright Freezers With Manual Defrost B1 Appendix B1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF...) Pt. 305, App. B1 Appendix B1 to Part 305—Upright Freezers With Manual Defrost Range...

  5. Variable interval time/temperature (VITT) defrost-control-system evaluation

    SciTech Connect

    1980-08-12

    Two variable-interval-time/temperature (VITT) heat pump defrost control systems are analyzed to determine if systems manufactured by Honeywell and Ranco qualify for credit for heat pumps with demand defrost control. The operation of the systems is described. VITT controls are not demand defrost control systems but utilize demand defrost control as backup systems in most Ranco models and all Honeywell models. The evaluations and results, intended to provide DOE information in making its determinations regarding credits for the control systems are discussed. The evaluation methodology utilizes a modified version of the Heat Pump Seasonal Performance Model (HPSPM) and the important modifications are discussed in Appendix A. Appendix B contains a detailed listing and discussion of the HPSPM output. (MCW)

  6. Defrosting Polar Dunes--'They Look Like Bushes!'

    NASA Technical Reports Server (NTRS)

    1999-01-01

    'They look like bushes!' That's what almost everyone says when they see the dark features found in pictures taken of sand dunes in the polar regions as they are beginning to defrost after a long, cold winter. It is hard to escape the fact that, at first glance, these images acquired by the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) over both polar regions during the spring and summer seasons, do indeed resemble aerial photographs of sand dune fields on Earth--complete with vegetation growing on and around them! Of course, this is not what the features are, as we describe below and in related picture captions. Still, don't they look like vegetation to you? Shown here are two views of the same MGS MOC image. On the left is the full scene, on the right is an expanded view of a portion of the scene on the left. The bright, smooth surfaces that are dotted with occasional, nearly triangular dark spots are sand dunes covered by winter frost.

    The MGS MOC has been used over the past several months (April-August 1999) to monitor dark spots as they form and evolve on polar dune surfaces. The dark spots typically appear first along the lower margins of a dune--similar to the position of bushes and tufts of grass that occur in and among some sand dunes on Earth.

    Because the martian air pressure is very low--100 times lower than at Sea Level on Earth--ice on Mars does not melt and become liquid when it warms up. Instead, ice sublimes--that is, it changes directly from solid to gas, just as 'dry ice' does on Earth. As polar dunes emerge from the months-long winter night, and first become exposed to sunlight, the bright winter frost and snow begins to sublime. This process is not uniform everywhere on a dune, but begins in small spots and then over several months it spreads until the entire dune is spotted like a leopard.

    The early stages of the defrosting process--as in the picture shown here--give the impression that something is 'growing' on the dunes

  7. Defrosting Polar Dunes--Dark Spots and Wind Streaks

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The first time that the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC)team saw dark spots on defrosting dune surfaces was in August and September of 1998. At that time, it was the north polar seasonal frost cap that was subliming away (more recent images from 1999 have shown the south polar frosts). This picture (above) shows a small portion of the giant dune field that surrounds the north polar region, as it appeared on August 23, 1998. At the time, it was early northern spring and the dunes were still covered with winter frost.

    Dark spots had appeared on the north polar dunes, and many of them exhibited a radial or semi-radial pattern of dark streaks and streamers. At first, there was speculation that the streaks indicated that the defrosting process might somehow involve explosions! The dark spots seemed to resemble small craters with dark, radial ejecta. It seemed possible that frozen carbon dioxide trapped beneath water ice might somehow heat up, turn to gas, expand, and then 'explode' in either a small blast or at least a 'puff' of air similar to that which comes from the blowhole of a surfacing whale or seal.

    The image shown here changed the earlier impression. The dark spots and streaks do not result from explosions. The spots--though not well understood--represent the earliest stages of defrosting on the sand dunes. The streaks, instead of being caused by small explosions, are instead the result of wind. In this picture, the fine, dark streaks show essentially identical orientations from spot to spot (e.g., compare the spots seen in boxes (a) and (b)). Each ray of dark material must result from wind blowing from a particular direction--for example, all of the spots in this picture exhibit a ray that points toward the upper left corner of the image, and each of these rays indicates the same wind regime. Each spot also has a ray pointing toward the lower right and top/upper-right. These, too, must indicate periods when the wind was strong

  8. Comparison of schemes for active sub-millimeter wave imaging

    NASA Astrophysics Data System (ADS)

    Furxhi, Orges; Jacobs, Eddie L.

    2011-11-01

    Various schemes for active imaging require different allocations of source power and can result in different overall signal to noise ratios. At the University of Memphis we have developed an image-plane scanning device used with a single pixel detector to form video rate images of the scene. Imaging with this device requires flood illumination of the scene. Because sub-millimeter wave sources typically produce low power, it is a common belief that flood illumination results in low detected signal power and therefore low signal to noise ratios (SNR) at the detector. In this work we quantify the SNR at the detector for our system and compare it to conventional imaging systems, conjugate point imaging systems, and focal plane array imaging. Unlike the other two systems, imaging with our device requires an additional pixel formation step; therefore, the SNR at the detector is not the per-pixel SNR. We present the limits of the per-pixel SNR and discuss its dependence on various device components.

  9. WARM-LIQUID DEFROST FOR COMMERCIAL FOOD DISPLAY CASES: EXPERIMENTAL INVESTIGATION AT 32.2 DEGREES C CONDENSING

    EPA Science Inventory

    The paper gives results of an experimental investigation at 32.2 C condensing of warm-liquid defrost for commercial food display cases. A refrigeration test rig with two open cases and two reach-in cases was tested using warm-liquid defrost (WLD) at -34.4 C evaporating, 32.2 C co...

  10. MULTI-FACTOR POTENCY SCHEME FOR COMPARING THE CARCINOGENIC ACTIVITY OF CHEMICALS

    EPA Science Inventory

    A scheme for ranking the quantitative activity `of chemical carcinogens is described. his activity scheme uses as its base, dose potency measured as TD50, which after conversion into an inverse log scale, a decile scale, is adjusted by weighing factors that describe other paramet...

  11. Active self-sensing scheme development for structural health monitoring

    NASA Astrophysics Data System (ADS)

    Lee, Sang Jun; Sohn, Hoon

    2006-12-01

    Smart materials such as lead zirconate titanate (PZT) have been widely used for generating and measuring guided waves in solid media. The guided waves are then used to detect local defects for structural health monitoring (SHM) applications. In this study, a self-sensing system, composed of self-sensing algorithms and a self-sensing circuit equivalent to a charge amplifier, is developed so that a single PZT wafer can be used for simultaneous actuation and sensing. First, a PZT wafer is modeled as a single capacitor and a voltage source, and a so-called scaling factor, defined as the ratio of the PZT capacitance to the capacitance of the feedback capacitor in the self-sensing circuit, is estimated by applying known waveforms to the PZT wafer. Then, the mechanical response of the PZT wafer coupled with the host structure's response is extracted from the measured PZT output voltage when an arbitrary excitation is applied to the same PZT wafer. While existing self-sensing techniques focus on vibration controls, the proposed self-sensing scheme attempts to improve the accuracy of extracted sensing signals in the time domain. The simplicity, adaptability and autonomous nature of the proposed self-sensing scheme make it attractive for continuous monitoring of structures in the field. The effectiveness of the proposed self-sensing scheme is investigated through numerical simulations and experiments on a cantilever beam.

  12. 16 CFR Appendix A2 to Part 305 - Refrigerators and Refrigerators-Freezers With Manual Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerators and Refrigerators-Freezers With Manual Defrost A2 Appendix A2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND...

  13. 16 CFR Appendix A1 to Part 305 - Refrigerators With Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerators With Automatic Defrost A1 Appendix A1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  14. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  15. 16 CFR Appendix A2 to Part 305 - Refrigerators and Refrigerators-Freezers With Manual Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerators and Refrigerators-Freezers With Manual Defrost A2 Appendix A2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND...

  16. 16 CFR Appendix B2 to Part 305 - Upright Freezers With Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Upright Freezers With Automatic Defrost B2 Appendix B2 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  17. 16 CFR Appendix A1 to Part 305 - Refrigerators With Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerators With Automatic Defrost A1 Appendix A1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  18. 16 CFR Appendix A3 to Part 305 - Refrigerator-Freezers With Partial Automatic Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Partial Automatic Defrost A3 Appendix A3 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF...

  19. 16 CFR Appendix B1 to Part 305 - Upright Freezers With Manual Defrost

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Upright Freezers With Manual Defrost B1 Appendix B1 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME...

  20. 16 CFR Appendix A3 to Part 305 - Refrigerator-Freezers With Partial Automatic Defrost

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Partial Automatic Defrost A3 Appendix A3 to Part 305 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULE CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF...

  1. 49 CFR 571.103 - Standard No. 103; Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 6 2014-10-01 2014-10-01 false Standard No. 103; Windshield defrosting and defogging systems. 571.103 Section 571.103 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE SAFETY STANDARDS Federal Motor...

  2. 49 CFR 571.103 - Standard No. 103; Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 6 2013-10-01 2013-10-01 false Standard No. 103; Windshield defrosting and defogging systems. 571.103 Section 571.103 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE SAFETY STANDARDS Federal Motor...

  3. 49 CFR 571.103 - Standard No. 103; Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 6 2012-10-01 2012-10-01 false Standard No. 103; Windshield defrosting and defogging systems. 571.103 Section 571.103 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE SAFETY STANDARDS Federal Motor...

  4. 49 CFR 571.103 - Standard No. 103; Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 6 2011-10-01 2011-10-01 false Standard No. 103; Windshield defrosting and defogging systems. 571.103 Section 571.103 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE SAFETY STANDARDS Federal Motor...

  5. A Novel, Simplified Scheme for Plastics Identification: "JCE" Classroom Activity 104

    ERIC Educational Resources Information Center

    Harris, Mary E.; Walker, Barbara

    2010-01-01

    In this Activity, students identify samples of seven types of recyclable plastic by using a flowchart scheme. The flowchart procedure includes making density comparisons of the plastic samples in water and alcohol and observing physical changes of plastic samples subjected to boiling water temperatures and exposure to acetone. This scheme is…

  6. An analytical model for hot-gas defrosting of a cylindrical coil cooler. Part 2: Model results and conclusions

    SciTech Connect

    Al-Mutawa, N.K.; Sherif, S.A.

    1998-10-01

    The experimental work conducted in a companion investigation (ASHRAE RP-622) has documented the energy penalty associated with using hot-gas defrosting in industrial freezers. This penalty is realized by the large amount of the defrost heat input being transferred to the refrigerated space due to the evaporation of the melt and sublimation of frost (latent heat), as compared with the smaller amount that is utilized to melt the frost. Part of this penalty is also attributed to the residual heat that goes into the refrigerant during the defrosting process. This heat has to be extracted from the system during the refrigeration portion of the R/D cycle. The work described in this paper attempts to model the hot-gas defrosting process and quantify the effects of the different factors that influence it.

  7. Passive and active pulse stacking scheme for pulse shaping

    DOEpatents

    Harney, Robert C.; Schipper, John F.

    1977-01-01

    Apparatus and method for producing a sequence of radiation pulses with a pulse envelope of time variation which is controllable by an external electromagnetic signal applied to an active medium or by a sectored reflector, through which the radiation passes.

  8. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    PubMed

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges. PMID:27106584

  9. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  10. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  11. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial..., App. A4 Appendix A4 to Part 305—Refrigerator-Freezers With Automatic Defrost With Top-Mounted...

  12. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  13. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial..., App. A7 Appendix A7 to Part 305—Refrigerator-freezers With Automatic Defrost With Top-mounted...

  14. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  15. 16 CFR Appendix A4 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice Service A4 Appendix A4 to Part 305 Commercial...—Refrigerator-Freezers With Automatic Defrost With Top-Mounted Freezer Without Through-the-Door Ice...

  16. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  17. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  18. 16 CFR Appendix A7 to Part 305 - Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service A7 Appendix A7 to Part 305 Commercial...—Refrigerator-freezers With Automatic Defrost With Top-mounted Freezer With Through-the-door Ice Service...

  19. An analytical model for hot-gas defrosting of a cylindrical coil cooler. Part 1: Model development

    SciTech Connect

    Al-Mutawa, N.K.; Sherif, S.A.

    1998-10-01

    In a companion experimental investigation (ASHRAE RP-622), it was observed that the evaporation and sublimation heat rates were significantly larger than the melting heat rate during hot-gas defrosting. Part of the rationale for conducting the present investigation was to validate the above observation. Thus, the purpose of this paper is to describe a mathematical model for predicting the evaporation, sublimation, and melting heat rates on a frosted cylindrical cooler during hot-gas defrosting. The frosted cylindrical cooler represents a single nonfinned tube in the first row of a typical coil employed in industrial refrigeration applications. This model should provide some insight into the hot-gas defrosting processes typically found in the operation of true-to-life industrial freezers.

  20. A multi-modal prostate segmentation scheme by combining spectral clustering and active shape models

    NASA Astrophysics Data System (ADS)

    Toth, Robert; Tiwari, Pallavi; Rosen, Mark; Kalyanpur, Arjun; Pungavkar, Sona; Madabhushi, Anant

    2008-03-01

    Segmentation of the prostate boundary on clinical images is useful in a large number of applications including calculating prostate volume during biopsy, tumor estimation, and treatment planning. Manual segmentation of the prostate boundary is, however, time consuming and subject to inter- and intra-reader variability. Magnetic Resonance (MR) imaging (MRI) and MR Spectroscopy (MRS) have recently emerged as promising modalities for detection of prostate cancer in vivo. In this paper we present a novel scheme for accurate and automated prostate segmentation on in vivo 1.5 Tesla multi-modal MRI studies. The segmentation algorithm comprises two steps: (1) A hierarchical unsupervised spectral clustering scheme using MRS data to isolate the region of interest (ROI) corresponding to the prostate, and (2) an Active Shape Model (ASM) segmentation scheme where the ASM is initialized within the ROI obtained in the previous step. The hierarchical MRS clustering scheme in step 1 identifies spectra corresponding to locations within the prostate in an iterative fashion by discriminating between potential prostate and non-prostate spectra in a lower dimensional embedding space. The spatial locations of the prostate spectra so identified are used as the initial ROI for the ASM. The ASM is trained by identifying user-selected landmarks on the prostate boundary on T2 MRI images. Boundary points on the prostate are identified using mutual information (MI) as opposed to the traditional Mahalanobis distance, and the trained ASM is deformed to fit the boundary points so identified. Cross validation on 150 prostate MRI slices yields an average segmentation sensitivity, specificity, overlap, and positive predictive value of 89, 86, 83, and 93% respectively. We demonstrate that the accurate initialization of the ASM via the spectral clustering scheme is necessary for automated boundary extraction. Our method is fully automated, robust to system parameters, and computationally efficient.

  1. Agent-based power sharing scheme for active hybrid power sources

    NASA Astrophysics Data System (ADS)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  2. The Nature of All "Inappropriate Referrals" Made to a Countywide Physical Activity Referral Scheme: Implications for Practice

    ERIC Educational Resources Information Center

    Johnston, Lynne Halley; Warwick, Jane; De Ste Croix, Mark; Crone, Diane; Sldford, Adrienne

    2005-01-01

    Objective: The aim of this study was to evaluate the impact of a centralised referral mechanism (CRM) upon the number and type of "inappropriate referrals" made to a countywide physical activity referral scheme. Design: Case study. Method: Phase 1: Hierarchical Content Analysis of 458 "inappropriate referrals" made to a countywide scheme over a…

  3. A magnetic resonance spectroscopy driven initialization scheme for active shape model based prostate segmentation.

    PubMed

    Toth, Robert; Tiwari, Pallavi; Rosen, Mark; Reed, Galen; Kurhanewicz, John; Kalyanpur, Arjun; Pungavkar, Sona; Madabhushi, Anant

    2011-04-01

    Segmentation of the prostate boundary on clinical images is useful in a large number of applications including calculation of prostate volume pre- and post-treatment, to detect extra-capsular spread, and for creating patient-specific anatomical models. Manual segmentation of the prostate boundary is, however, time consuming and subject to inter- and intra-reader variability. T2-weighted (T2-w) magnetic resonance (MR) structural imaging (MRI) and MR spectroscopy (MRS) have recently emerged as promising modalities for detection of prostate cancer in vivo. MRS data consists of spectral signals measuring relative metabolic concentrations, and the metavoxels near the prostate have distinct spectral signals from metavoxels outside the prostate. Active Shape Models (ASM's) have become very popular segmentation methods for biomedical imagery. However, ASMs require careful initialization and are extremely sensitive to model initialization. The primary contribution of this paper is a scheme to automatically initialize an ASM for prostate segmentation on endorectal in vivo multi-protocol MRI via automated identification of MR spectra that lie within the prostate. A replicated clustering scheme is employed to distinguish prostatic from extra-prostatic MR spectra in the midgland. The spatial locations of the prostate spectra so identified are used as the initial ROI for a 2D ASM. The midgland initializations are used to define a ROI that is then scaled in 3D to cover the base and apex of the prostate. A multi-feature ASM employing statistical texture features is then used to drive the edge detection instead of just image intensity information alone. Quantitative comparison with another recent ASM initialization method by Cosio showed that our scheme resulted in a superior average segmentation performance on a total of 388 2D MRI sections obtained from 32 3D endorectal in vivo patient studies. Initialization of a 2D ASM via our MRS-based clustering scheme resulted in an average

  4. Dynamo-based scheme for forecasting the magnitude of solar activity cycles

    NASA Technical Reports Server (NTRS)

    Layden, A. C.; Fox, P. A.; Howard, J. M.; Sarajedini, A.; Schatten, K. H.

    1991-01-01

    This paper presents a general framework for forecasting the smoothed maximum level of solar activity in a given cycle, based on a simple understanding of the solar dynamo. This type of forecasting requires knowledge of the sun's polar magnetic field strength at the preceding activity minimum. Because direct measurements of this quantity are difficult to obtain, the quality of a number of proxy indicators already used by other authors is evaluated, which are physically related to the sun's polar field. These indicators are subjected to a rigorous statistical analysis, and the analysis technique for each indicator is specified in detail in order to simplify and systematize reanalysis for future use. It is found that several of these proxies are in fact poorly correlated or uncorrelated with solar activity, and thus are of little value for predicting activity maxima. Also presented is a scheme in which the predictions of the individual proxies are combined via an appropriately weighted mean to produce a compound prediction. The scheme is then applied to the current cycle 22, and a maximum smoothed international sunspot number of 171 + or - 26 is estimated.

  5. Active sway control of a gantry crane using hybrid input shaping and PID control schemes

    NASA Astrophysics Data System (ADS)

    Mohd Tumari, M. Z.; Shabudin, L.; Zawawi, M. A.; Shah, L. H. Ahmad

    2013-12-01

    This project presents investigations into the development of hybrid input-shaping and PID control schemes for active sway control of a gantry crane system. The application of positive input shaping involves a technique that can reduce the sway by creating a common signal that cancels its own vibration and used as a feed-forward control which is for controlling the sway angle of the pendulum, while the proportional integral derivative (PID) controller is used as a feedback control which is for controlling the crane position. The PID controller was tuned using Ziegler-Nichols method to get the best performance of the system. The hybrid input-shaping and PID control schemes guarantee a fast input tracking capability, precise payload positioning and very minimal sway motion. The modeling of gantry crane is used to simulate the system using MATLAB/SIMULINK software. The results of the response with the controllers are presented in time domains and frequency domains. The performances of control schemes are examined in terms of level of input tracking capability, sway angle reduction and time response specification.

  6. Enhancing Educational Research and Development Activity through Small Grant Schemes: A Case Study

    ERIC Educational Resources Information Center

    Morris, Clare; Fry, Heather

    2006-01-01

    There are many funding schemes in existence for small projects in educational development, but fewer equivalent research schemes. Data from an evaluation of two schemes at one institution are used as the catalyst for considering such schemes in wider contextual and theoretical perspectives. The evaluation analysed success rate data, project…

  7. Formation scheme and antioxidant activity of a novel Maillard pigment, pyrrolothiazolate, formed from cysteine and glucose.

    PubMed

    Noda, Kyoko; Terasawa, Naoko; Murata, Masatsune

    2016-06-15

    We recently identified 6-hydroxy-3[R],7a[S]-dimethyl-7-oxo-2,3-dihydropyrrolo[2,1-b]thiazole-3-calboxylic acid, a novel pyrrolothiazole derivative carrying a carboxy group and named pyrrolothiazolate, as a Mallard pigment formed from l-cysteine and d-glucose. Here we described the formation of its enantiomer, the plausible formation scheme of pyrrolothiazolate, and its antioxidant activity. When d-cysteine was used instead of l-cysteine in the reaction mixture, the enantiomer of pyrrolothiazolate was obtained. The carbon at position 1 of glucose was incorporated into two methyl groups of pyrrolothiazolate. The pigment was considered to be formed through 1-deoxyglucosone (1-DG). The dehydrated isomer of 1-DG would be condensed with the thiol and amino groups of cysteine. This condensate was dehydrated and cyclized to form pyrrolothiazolate. This compound was an antioxidant showing radical scavenging activity. PMID:26987433

  8. Research on the system scheme and experiment for the active laser polarization imaging

    NASA Astrophysics Data System (ADS)

    Fu, Qiang; Duan, Jin; Zhao, Rui; Li, Zheng; Zhang, Su; Zhan, Juntong; Zhu, Yong; Jiang, Hui-Lin

    2015-10-01

    The polarization imaging detection technology increased the polarization information on the basis of the intensity imaging, which is extensive application in the military and civil and other fields. The research present and development trend of polarization imaging detection technology was introduce, the system scheme of the active polarization imaging detection was put forward, and the key technologies such as the polarization information detection, optical system design, polarization radiation calibration and image fusion approach was analyzed. On this basis, detection system by existing equipment of laboratory was set up, and on the different materials such as wood, metal, plastic and goal was detected by polarization imaging to realize the active polarization imaging detection. The results show that image contrast of the metal and man-made objects is higher, the polarization effect is better, which provided the basis on the better performance of the polarization imaging instruments.

  9. Defrosting North

    NASA Technical Reports Server (NTRS)

    2004-01-01

    15 June 2004 Spring is upon the martian northern hemisphere, and the north polar cap is shrinking. This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image, acquired on 12 June 2004, shows the retreating edge of the seasonal north polar cap near 70oN, 209oW. Low clouds and fogs stream away from the cap edge as it sublimes away. North is approximately up and the image covers an area roughly 500 km (311 mi) across. Sunlight illuminates the scene from the lower left. The crater containing a thick mound of material near the right-center of the image is Korolev.

  10. Performance Analysis of Positive-feedback-based Active Anti-islanding Schemes for Inverter-Based Distributed Generators

    SciTech Connect

    Du, Pengwei; Aponte, Erick E.; Nelson, J. Keith

    2010-06-14

    Recently proposed positive-feedback-based anti-islanding schemes (AI) are highly effective in preventing islanding without causing any degradation in power quality. This paper aims to analyze the performance of these schemes quantitatively in the context of the dynamic models of inverter-based distributed generators (DG). In this study, the characteristics of these active anti-islanding methods are discussed and design guidelines are derived.

  11. Defrosting the Digital Library: Bibliographic Tools for the Next Generation Web

    PubMed Central

    Hull, Duncan; Pettifer, Steve R.; Kell, Douglas B.

    2008-01-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as “thought in cold storage,” and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines. PMID:18974831

  12. Defrosting the digital library: bibliographic tools for the next generation web.

    PubMed

    Hull, Duncan; Pettifer, Steve R; Kell, Douglas B

    2008-10-01

    Many scientists now manage the bulk of their bibliographic information electronically, thereby organizing their publications and citation material from digital libraries. However, a library has been described as "thought in cold storage," and unfortunately many digital libraries can be cold, impersonal, isolated, and inaccessible places. In this Review, we discuss the current chilly state of digital libraries for the computational biologist, including PubMed, IEEE Xplore, the ACM digital library, ISI Web of Knowledge, Scopus, Citeseer, arXiv, DBLP, and Google Scholar. We illustrate the current process of using these libraries with a typical workflow, and highlight problems with managing data and metadata using URIs. We then examine a range of new applications such as Zotero, Mendeley, Mekentosj Papers, MyNCBI, CiteULike, Connotea, and HubMed that exploit the Web to make these digital libraries more personal, sociable, integrated, and accessible places. We conclude with how these applications may begin to help achieve a digital defrost, and discuss some of the issues that will help or hinder this in terms of making libraries on the Web warmer places in the future, becoming resources that are considerably more useful to both humans and machines. PMID:18974831

  13. H I 21 cm ABSORPTION AND UNIFIED SCHEMES OF ACTIVE GALACTIC NUCLEI

    SciTech Connect

    Curran, S. J.; Whiting, M. T.

    2010-03-20

    In a recent study of z >= 0.1 active galactic nuclei (AGNs), we found that 21 cm absorption has never been detected in objects in which the ultraviolet luminosity exceeds L{sub UV} {approx} 10{sup 23} W Hz{sup -1}. In this paper, we further explore the implications that this has for the currently popular consensus that it is the orientation of the circumnuclear obscuring torus, invoked by unified schemes of AGNs, which determines whether absorption is present along our sight line. The fact that at L{sub UV} {approx}< 10{sup 23} W Hz{sup -1}, both type-1 and type-2 objects exhibit a 50% probability of detection, suggests that this is not the case and that the bias against detection of H I absorption in type-1 objects is due purely to the inclusion of the L{sub UV} {approx}> 10{sup 23} W Hz{sup -1} sources. Similarly, the ultraviolet luminosities can also explain why the presence of 21 cm absorption shows a preference for radio galaxies over quasars and the higher detection rate in compact sources, such as compact steep spectrum or gigahertz peaked spectrum sources, may also be biased by the inclusion of high-luminosity sources. Being comprised of all 21 cm searched sources at z >= 0.1, this is a necessarily heterogeneous sample, the constituents of which have been observed by various instruments. By this same token, however, the dependence on the UV luminosity may be an all encompassing effect, superseding the unified schemes model, although there is the possibility that the exclusive 21 cm non-detections at high UV luminosities could be caused by a bias toward gas-poor ellipticals. Additionally, the high UV fluxes could be sufficiently exciting/ionizing the H I above 21 cm detection thresholds, although the extent to which this is related to the neutral gas deficit in ellipticals is currently unclear. Examining the moderate UV luminosity (L{sub UV} {approx}< 10{sup 23} W Hz{sup -1}) sample further, from the profile widths and offsets from the systemic velocities

  14. Active defense scheme against DDoS based on mobile agent and network control in network confrontation

    NASA Astrophysics Data System (ADS)

    Luo, Rong; Li, Junshan; Ye, Xia; Wang, Rui

    2013-03-01

    In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation's control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.

  15. 16 CFR Appendix A8 to Part 305 - Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-freezers With Automatic Defrost With Side-mounted Freezer With Through-the-door Ice Service A8 Appendix A8 to Part 305 Commercial... With Through-the-door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  16. 16 CFR Appendix A5 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Side-Mounted Freezer Without Through-the-Door Ice Service A5 Appendix A5 to Part 305 Commercial... Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total Refrigerated Volume...

  17. 16 CFR Appendix A6 to Part 305 - Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Refrigerator-Freezers With Automatic Defrost With Bottom-Mounted Freezer Without Through-the-Door Ice Service A6 Appendix A6 to Part 305 Commercial... Freezer Without Through-the-Door Ice Service Range Information Manufacturer's Rated Total...

  18. Cometary cores with multiple structure from the oort cloud and the general scheme of origin of unusually active comets

    SciTech Connect

    Davydov, V.D.

    1986-03-01

    A newly conceived scheme is constructed which synthesizes consistent solutions to several principal problems concerning multiple-core comets: a power mechanism, a place and epoch of formation of the multiple core structure, the qualitative differences between current structure and younger structure, the origin of two types of cometary orbits, and a trigger mechanism for recent ignition of cometary activity of a multiple core. This scheme uses a new explanation of the ejection of dust (including icy dust) from various cometary cores as evidence that the material of multiple-core comets may be collisionally ablated at the expense of the comet-centered orbital energy of a multitude of massive boulders (see Kosm. Issled., No. 6 (1984)). Natural mechanisms are shown which preserve this important feature of multiple cores. The concept consists of the following elements: evolution of a system of satellites of the core toward a colli sionless structure; preservation of internal kinetic energy in the collisionless system over astro nomically lengthy time scales; tidal initiation of a collisional mechanism with the first revolution of the ancient multiple core in the zone of visibility. It is possible that such revoltions correspond to the existence of especially active comets in nearly parabolic orbits. Multiple structure in the core of active short-period comets might be descended from a nearly parabolic comet (if the theory holds on perturbational multistage transformation of near-parabolic orbits into contemporary short-period orbits).

  19. A Network-Based Multi-Target Computational Estimation Scheme for Anticoagulant Activities of Compounds

    PubMed Central

    Li, Canghai; Chen, Lirong; Song, Jun; Tang, Yalin; Xu, Xiaojie

    2011-01-01

    Background Traditional virtual screening method pays more attention on predicted binding affinity between drug molecule and target related to a certain disease instead of phenotypic data of drug molecule against disease system, as is often less effective on discovery of the drug which is used to treat many types of complex diseases. Virtual screening against a complex disease by general network estimation has become feasible with the development of network biology and system biology. More effective methods of computational estimation for the whole efficacy of a compound in a complex disease system are needed, given the distinct weightiness of the different target in a biological process and the standpoint that partial inhibition of several targets can be more efficient than the complete inhibition of a single target. Methodology We developed a novel approach by integrating the affinity predictions from multi-target docking studies with biological network efficiency analysis to estimate the anticoagulant activities of compounds. From results of network efficiency calculation for human clotting cascade, factor Xa and thrombin were identified as the two most fragile enzymes, while the catalytic reaction mediated by complex IXa:VIIIa and the formation of the complex VIIIa:IXa were recognized as the two most fragile biological matter in the human clotting cascade system. Furthermore, the method which combined network efficiency with molecular docking scores was applied to estimate the anticoagulant activities of a serial of argatroban intermediates and eight natural products respectively. The better correlation (r = 0.671) between the experimental data and the decrease of the network deficiency suggests that the approach could be a promising computational systems biology tool to aid identification of anticoagulant activities of compounds in drug discovery. Conclusions This article proposes a network-based multi-target computational estimation method for

  20. GPU-based Monte Carlo Dust Radiative Transfer Scheme Applied to Active Galactic Nuclei

    NASA Astrophysics Data System (ADS)

    Heymann, Frank; Siebenmorgen, Ralf

    2012-05-01

    A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman & Wood method to reduce the calculation time, and the Fleck & Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 μm silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.

  1. GPU-BASED MONTE CARLO DUST RADIATIVE TRANSFER SCHEME APPLIED TO ACTIVE GALACTIC NUCLEI

    SciTech Connect

    Heymann, Frank; Siebenmorgen, Ralf

    2012-05-20

    A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman and Wood method to reduce the calculation time, and the Fleck and Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 {mu}m silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.

  2. Lipid receptor S1P₁ activation scheme concluded from microsecond all-atom molecular dynamics simulations.

    PubMed

    Yuan, Shuguang; Wu, Rongliang; Latek, Dorota; Trzaskowski, Bartosz; Filipek, Slawomir

    2013-01-01

    Sphingosine 1-phosphate (S1P) is a lysophospholipid mediator which activates G protein-coupled sphingosine 1-phosphate receptors and thus evokes a variety of cell and tissue responses including lymphocyte trafficking, endothelial development, integrity, and maturation. We performed five all-atom 700 ns molecular dynamics simulations of the sphingosine 1-phosphate receptor 1 (S1P₁) based on recently released crystal structure of that receptor with an antagonist. We found that the initial movements of amino acid residues occurred in the area of highly conserved W269⁶·⁴⁸ in TM6 which is close to the ligand binding location. Those residues located in the central part of the receptor and adjacent to kinks of TM helices comprise of a transmission switch. Side chains movements of those residues were coupled to the movements of water molecules inside the receptor which helped in the gradual opening of intracellular part of the receptor. The most stable parts of the protein were helices TM1 and TM2, while the largest movement was observed for TM7, possibly due to the short intracellular part starting with a helix kink at P⁷·⁵⁰, which might be the first helix to move at the intracellular side. We show for the first time the detailed view of the concerted action of the transmission switch and Trp (W⁶·⁴⁸) rotamer toggle switch leading to redirection of water molecules flow in the central part of the receptor. That event is a prerequisite for subsequent changes in intracellular part of the receptor involving water influx and opening of the receptor structure. PMID:24098103

  3. Disk-driven hydromagnetic winds as a key ingredient of active galactic nuclei unification schemes

    NASA Technical Reports Server (NTRS)

    Konigl, Arieh; Kartje, John F.

    1994-01-01

    Centrifugally driven winds from the surfaces of magnetized accretion disks have been recognized as an attractive mechanism of removing the angular momentum of the accreted matter and of producing the bipolar outflows and jets that are often associated with compact astronomical objects. As previously suggested in the context of young stellar objects, such winds have unique observational manifestations stemming from their highly stratified density and velocity structure and from their exposure to the strong continuum radiation field of the compact object. We have applied this scenario to active galactic nuclei (AGNs) and investigated the properties of hydromagnetic outflows that originate within approximately 10(M(sub 8)) pc of the central 10(exp 8)(M(sub 8)) solar mass black hole. On the basis of our results, we propose that hydromagnetic disk-driven winds may underlie the classification of broad-line and narrow-line AGNs (e.g., the Seyfert 1/Seyfert 2 dichotomy) as well as the apparent dearth of luminous Seyfert 2 galaxies. More generally, we demonstrate that such winds could strongly influence the spectral characteristics of Seyfert galaxies, QSOs, and BL Lac objects (BLOs). In our picture, the torus is identified with the outer regions of the wind where dust uplifted from the disk surfaces by gas-grain collisions is embedded in the outflow. Using an efficient radiative transfer code, we show that the infrared emission of Seyfert galaxies and QSOs can be attributed to the reprocessing of the UV/soft X-ray AGN continuum by the dust in the wind and the disk. We demonstrate that the radiation pressure force flattens the dust distribution in objects with comparatively high (but possibly sub-Eddington) bolometric luminosities, and we propose this as one likely reason for the apparent paucity of narrow-line objects among certain high-luminosity AGNs. Using the XSTAR photoionization code, we show that the inner regions of the wind could naturally account for the warm

  4. Integrated separation scheme for measuring a suite of fission and activation products from a fresh mixed fission and activation product sample

    SciTech Connect

    Morley, Shannon M.; Seiner, Brienne N.; Finn, Erin C.; Greenwood, Lawrence R.; Smith, Steven C.; Gregory, Stephanie J.; Haney, Morgan M.; Lucas, Dawn D.; Arrigo, Leah M.; Beacham, Tere A.; Swearingen, Kevin J.; Friese, Judah I.; Douglas, Matthew; Metz, Lori A.

    2015-05-01

    Mixed fission and activation materials resulting from various nuclear processes and events contain a wide range of isotopes for analysis spanning almost the entire periodic table. In some applications such as environmental monitoring, nuclear waste management, and national security a very limited amount of material is available for analysis and characterization so an integrated analysis scheme is needed to measure multiple radionuclides from one sample. This work describes the production of a complex synthetic sample containing fission products, activation products, and irradiated soil and determines the percent recovery of select isotopes through the integrated chemical separation scheme. Results were determined using gamma energy analysis of separated fractions and demonstrate high yields of Ag (76 ± 6%), Au (94 ± 7%), Cd (59 ± 2%), Co (93 ± 5%), Cs (88 ± 3%), Fe (62 ± 1%), Mn (70 ± 7%), Np (65 ± 5%), Sr (73 ± 2%) and Zn (72 ± 3%). Lower yields (< 25%) were measured for Ga, Ir, Sc, and W. Based on the results of this experiment, a complex synthetic sample can be prepared with low atom/fission ratios and isotopes of interest accurately and precisely measured following an integrated chemical separation method.

  5. Degradation in urban air quality from construction activity and increased traffic arising from a road widening scheme.

    PubMed

    Font, Anna; Baker, Timothy; Mudway, Ian S; Purdie, Esme; Dunster, Christina; Fuller, Gary W

    2014-11-01

    Road widening schemes in urban areas are often proposed as a solution to traffic congestion and as a means of stimulating economic growth. There is however clear evidence that new or expanded roads rapidly fill with either displaced or induced traffic, offsetting any short-term gains in eased traffic flows. What has not been addressed in any great detail is the impact of such schemes on air quality, with modelled impact predictions seldom validated by measurements after the expansion of road capacity. In this study we made use of a road widening project in London to investigate the impact on ambient air quality (particulate matter, NOX, NO2) during and after the completion of the road works. PM10 increased during the construction period up to 15 μg m(-3) during working hours compared to concentrations before the road works. A box modelling approach was used to determine a median emission factor of 0.0022 kg PM10 m(-2) month(-1), three times larger than that used in the UK emission inventory (0.0007 kg PM10 m(-2) month(-1)). Peaks of activity released 0.0130 kg PM10 m(-2) month(-1), three and eight times smaller than the peak values used in the European and US inventories. After the completion of the widening there was an increase in all pollutants from the road during rush hour: 2-4 μg m(-3) for PM10; 1 μg m(-3) for PM2.5; 40 and 8 μg m(-3) for NOX and NO2, respectively. NO2 EU Limit Value was breached after the road development illustrating a notable deterioration in residential air quality. Additionally, PM10, but not PM2.5, glutathione dependent oxidative potential increased after the road was widened consistent with an increase in pro-oxidant components in the coarse particle mode, related to vehicle abrasion processes. These increased air pollution indices were associated with an increase in the number of cars, taxis and LGVs. PMID:25128882

  6. Health Professionals' Perspectives on Exercise Referral and Physical Activity Promotion in Primary Care: Findings from a Process Evaluation of the National Exercise Referral Scheme in Wales

    ERIC Educational Resources Information Center

    Din, Nafees U.; Moore, Graham F.; Murphy, Simon; Wilkinson, Clare; Williams, Nefyn H.

    2015-01-01

    Background and objectives: Referring clinicians' experiences of exercise referral schemes (ERS) can provide valuable insights into their uptake. However, most qualitative studies focus on patient views only. This paper explores health professionals' perceptions of their role in promoting physical activity and experiences of a National Exercise…

  7. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  8. Indirect Z-Scheme BiOI/g-C3N4 Photocatalysts with Enhanced Photoreduction CO2 Activity under Visible Light Irradiation.

    PubMed

    Wang, Ji-Chao; Yao, Hong-Chang; Fan, Ze-Yu; Zhang, Lin; Wang, Jian-She; Zang, Shuang-Quan; Li, Zhong-Jun

    2016-02-17

    Rational design and construction of Z-scheme photocatalysts has received much attention in the field of CO2 reduction because of its great potential to solve the current energy and environmental crises. In this study, a series of Z-scheme BiOI/g-C3N4 photocatalysts are synthesized and their photocatalytic performance for CO2 reduction to produce CO, H2 and/or CH4 is evaluated under visible light irradiation (λ > 400 nm). The results show that the as-synthesized composites exhibit more highly efficient photocatalytic activity than pure g-C3N4 and BiOI and that the product yields change remarkably depending on the reaction conditions such as irradiation light wavelength. Emphasis is placed on identifying how the charge transfers across the heterojunctions and an indirect Z-scheme charge transfer mechanism is verified by detecting the intermediate I3(-) ions. The reaction mechanism is further proposed based on the detection of the intermediate (•)OH and H2O2. This work may be useful for rationally designing of new types of Z-scheme photocatalyst and provide some illuminating insights into the Z-scheme transfer mechanism. PMID:26799981

  9. Nonstandard finite difference schemes

    NASA Technical Reports Server (NTRS)

    Mickens, Ronald E.

    1995-01-01

    The major research activities of this proposal center on the construction and analysis of nonstandard finite-difference schemes for ordinary and partial differential equations. In particular, we investigate schemes that either have zero truncation errors (exact schemes) or possess other significant features of importance for numerical integration. Our eventual goal is to bring these methods to bear on problems that arise in the modeling of various physical, engineering, and technological systems. At present, these efforts are extended in the direction of understanding the exact nature of these nonstandard procedures and extending their use to more complicated model equations. Our presentation will give a listing (obtained to date) of the nonstandard rules, their application to a number of linear and nonlinear, ordinary and partial differential equations. In certain cases, numerical results will be presented.

  10. Fabrication of Z-scheme Ag3PO4/MoS2 composites with enhanced photocatalytic activity and stability for organic pollutant degradation

    NASA Astrophysics Data System (ADS)

    Zhu, Chaosheng; Zhang, Lu; Jiang, Bo; Zheng, Jingtang; Hu, Ping; Li, Sujuan; Wu, Mingbo; Wu, Wenting

    2016-07-01

    In this study, highly efficient visible-light-driven Ag3PO4/MoS2 composite photocatalysts with different weight ratios of MoS2 were prepared via the ethanol-water mixed solvents precipitation method and characterized by ICP, XRD, HRTEM, FE-SEM, BET, XPS, UV-vis DRS and PL analysis. Under visible-light irradiation, Ag3PO4/MoS2 composites exhibit excellent photocatalytic activity towards the degradation of organic pollutants in aqueous solution. The optimal composite with 0.648 wt% MoS2 content exhibits the highest photocatalytic activity, which can degrade almost all MB under visible-light irradiation within 60 min. Recycling experiments confirmed that the Ag3PO4/MoS2 catalysts had superior cycle performance and stability. The photocatalytic activity enhancement of Ag3PO4/MoS2 photocatalysts can be mainly ascribed to the efficient separation of photogenerated charge carriers and the stronger oxidation and reduction ability through a Z-scheme system composed of Ag3PO4, Ag and MoS2, in which Ag particles act as the charge separation center. The high photocatalytic stability is due to the successful inhibition of the photocorrosion of Ag3PO4 by transferring the photogenerated electrons of Ag3PO4 to MoS2. The evidence of the Z-scheme photocatalytic mechanism of the composite photocatalysts could be obtained from the active species trapping experiments and the photoluminescence technique.

  11. Constructing probabilistic models for realistic velocity distributions based on forward modeling and tomographic inversion: applications for active and passive source observation schemes

    NASA Astrophysics Data System (ADS)

    Koulakov, I. Yu.

    2009-04-01

    Seismic tomography is like a photography taken by a camera with deformed and blurred lenses. In the resulting tomograms, colors (amplitudes of anomalies) and shapes of objects are often strongly biased and are usually not representing the reality. We propose an approach which allows investigating properties of the "camera" and retrieving most probable shapes and amplitudes of anomalies in the real Earth. The main idea of this approach is to construct a synthetic model which, after performing forward modeling and tomographic inversion, reproduces the same amplitudes and shapes of patterns as after inversion of observed data. In this modeling, the conditions of the tomographic inversion (damping, grid spacing, source location parameters etc) should be absolutely identical to the case of the observed data processing. The a priori information, if available any, should be taken into account in this modeling to decrease the uncertainty related to fundamental non-uniqueness of the inversion problem. In the talk, several examples of applying this approach at various scales for different data schemes are presented: (1) regional scheme which uses the global data of the ISC catalogue (with examples of regional upper mantle models in Europe and central Asia); (2) local earthquake tomography scheme (illustrated with models in Toba caldera area and in Central Java); (3) seismic profiling which is based on active source refraction travel time data (with examples of several deep seismic sounding profiles in Central Pacific and subduction zones in Chile).

  12. Aligned Defrosting Dunes

    NASA Technical Reports Server (NTRS)

    2004-01-01

    17 August 2004 This July 2004 Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows a group of aligned barchan sand dunes in the martian north polar region. At the time, the dunes were covered with seasonal frost, but the frost had begun to sublime away, leaving dark spots and dark outlines around the dunes. The surrounding plains exhibit small, diffuse spots that are also the result of subliming seasonal frost. This northern spring image, acquired on a descending ground track (as MGS was moving north to south on the 'night' side of Mars) is located near 78.8oN, 34.8oW. The image covers an area about 3 km (1.9 mi) across and sunlight illuminates the scene from the upper left.

  13. Defrosting Sand Dunes

    NASA Technical Reports Server (NTRS)

    2003-01-01

    MGS MOC Release No. MOC2-434, 27 July 2003

    This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) picture shows retreating patches of frost on a field of large, dark sand dunes in the Noachis region of Mars. Large, windblown ripples of coarse sediment are also seen on some of the dunes. This dune field is located in a crater at 47.5oS, 326.3oW. The scene is illuminated by sunlight from the upper left.

  14. Health professionals’ perspectives on exercise referral and physical activity promotion in primary care: Findings from a process evaluation of the National Exercise Referral Scheme in Wales

    PubMed Central

    Din, Nafees U; Moore, Graham F; Murphy, Simon; Wilkinson, Clare; Williams, Nefyn H

    2015-01-01

    Background and objectives: Referring clinicians’ experiences of exercise referral schemes (ERS) can provide valuable insights into their uptake. However, most qualitative studies focus on patient views only. This paper explores health professionals’ perceptions of their role in promoting physical activity and experiences of a National Exercise Referral Scheme (NERS) in Wales. Design: Qualitative semi-structured group interviews. Setting: General practice premises. Methods: Nine semi-structured group interviews involving 46 health professionals were conducted on general practice premises in six local health board areas. Purposive sampling taking into account area deprivation, practice size and referral rates was employed. Interviews were transcribed verbatim and analysed using the Framework method of thematic analysis. Results: Health professionals described physical activity promotion as important, although many thought it was outside of their expertise and remit, and less important than other health promotion activities such as smoking cessation. Professionals linked decisions on whether to advise physical activity to patients to their own physical activity levels and to subjective judgements of patient motivation. While some described ERS as a holistic alternative to medication, with potential social benefits, others expressed concerns regarding their limited reach and potential to exacerbate inequalities. Barriers to referral included geographic isolation and uncertainties about patient selection criteria, medico-legal responsibilities and a lack of feedback about patient progress. Conclusion: Clinicians’ concerns about expertise, priority setting and time constraints should be addressed to enhance physical activity promotion in primary care. Further research is needed to fully understand decision making relating to provision of physical activity advice and use of ERS. PMID:26527835

  15. The effect of various atomic partial charge schemes to elucidate consensus activity-correlating molecular regions: a test case of diverse QSAR models.

    PubMed

    Kumar, Sivakumar Prasanth; Jha, Prakash C; Jasrai, Yogesh T; Pandya, Himanshu A

    2016-03-01

    The estimation of atomic partial charges of the small molecules to calculate molecular interaction fields (MIFs) is an important process in field-based quantitative structure-activity relationship (QSAR). Several studies showed the influence of partial charge schemes that drastically affects the prediction accuracy of the QSAR model and focused on the selection of appropriate charge models that provide highest cross-validated correlation coefficient ([Formula: see text] or q(2)) to explain the variation in chemical structures against biological endpoints. This study shift this focus in a direction to understand the molecular regions deemed to explain SAR in various charge models and recognize a consensus picture of activity-correlating molecular regions. We selected eleven diverse dataset and developed MIF-based QSAR models using various charge schemes including Gasteiger-Marsili, Del Re, Merck Molecular Force Field, Hückel, Gasteiger-Hückel, and Pullman. The generalized resultant QSAR models were then compared with Open3DQSAR model to interpret the MIF descriptors decisively. We suggest the regions of activity contribution or optimization can be effectively determined by studying various charge-based models to understand SAR precisely. PMID:25997097

  16. Design of a direct Z-scheme photocatalyst: preparation and characterization of Bi₂O₃/g-C₃N₄ with high visible light activity.

    PubMed

    Zhang, Jinfeng; Hu, Yingfei; Jiang, Xiaoliang; Chen, Shifu; Meng, Sugang; Fu, Xianliang

    2014-09-15

    A direct Z-scheme photocatalyst Bi2O3/g-C3N4 was prepared by ball milling and heat treatment methods. The photocatalyst was characterized by X-ray powder diffraction (XRD), UV-vis diffuse reflection spectroscopy (DRS), scanning electron microscopy (SEM), transmission electron microscopy (TEM), Brunauer-Emmett-Teller (BET) surface areas, photoluminescence technique (PL), and electron spin resonance (ESR) technology. The photocatalytic activity was evaluated by degradation of methylene blue (MB) and rhodamine B (RhB). The results showed that Bi2O3/g-C3N4 exhibited a much higher photocatalytic activity than pure g-C3N4 under visible light illumination. The rate constants of MB and RhB degradation for Bi2O3(1.0wt.%)/g-C3N4 are about 3.4 and 5 times that of pure g-C3N4, respectively. The migration of photogenerated carriers adopts a Z-scheme mechanism. The photoexcited electrons in the CB of Bi2O3 and photogenerated holes in the VB of g-C3N4 are quickly combined, so the photoexcited electrons in the CB of g-C3N4 and holes in the VB of Bi2O3 participate in reduction and oxidation reactions, respectively. O2(-), OH and h(+) are the major reactive species for the Bi2O3/g-C3N4 photocatalytic system. PMID:25232654

  17. Hygroscopic growth and activation of HULIS particles: experimental data and a new iterative parameterization scheme for complex aerosol particles

    NASA Astrophysics Data System (ADS)

    Ziese, M.; Wex, H.; Nilsson, E.; Salma, I.; Ocskay, R.; Hennig, T.; Massling, A.; Stratmann, F.

    2007-09-01

    The hygroscopic growth and activation of two HULIS and one Aerosol-Water-Extract sample, prepared from urban-type aerosol, were investigated. All samples were extracted from filters, redissolved in water and atomized for the investigations presented here. The hygroscopic growth measurements were done using LACIS (Leipzig Aerosol Cloud Interaction Simulator) together with a HH-TDMA (High Humidity Tandem Differential Mobility Analyzer). Hygroscopic growth was determined for relative humidities up to 99.75%. The critical diameters for activation were measured using LACIS for supersaturations between 2 and 10 per mill. All three samples showed a similar hygroscopic growth behaviour, and the two HULIS samples also were similar in their activation behavior, while the Aerosol-Water-Extract turned out to be more CCN active than the HULIS samples. The experimental data was used to derive parameterizations for the hygroscopic growth and activation of HULIS particles. The concept of ρion (Wex et al., 2007a) and the Szyszkowski-equation (Szyszkowski, 1908; Facchini et al., 1999) were used for parameterizing the Raoult and the Kelvin (surface tension) terms of the Köhler equation, respectively. This concept proved to be very successful for the HULIS samples in the saturation range from relative humidities larger than 98% up to activation. However it failed for the Aerosol-Water extract.

  18. Hygroscopic growth and activation of HULIS particles: experimental data and a new iterative parameterization scheme for complex aerosol particles

    NASA Astrophysics Data System (ADS)

    Ziese, M.; Wex, H.; Nilsson, E.; Salma, I.; Ocskay, R.; Hennig, T.; Massling, A.; Stratmann, F.

    2008-03-01

    The hygroscopic growth and activation of two HULIS (HUmic LIke Substance) and one Aerosol-Water-Extract sample, prepared from urban-type aerosol, were investigated. All samples were extracted from filters, redissolved in water and atomized for the investigations presented here. The hygroscopic growth measurements were done using LACIS (Leipzig Aerosol Cloud Interaction Simulator) together with a HH-TDMA (High Humidity Tandem Differential Mobility Analyzer). Hygroscopic growth was determined for relative humidities (RHs) up to 99.75%. The critical diameters for activation were measured for supersaturations between 0.2 and 1%. All three samples showed a similar hygroscopic growth behavior, and the two HULIS samples also were similar in their activation behavior, while the Aerosol-Water-Extract turned out to be more CCN active than the HULIS samples. The experimental data was used to derive parameterizations for the hygroscopic growth and activation of HULIS particles. The concept of ρion (Wex et al., 2007a) and the Szyszkowski-equation (Szyszkowski, 1908; Facchini, 1999) were used for parameterizing the Raoult and the Kelvin (surface tension) terms of the Köhler equation, respectively. This concept proved to be very successful for the HULIS samples in the saturation range from RHs larger than 98% up to activation. It was also shown to work well with data on HULIS taken from literature. Here, different atmospheric life-times and/or different sources for the different samples showed up in different coefficients for the parameterization. However, the parameterization did not work out well for the Aerosol-Water-Extract.

  19. An affinity-based scoring scheme for predicting DNA-binding activities of modularly assembled zinc-finger proteins

    PubMed Central

    Sander, Jeffry D.; Zaback, Peter; Joung, J. Keith; Voytas, Daniel F.; Dobbs, Drena

    2009-01-01

    Zinc-finger proteins (ZFPs) have long been recognized for their potential to manipulate genetic information because they can be engineered to bind novel DNA targets. Individual zinc-finger domains (ZFDs) bind specific DNA triplet sequences; their apparent modularity has led some groups to propose methods that allow virtually any desired DNA motif to be targeted in vitro. In practice, however, ZFPs engineered using this ‘modular assembly’ approach do not always function well in vivo. Here we report a modular assembly scoring strategy that both identifies combinations of modules least likely to function efficiently in vivo and provides accurate estimates of their relative binding affinities in vitro. Predicted binding affinities for 53 ‘three-finger’ ZFPs, computed based on energy contributions of the constituent modules, were highly correlated (r = 0.80) with activity levels measured in bacterial two-hybrid assays. Moreover, Kd values for seven modularly assembled ZFPs and their intended targets, measured using fluorescence anisotropy, were also highly correlated with predictions (r = 0.91). We propose that success rates for ZFP modular assembly can be significantly improved by exploiting the score-based strategy described here. PMID:19056825

  20. THE ROLE OF STARBURST-ACTIVE GALACTIC NUCLEUS COMPOSITES IN LUMINOUS INFRARED GALAXY MERGERS: INSIGHTS FROM THE NEW OPTICAL CLASSIFICATION SCHEME

    SciTech Connect

    Yuan, T.-T.; Kewley, L. J.; Sanders, D. B. E-mail: kewley@ifa.hawaii.ed

    2010-02-01

    We investigate the fraction of starbursts, starburst-active galactic nucleus (AGN) composites, Seyferts, and low-ionization narrow emission-line region galaxies (LINERs) as a function of infrared luminosity (L{sub IR}) and merger progress for approx500 infrared (IR)-selected galaxies. Using the new optical classifications afforded by the extremely large data set of the Sloan Digital Sky Survey, we find that the fraction of LINERs in IR-selected samples is rare (<5%) compared with other spectral types. The lack of strong IR emission in LINERs is consistent with recent optical studies suggesting that LINERs contain AGN with lower accretion rates than in Seyfert galaxies. Most previously classified IR-luminous LINERs are classified as starburst-AGN composite galaxies in the new scheme. Starburst-AGN composites appear to 'bridge' the spectral evolution from starburst to AGN in ULIRGs. The relative strength of the AGN versus starburst activity shows a significant increase at high IR luminosity. In ULIRGs (L{sub IR} > 10{sup 12} L{sub sun}), starburst-AGN composite galaxies dominate at early-intermediate stages of the merger, and AGN galaxies dominate during the final merger stages. Our results are consistent with models for IR-luminous galaxies where mergers of gas-rich spirals fuel both starburst and AGN, and where the AGN becomes increasingly dominant during the final merger stages of the most luminous IR objects.

  1. Monitoring of the ground surface temperature and the active layer in NorthEastern Canadian permafrost areas using remote sensing data assimilated in a climate land surface scheme.

    NASA Astrophysics Data System (ADS)

    Marchand, N.; Royer, A.; Krinner, G.; Roy, A.

    2014-12-01

    Projected future warming is particularly strong in the Northern high latitudes where increases of temperatures are up to 2 to 6 °C. Permafrost is present on 25 % of the northern hemisphere lands and contain high quantities of « frozen » carbon, estimated at 1400 Gt (40 % of the global terrestrial carbon). The aim of this study is to improve our understanding of the climate evolution in arctic areas, and more specifically of land areas covered by snow. The objective is to describe the ground temperature year round including under snow cover, and to analyse the active layer thickness evolution in relation to the climate variability. We use satellite data (fusion of MODIS land surface temperature « LST » and microwave AMSR-E brightness temperature « Tb ») assimilated in the Canadian Land Surface Scheme (CLASS) of the Canadian climate model coupled with a simple radiative transfer model (HUT). This approach benefits from the advantages of each of the data type in order to complete two objectives : 1- build a solid methodology for retrieving the ground temperature, with and without snow cover, in taïga and tundra areas ; 2 - from those retrieved ground temperatures, derive the summer melt duration and the active layer depth. We describe the coupling of the models and the methodology that adjusts the meteorological input parameters of the CLASS model (mainly air temperature and precipitations derived from the NARR database) in order to minimise the simulated LST and Tb ouputs in comparison with satellite measurements. Using ground-based meteorological data as validation references in NorthEastern Canadian tundra, the results show that the proposed approach improves the soil temperatures estimates when using the MODIS LST and Tb at 10 and 19 GHz to constrain the model in comparison with the model outputs without satellite data. Error analysis is discussed for the summer period (2.5 - 4 K) and for the snow covered winter period (2 - 3.5 K). Further steps are

  2. Indirect visual cryptography scheme

    NASA Astrophysics Data System (ADS)

    Yang, Xiubo; Li, Tuo; Shi, Yishi

    2015-10-01

    Visual cryptography (VC), a new cryptographic scheme for image. Here in encryption, image with message is encoded to be N sub-images and any K sub-images can decode the message in a special rules (N>=2, 2<=K<=N). Then any K of the N sub-images are printed on transparency and stacked exactly, the message of original image will be decrypted by human visual system, but any K-1 of them get no information about it. This cryptographic scheme can decode concealed images without any cryptographic computations, and it has high security. But this scheme lacks of hidden because of obvious feature of sub-images. In this paper, we introduce indirect visual cryptography scheme (IVCS), which encodes sub-images to be pure phase images without visible strength based on encoding of visual cryptography. The pure phase image is final ciphertexts. Indirect visual cryptography scheme not only inherits the merits of visual cryptography, but also raises indirection, hidden and security. Meanwhile, the accuracy alignment is not required any more, which leads to the strong anti-interference capacity and robust in this scheme. System of decryption can be integrated highly and operated conveniently, and its process of decryption is dynamic and fast, which all lead to the good potentials in practices.

  3. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  4. Mediator-free direct Z-scheme photocatalytic system: BiVO4/g-C3N4 organic-inorganic hybrid photocatalyst with highly efficient visible-light-induced photocatalytic activity.

    PubMed

    Tian, Na; Huang, Hongwei; He, Ying; Guo, Yuxi; Zhang, Tierui; Zhang, Yihe

    2015-03-01

    We disclose the fabrication of a mediator-free direct Z-scheme photocatalyst system BiVO4/g-C3N4 using a mixed-calcination method based on the more reliable interfacial interaction. The facet coupling occurred between the g-C3N4 (002) and BiVO4 (121), and it was revealed by X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS) and transmission electron microscope (TEM). The crystal structure and optical properties of the as-prepared samples have also been characterized by Fourier-transform infrared (FTIR), scanning electron microscopy (SEM) and UV-vis diffuse reflectance spectra (DRS) in details. The photocatalytic experiments indicated that the BiVO4/g-C3N4 composite photocatalysts display a significantly enhanced photocatalytic activity pertaining to RhB degradation and photocurrent generation (PC) compared to the pristine BiVO4 and g-C3N4. This remarkably improved photocatalytic performance should be attributed to the fabrication of a direct Z-scheme system of BiVO4/g-C3N4, which can result in a more efficient separation of photoinduced charge carriers than band-band transfer, thus endowing it with the much more powerful oxidation and reduction capability, as confirmed by the photoluminescence (PL) spectra and electrochemical impedance spectra (EIS). The Z-scheme mechanism of BiVO4/g-C3N4 heterostructure was verified by a series of combined techniques, including the active species trapping experiments, NBT transformation and terephthalic acid photoluminescence probing technique (TA-PL) over BiVO4/g-C3N4 composites and the pristine samples. The present work not only furthered the understanding of mediator-free Z-scheme photocatalysis, but also shed new light on the design of heterostructural photocatalysts with high-performance. PMID:25635354

  5. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  6. Defrosting of Russell Crater Dunes

    NASA Technical Reports Server (NTRS)

    2007-01-01

    These two images (at right) were acquired by the Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) 39 days apart at 19:10 UTC (2:10 PM EST) on December 28, 2006 (upper right) and at 20:06 UTC (3:06 PM EST) on February 5, 2007 (lower right). These CRISM data were acquired in 544 colors covering the wavelength range from 0.36-3.92 micrometers, and show features as small as 20 meters (about 65 feet) across. Both images are false color composites of bands at 2.5, 1.5, and 1.25 micrometers, and are nearly centered at the same location, 54.875oS, 12.919oE (upper right) and 54.895oS, 12.943oE (lower right). Each image is approximately 11 kilometers (7 miles) across at its narrowest. These are part of a series of images capturing the evolution of carbon dioxide frost on the surface of the dunes in Russell Crater.

    Russell Crater is one of many craters in the southern highland region of Mars that contain large areas of sand dunes. The sand in these dunes has accumulated over a very long time period -- perhaps millions of years -- as wind blows over the highland terrain, picking up sand in some places and depositing in others. The topography of the craters forces the wind to blow up and over the crater rims, and the wind often isn't strong enough to keep the tiny grains suspended. This makes the sand fall to the ground and gradually pile up, and over time the surface breezes shape the sand into ripples and dunes. A similar process is at work at the Great Sand Dunes National Park and Preserve in Colorado, USA.

    The above left image shows a THEMIS daytime infrared mosaic of Russell Crater and the location of its (approximately) 30-kilometer wide dune field in the northeastern quadrant of the crater floor. Superposed on this view and shown enlarged at the upper right is CRISM image FRT000039DF. This CRISM image was acquired during the late Martian southern winter (solar longitude = 157.7o), and the bright blue in this false color composite indicates the presence of carbon dioxide frost (dry ice) on the dunes. Sunlight is coming from the northeast, and the sunlit faces of the dunes appear red because they show very little frost compared to the colder, more shadowed areas. Thirty-nine days later at the beginning of southern spring (solar longitude = 178.9o), CRISM image FRT000042AA (lower right) was acquired almost at the same location. Notably, the bright blue frost-rich areas are considerably smaller and subdued, with slim patches only observed on the shadowed sides of the dunes that are most protected from the warmth of the rising sun. As the southern season continues to march toward summer, all of the frost will soon be gone and won't return until the next Martian winter.

    The Compact Reconnaissance Imaging Spectrometer for Mars (CRISM) is one of six science instruments on NASA's Mars Reconnaissance Orbiter. Led by The Johns Hopkins University Applied Physics Laboratory, the CRISM team includes expertise from universities, government agencies and small businesses in the United States and abroad.

  7. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  8. Translational activities of EF-Tu [G222D] which cannot be reconciled with the classical scheme of the polypeptide chain elongation cycle.

    PubMed

    Talens, A; Boon, K; Kraal, B; Bosch, L

    1996-08-23

    We have developed a cell-free system of E. coli that enables us to study the in vitro translation of natural mRNA mediated by wild-type or mutant EF-Tu. Various mutant EF-Tu species have been analyzed, one of which, EF-Tu [G222D], appeared to be virtually unable to mediate the translation of natural mRNA. Since this mutant factor is able to participate in translation in vivo by suppressing nonsense and frameshift mutations in cooperation with EF-Tu [A375T], a revision of the generally accepted scheme of the elongation cycle has been proposed (Bosch, L., Vijgenboom, E., & Zeef, L.A.H., 1996, Biochemistry 36). PMID:8780718

  9. Hybridization schemes for clusters

    NASA Astrophysics Data System (ADS)

    Wales, David J.

    The concept of an optimum hybridization scheme for cluster compounds is developed with particular reference to electron counting. The prediction of electron counts for clusters and the interpretation of the bonding is shown to depend critically upon the presumed hybridization pattern of the cluster vertex atoms. This fact has not been properly appreciated in previous work, particularly in applications of Stone's tensor surface harmonic (TSH) theory, but is found to be a useful tool when dealt with directly. A quantitative definition is suggested for the optimum cluster hybridization pattern based directly upon the ease of interpretation of the molecular orbitals, and results are given for a range of species. The relationship of this scheme to the detailed cluster geometry is described using Löwdin's partitioned perturbation theory, and the success and range of application of TSH theory are discussed.

  10. Beyond Scheme F

    SciTech Connect

    Elliott, C.J.; Fisher, H.; Pepin, J.; Gillmann, R.

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  11. Enhanced arbitrated quantum signature scheme using Bell states

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Liu, Jian-Wei; Shang, Tao

    2014-06-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme.

  12. Verification and accreditation schemes for climate change activities: A review of requirements for verification of greenhouse gas reductions and accreditation of verifiers—Implications for long-term carbon sequestration

    NASA Astrophysics Data System (ADS)

    Roed-Larsen, Trygve; Flach, Todd

    The purpose of this chapter is to provide a review of existing national and international requirements for verification of greenhouse gas reductions and associated accreditation of independent verifiers. The credibility of results claimed to reduce or remove anthropogenic emissions of greenhouse gases (GHG) is of utmost importance for the success of emerging schemes to reduce such emissions. Requirements include transparency, accuracy, consistency, and completeness of the GHG data. The many independent verification processes that have developed recently now make up a quite elaborate tool kit for best practices. The UN Framework Convention for Climate Change and the Kyoto Protocol specifications for project mechanisms initiated this work, but other national and international actors also work intensely with these issues. One initiative gaining wide application is that taken by the World Business Council for Sustainable Development with the World Resources Institute to develop a "GHG Protocol" to assist companies in arranging for auditable monitoring and reporting processes of their GHG activities. A set of new international standards developed by the International Organization for Standardization (ISO) provides specifications for the quantification, monitoring, and reporting of company entity and project-based activities. The ISO is also developing specifications for recognizing independent GHG verifiers. This chapter covers this background with intent of providing a common understanding of all efforts undertaken in different parts of the world to secure the reliability of GHG emission reduction and removal activities. These verification schemes may provide valuable input to current efforts of securing a comprehensive, trustworthy, and robust framework for verification activities of CO2 capture, transport, and storage.

  13. Classification Schemes: Developments and Survival.

    ERIC Educational Resources Information Center

    Pocock, Helen

    1997-01-01

    Discusses the growth, survival and future of library classification schemes. Concludes that to survive, a scheme must constantly update its policies, and readily adapt itself to accommodate growing disciplines and changing terminology. (AEF)

  14. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries. PMID:12265562

  15. Using Steffe's Advanced Fraction Schemes

    ERIC Educational Resources Information Center

    McCloskey, Andrea V.; Norton, Anderson H.

    2009-01-01

    Recognizing schemes, which are different from strategies, can help teachers understand their students' thinking about fractions. Using Steffe's advanced fraction schemes, the authors describe a progression of development that upper elementary and middle school students might follow in understanding fractions. Each scheme can be viewed as a…

  16. Scheme of thinking quantum systems

    NASA Astrophysics Data System (ADS)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  17. 1550 nm VCSEL-based 0.48 Tb/s transmission scheme employing PAM-4 and WDM for active optical cables

    NASA Astrophysics Data System (ADS)

    Markou, S.; Dris, S.; Kalavrouziotis, D.; Avramopoulos, H.; Pleros, N.; Tsiokos, Dimitris M.

    2014-05-01

    With this paper we investigate the system-level performance of VCSELs, parameterized with true experimental LI-VI data and dynamic characteristics of state-of-the-art VCSELs with 3 dB modulation bandwidth at 15 GHz, and propose their deployment as high-speed multi-level optical sources in a mid-range active optical cable (AOC) model for performance prediction of a rack-to-rack interconnection. The AOC architecture combines a 6-element 1550 nm VCSEL array, each directly modulated with 40 Gbaud PAM-4 data, with a wavelength division multiplexer (WDM), in order to implement a parallel link with aggregate traffic of 0.48 Tb/s. Transmission reach exceeded 300 m by deploying a two-tap feed forward equalizer filter at the electrical VCSEL driver. Bit Error Rate (BER) measurements and analysis were carried out in MATLAB. In practice, the thermal behavior and basic operational characteristics of the VCSELs fabricated by the Technische Universität München (TUM) were used to study the thermal performance and operational range of the complete AOC model. The VCSELs were initially operated at 20°C and BER measurements showed power penalties of 1.7 dB and 3.5 dB at 300 m and 500 m of transmission distance respectively for all 6 data channels. System performance was also investigated for elevated operating temperatures of the VCSEL module and the additional system degradation and BER penalties introduced by operation at 50°C and 65°C were also investigated for transmission distances of 300 m and 500 m.

  18. Plotting and Scheming

    NASA Technical Reports Server (NTRS)

    2004-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] Figure 2 Click for larger view

    These two graphics are planning tools used by Mars Exploration Rover engineers to plot and scheme the perfect location to place the rock abrasion tool on the rock collection dubbed 'El Capitan' near Opportunity's landing site. 'El Capitan' is located within a larger outcrop nicknamed 'Opportunity Ledge.'

    The rover visualization team from NASA Ames Research Center, Moffett Field, Calif., initiated the graphics by putting two panoramic camera images of the 'El Capitan' area into their three-dimensional model. The rock abrasion tool team from Honeybee Robotics then used the visualization tool to help target and orient their instrument on the safest and most scientifically interesting locations. The blue circle represents one of two current targets of interest, chosen because of its size, lack of dust, and most of all its distinct and intriguing geologic features. To see the second target location, see the image titled 'Plotting and Scheming.'

    The rock abrasion tool is sensitive to the shape and texture of a rock, and must safely sit within the 'footprint' indicated by the blue circles. The rock area must be large enough to fit the contact sensor and grounding mechanism within the area of the outer blue circle, and the rock must be smooth enough to get an even grind within the abrasion area of the inner blue circle. If the rock abrasion tool were not grounded by its support mechanism or if the surface were uneven, it could 'run away' from its target. The rock abrasion tool is location on the rover's instrument deployment device, or arm.

    Over the next few martian days, or sols, the rover team will use these and newer, similar graphics created with more recent, higher-resolution panoramic camera images and super-spectral data from the miniature thermal emission spectrometer. These data will be used to pick the best

  19. Hampshire Probation Sports Counselling Scheme.

    ERIC Educational Resources Information Center

    Waldman, Keith

    A sports counseling scheme for young people on criminal probation in Hampshire (England) was developed in the 1980s as a partnership between the Sports Council and the Probation Service. The scheme aims to encourage offenders, aged 14 and up, to make constructive use of their leisure time; to allow participants the opportunity to have positive…

  20. The Influence of Second-Hand Cigarette Smoke Exposure during Childhood and Active Cigarette Smoking on Crohn’s Disease Phenotype Defined by the Montreal Classification Scheme in a Western Cape Population, South Africa

    PubMed Central

    Chivese, Tawanda; Esterhuizen, Tonya M.; Basson, Abigail Raffner

    2015-01-01

    Background Smoking may worsen the disease outcomes in patients with Crohn’s disease (CD), however the effect of exposure to second-hand cigarette smoke during childhood is unclear. In South Africa, no such literature exists. The aim of this study was to investigate whether disease phenotype, at time of diagnosis of CD, was associated with exposure to second-hand cigarette during childhood and active cigarette smoking habits. Methods A cross sectional examination of all consecutive CD patients seen during the period September 2011-January 2013 at 2 large inflammatory bowel disease centers in the Western Cape, South Africa was performed. Data were collected via review of patient case notes, interviewer-administered questionnaire and clinical examination by the attending gastroenterologist. Disease phenotype (behavior and location) was evaluated at time of diagnosis, according to the Montreal Classification scheme. In addition, disease behavior was stratified as ‘complicated’ or ‘uncomplicated’, using predefined definitions. Passive cigarette smoke exposure was evaluated during 3 age intervals: 0–5, 6–10, and 11–18 years. Results One hundred and ninety four CD patients were identified. Cigarette smoking during the 6 months prior to, or at time of diagnosis was significantly associated with ileo-colonic (L3) disease (RRR = 3.63; 95%CI, 1.32–9.98, p = 0.012) and ileal (L1) disease (RRR = 3.54; 95%CI, 1.06–11.83, p = 0.040) compared with colonic disease. In smokers, childhood passive cigarette smoke exposure during the 0–5 years age interval was significantly associated with ileo-colonic CD location (RRR = 21.3; 95%CI, 1.16–391.55, p = 0.040). No significant association between smoking habits and disease behavior at diagnosis, whether defined by the Montreal scheme, or stratified as ‘complicated’ vs ‘uncomplicated’, was observed. Conclusion Smoking habits were associated with ileo-colonic (L3) and ileal (L1) disease at time of diagnosis in

  1. Novel driving scheme for FLCD

    NASA Astrophysics Data System (ADS)

    Wu, Jiin-chuan; Wang, Chi-Chang

    1996-03-01

    A frame change data driving scheme (FCDDS) for ferroelectric LCD(FLCD) of matrix- addressing is developed which uses only positive voltages for the row and column waveforms to achieve bipolar driving waveforms on the FLCD pixels. Thus the required supply voltage for the driver chips is half that of the conventional driving scheme. Each scan line is addressed in only twice the switching time (tau) (minimum response time of FLC) so that this scheme is suitable for high duty ratio panels. In order to meet this bistable electro-optic effect of FLCD and zero net dc voltage across each pixel of the liquid crystal, turning on and turning off pixels are done at different time slots and frame slots. This driving scheme can be easily implemented using commercially available STN LCD drivers plus a small external circuit or by making an ASIC which is a slight modification of the STN driver. Both methods are discussed.

  2. On the marginal stability of upwind schemes

    NASA Astrophysics Data System (ADS)

    Gressier, J.; Moschetta, J.-M.

    Following Quirk's analysis of Roe's scheme, general criteria are derived to predict the odd-even decoupling. This analysis is applied to Roe's scheme, EFM Pullin's scheme, EIM Macrossan's scheme and AUSM Liou's scheme. Strict stability is shown to be desirable to avoid most of these flaws. Finally, the link between marginal stability and accuracy on shear waves is established.

  3. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  4. Active surveillance scheme in three Romanian hospitals reveals a high prevalence and variety of carbapenamase-producing Gram-negative bacteria: a pilot study, December 2014 to May 2015.

    PubMed

    Timofte, Dorina; Panzaru, Carmen Valentina; Maciuca, Iuliana Elena; Dan, Maria; Mare, Anca Delia; Man, Adrian; Toma, Felicia

    2016-06-23

    We report the findings of an active surveillance scheme for detection of asymptomatic carriers with carbapenemase-producing Gram-negative bacteria (CP-GNB) in Romanian hospitals. During a pilot study from December 2014 to May 2015, faecal cultures were screened in three hospitals (two large, one medium-size) for patients newly admitted to selected wards or inpatients transferred from other wards to an intensive-care unit. The study revealed a high prevalence of CP-GNB detected in 22/27 and 28/38 of the carbapenem non-susceptible isolates from Hospitals 1 and 3, respectively. CP-GNB identified through faecal screening included NDM-1-producing Serratia marcescens and Klebsiella pneumoniae, OXA-48-producing K. pneumoniae and OXA-23-producing Acinetobacter baumannii. The distribution of the CP-GNB varied between the hospitals, with NDM-1-producing S. marcescens and K. pneumoniae being prevalent in the north-central part of the country and OXA-23/24-producing A. baumannii, OXA-48-producing K.pneumoniae, Morganella morganii and VIM-2-producing Escherichia coli/Pseudomonas aeruginosa detected in the north-east of the country. Conjugation studies showed that carbapenem resistance was transferable and PCR-based replicon typing identified blaNDM-1 on IncFIIs in S. marcescens and K. pneumoniae from Hospital 1 and blaOXA-48 on IncL plasmids in all Klebsiella spp. isolates from Hospitals 1 and 3. Our findings underline the importance of active surveillance for detection of CP-GNB asymptomatic faecal carriers and suggest a likely endemic spread of CP-GNB in Romania. PMID:27363583

  5. Development of a numerical scheme to predict geomagnetic storms after intense solar events and geomagnetic activity 27 days in advance. Final report, 6 Aug 86-16 Nov 90

    SciTech Connect

    Akasofu, S.I.; Lee, L.H.

    1991-02-01

    The modern geomagnetic storm prediction scheme should be based on a numerical simulation method, rather than on a statistical result. Furthermore, the scheme should be able to predict the geomagnetic storm indices, such as the Dst and AE indices, as a function of time. By recognizing that geomagnetic storms are powered by the solar wind-magnetosphere generator and that its power is given in terms of the solar wind speed, the interplanetary magnetic field (IMF) magnitude and polar angle, the authors have made a major advance in predicting both flare-induced storms and recurrent storms. Furthermore, it is demonstrated that the prediction scheme can be calibrated using the interplanetary scintillation (IPS) observation, when the solar disturbance advances about half-way to the earth. It is shown, however, that we are still far from a reliable prediction scheme. The prediction of the IMF polar angle requires future advance in understanding characteristics of magnetic clouds.

  6. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  7. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  8. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  9. Energy partitioning schemes: a dilemma.

    PubMed

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components. PMID:17328441

  10. An intelligent robotics control scheme

    NASA Technical Reports Server (NTRS)

    Orlando, N. E.

    1984-01-01

    The problem of robot control is viewed at the level of communicating high-level commands produced by intelligent algorithms to the actuator/sensor controllers. Four topics are considered in the design of an integrated control and communications scheme for an intelligent robotic system: the use of abstraction spaces, hierarchical versus heterarchical control, distributed processing, and the interleaving of the steps of plan creation and plan execution. A scheme is presented for an n-level distributed hierarchical/heterarchical control system that effectively interleaves intelligent planning, execution, and sensory feedback. A three-level version of this scheme has been successfully implemented in the Intelligent Systems Research Lab at NASA Langley Research Center. This implementation forms the control structure for DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), a testbed system integrating AI software with robotics hardware.

  11. Fundamental Limitations in Advanced LC Schemes

    SciTech Connect

    Mikhailichenko, A. A.

    2010-11-04

    Fundamental limitations in acceleration gradient, emittance, alignment and polarization in acceleration schemes are considered in application for novel schemes of acceleration, including laser-plasma and structure-based schemes. Problems for each method are underlined whenever it is possible. Main attention is paid to the scheme with a tilted laser bunch.

  12. A scheme for symmetrization verification

    NASA Astrophysics Data System (ADS)

    Sancho, Pedro

    2011-08-01

    We propose a scheme for symmetrization verification in two-particle systems, based on one-particle detection and state determination. In contrast to previous proposals, it does not follow a Hong-Ou-Mandel-type approach. Moreover, the technique can be used to generate superposition states of single particles.

  13. Invisibly Sanitizable Digital Signature Scheme

    NASA Astrophysics Data System (ADS)

    Miyazaki, Kunihiko; Hanaoka, Goichiro; Imai, Hideki

    A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is requested by a citizen. If this disclosure is done digitally by using the current digital signature schemes, the citizen cannot verify the disclosed information because it has been altered to prevent the leakage of sensitive information. The confidentiality of official information is thus incompatible with the integrity of that information, and this is called the digital document sanitizing problem. Conventional solutions such as content extraction signatures and digitally signed document sanitizing schemes with disclosure condition control can either let the sanitizer assign disclosure conditions or hide the number of sanitized portions. The digitally signed document sanitizing scheme we propose here is based on the aggregate signature derived from bilinear maps and can do both. Moreover, the proposed scheme can sanitize a signed document invisibly, that is, no one can distinguish whether the signed document has been sanitized or not.

  14. Geophysical Inversion Through Hierarchical Scheme

    NASA Astrophysics Data System (ADS)

    Furman, A.; Huisman, J. A.

    2010-12-01

    Geophysical investigation is a powerful tool that allows non-invasive and non-destructive mapping of subsurface states and properties. However, non-uniqueness associated with the inversion process prevents the quantitative use of these methods. One major direction researchers are going is constraining the inverse problem by hydrological observations and models. An alternative to the commonly used direct inversion methods are global optimization schemes (such as genetic algorithms and Monte Carlo Markov Chain methods). However, the major limitation here is the desired high resolution of the tomographic image, which leads to a large number of parameters and an unreasonably high computational effort when using global optimization schemes. Two innovative schemes are presented here. First, a hierarchical approach is used to reduce the computational effort for the global optimization. Solution is achieved for coarse spatial resolution, and this solution is used as the starting point for finer scheme. We show that the computational effort is reduced in this way dramatically. Second, we use a direct ERT inversion as the starting point for global optimization. In this case preliminary results show that the outcome is not necessarily beneficial, probably because of spatial mismatch between the results of the direct inversion and the true resistivity field.

  15. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  16. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    PubMed

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks. PMID:25486894

  17. a Study of Multiplexing Schemes for Voice and Data.

    NASA Astrophysics Data System (ADS)

    Sriram, Kotikalapudi

    Voice traffic variations are characterized by on/off transitions of voice calls, and talkspurt/silence transitions of speakers in conversations. A speaker is known to be in silence for more than half the time during a telephone conversation. In this dissertation, we study some schemes which exploit speaker silences for an efficient utilization of the transmission capacity in integrated voice/data multiplexing and in digital speech interpolation. We study two voice/data multiplexing schemes. In each scheme, any time slots momentarily unutilized by the voice traffic are made available to data. In the first scheme, the multiplexer does not use speech activity detectors (SAD), and hence the voice traffic variations are due to call on/off only. In the second scheme, the multiplexer detects speaker silences using SAD and transmits voice only during talkspurts. The multiplexer with SAD performs digital speech interpolation (DSI) as well as dynamic channel allocation to voice and data. The performance of the two schemes is evaluated using discrete-time modeling and analysis. The data delay performance for the case of English speech is compared with that for the case of Japanese speech. A closed form expression for the mean data message delay is derived for the single-channel single-talker case. In a DSI system, occasional speech losses occur whenever the number of speakers in simultaneous talkspurt exceeds the number of TDM voice channels. In a buffered DSI system, speech loss is further reduced at the cost of delay. We propose a novel fixed-delay buffered DSI scheme. In this scheme, speech fill-in/hangover is not required because there are no variable delays. Hence, all silences that naturally occur in speech are fully utilized. Consequently, a substantial improvement in the DSI performance is made possible. The scheme is modeled and analyzed in discrete -time. Its performance is evaluated in terms of the probability of speech clipping, packet rejection ratio, DSI

  18. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  19. Stable maps and Quot schemes

    NASA Astrophysics Data System (ADS)

    Popa, Mihnea; Roth, Mike

    2003-06-01

    In this paper we study the relationship between two different compactifications of the space of vector bundle quotients of an arbitrary vector bundle on a curve. One is Grothendieck's Quot scheme, while the other is a moduli space of stable maps to the relative Grassmannian. We establish an essentially optimal upper bound on the dimension of the two compactifications. Based on that, we prove that for an arbitrary vector bundle, the Quot schemes of quotients of large degree are irreducible and generically smooth. We precisely describe all the vector bundles for which the same thing holds in the case of the moduli spaces of stable maps. We show that there are in general no natural morphisms between the two compactifications. Finally, as an application, we obtain new cases of a conjecture on effective base point freeness for pluritheta linear series on moduli spaces of vector bundles.

  20. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  1. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme. PMID:24888983

  2. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  3. EFFICIENCY PROBLEMS RELATED TO PERMANGANATE OXIDATION SCHEMES

    EPA Science Inventory

    Oxidation schemes for the in-situ destruction of chlorinated solvents, using potassium permanganate, are receiving considerable attention. Indication from field studies and from our own work are that permanganate oxidation schemes have inherent problems that could severely limit...

  4. Pay scheme preferences and health policy objectives.

    PubMed

    Abelsen, Birgit

    2011-04-01

    This paper studies the preferences among healthcare workers towards pay schemes involving different levels of risk. It identifies which pay scheme individuals would prefer for themselves, and which they think is best in furthering health policy objectives. The paper adds, methodologically, a way of defining pay schemes that include different levels of risk. A questionnaire was mailed to a random sample of 1111 dentists. Respondents provided information about their current and preferred pay schemes, and indicated which pay scheme, in their opinion, would best further overall health policy objectives. A total of 504 dentists (45%) returned the questionnaire, and there was no indication of systematic non-response bias. All public dentists had a current pay scheme based on a fixed salary and the majority of individuals preferred a pay scheme with more income risk. Their preferred pay schemes coincided with the ones believed to further stabilise healthcare personnel. The predominant current pay scheme among private dentists was based solely on individual output, and the majority of respondents preferred this pay scheme. In addition, their preferred pay schemes coincided with the ones believed to further efficiency objectives. Both public and private dentists believed that pay schemes, furthering efficiency objectives, had to include more performance-related pay than the ones believed to further stability and quality objectives. PMID:20565995

  5. Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  6. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  7. A dynamic bandwidth allocation scheme for EPON

    NASA Astrophysics Data System (ADS)

    Li, Xiuyuan; Wu, Xiaojuan; Ma, Maode; Li, Wenming; Zhang, Yuanyuan

    2008-11-01

    This paper analyses current bandwidth schemes and proposes a novel dynamic bandwidth allocation scheme for EPON. According the scheme, we define four kinds of multimedia services such as Unsolicited Request Service (URS), Realtime Service (rt-S), Non-Real-time Service (nrt-S) and Best Effort (BE). Different kinds of services have different Quality of Service (QoS) requirements. Our scheme considers the diverse QoS request, e.g., delay for rt-S, throughput for nrt-S and fairness for BE. The simulation results show this novel scheme can ensure the quality of service (QoS) and improve bandwidth utilization.

  8. Training of Medical Physicists: Some Existing Training Schemes.

    ERIC Educational Resources Information Center

    Lanzl, Lawrence H.

    As an address to a seminar held in Germany, a summary is made concerning the present status and future development of medical physicist preparation in the U.S.A. A total of 121 programs are discussed on the basis of degree levels. Most training schemes consist of lectures, laboratory courses, and research activities with actual experience provided…

  9. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  10. Efficient implementation of weighted ENO schemes

    NASA Technical Reports Server (NTRS)

    Jiang, Guang-Shan; Shu, Chi-Wang

    1995-01-01

    In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially non-oscillatory) finite difference schemes of Liu, Osher and Chan. It was shown by Liu et al. that WENO schemes constructed from the r-th order (in L1 norm) ENO schemes are (r+1)-th order accurate. We propose a new way of measuring the smoothness of a numerical solution, emulating the idea of minimizing the total variation of the approximation, which results in a 5-th order WENO scheme for the case r = 3, instead of the 4-th order with the original smoothness measurement by Liu et al. This 5-th order WENO scheme is as fast as the 4-th order WENO scheme of Liu et al., and both schemes are about twice as fast as the 4-th order ENO schemes on vector supercomputers and as fast on serial and parallel computers. For Euler systems of gas dynamics, we suggest computing the weights from pressure and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which do not contain strong shocks or strong reflected waves. We also prove that, for conservation laws with smooth solutions, all WENO schemes are convergent. Many numerical tests, including the 1D steady state nozzle flow problem and 2D shock entropy wave interaction problem, are presented to demonstrate the remarkable capability of the WENO schemes, especially the WENO scheme using the new smoothness measurement, in resolving complicated shock and flow structures. We have also applied Yang's artificial compression method to the WENO schemes to sharpen contact discontinuities.

  11. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  12. Low-cost resilience schemes for the Optical Ethernet

    NASA Astrophysics Data System (ADS)

    Cugini, Filippo; Valcarenghi, Luca; Castoldi, Piero; Guglielmucci, Michele

    2005-12-01

    Optical Ethernet (OE) architectures transport IP packets directly over the optical layer by providing a specific Layer 2 framing. Although the architectures represent a simple and low-cost solution, the limiting factor for their widespread deployment is represented by the lack of some efficient operation, administration, and maintenance (OA&M) features, such as resilience. Optical layer protection represents a low-cost resilience scheme for OE links. We present the experimental results of low-cost protection implementations that are based on different failure detection and failure protection activation schemes for IP-over-OE networks. Specifically, a dedicated span protection scheme and an evolution for shared protection based on generalized multiprotocol label switching (GMPLS) signaling in transparent domains is presented. Experimental results show that recovery times in the millisecond range are achieved.

  13. How can conceptual schemes change teaching?

    NASA Astrophysics Data System (ADS)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  14. Rapid Parameterization Schemes for Aircraft Shape Optimization

    NASA Technical Reports Server (NTRS)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  15. A cascaded coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Kasami, T.; Lin, S.

    1985-01-01

    A cascaded coding scheme for error control was investigated. The scheme employs a combination of hard and soft decisions in decoding. Error performance is analyzed. If the inner and outer codes are chosen properly, extremely high reliability can be attained even for a high channel bit-error-rate. Some example schemes are studied which seem to be quite suitable for satellite down-link error control.

  16. Simulation of the Australian Mobilesat signalling scheme

    NASA Technical Reports Server (NTRS)

    Rahman, Mushfiqur

    1990-01-01

    The proposed Australian Mobilesat system will provide a range of circuit switched voice/data services using the B-series satellites. The reliability of the signalling scheme between the Network Management Station (NMS) and the mobile terminal (MT) is of critical importance to the performance of the overall system. Simulation results of the performance of the signalling scheme under various channel conditions and coding schemes are presented.

  17. Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  18. Frost Growth CFD Model of an Integrated Active Desiccant Rooftop Unit

    SciTech Connect

    Geoghegan, Patrick J; Petrov, Andrei Y; Vineyard, Edward Allan; Zaltash, Abdolreza; Linkous, Randall Lee

    2008-01-01

    A frost growth model is incorporated into a Computational Fluid Dynamics (CFD) simulation of a heat pump by means of a user-defined function in FLUENT, a commercial CFD code. The transient model is applied to the outdoor section of an Integrated Active Desiccant Rooftop (IADR) unit in heating mode. IADR is a hybrid vapor compression and active desiccant unit capable of handling 100% outdoor air (dedicated outdoor air system) or as a total conditioning system, handling both outdoor air and space cooling or heating loads. The predicted increase in flow resistance and loss in heat transfer capacity due to frost build-up are compared to experimental pressure drop readings and thermal imaging. The purpose of this work is to develop a CFD model that is capable of predicting frost growth, an invaluable tool in evaluating the effectiveness of defrost-on-demand cycles.

  19. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  20. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes. PMID:24777588

  1. Students' Whole Number Multiplicative Concepts: A Critical Constructive Resource for Fraction Composition Schemes

    ERIC Educational Resources Information Center

    Hackenberg, Amy J.; Tillema, Erik S.

    2009-01-01

    This article reports on the activity of two pairs of sixth grade students who participated in an 8-month teaching experiment that investigated the students' construction of fraction composition schemes. A fraction composition scheme consists of the operations and concepts used to determine, for example, the size of 1/3 of 1/5 of a whole in…

  2. Variable-flavor number scheme for next-to-next-to-leading order

    SciTech Connect

    Thorne, R.S.

    2006-03-01

    At NNLO it is particularly important to have a Variable-flavor Number Scheme (VFNS) to deal with heavy quarks because there are major problems with both the zero-mass variable-flavor number scheme and the fixed-flavor number scheme. I illustrate these problems and present a general formulation of a Variable-flavor Number Scheme (VFNS) for heavy quarks that is explicitly implemented up to NNLO in the strong coupling constant {alpha}{sub S}, and may be used in NNLO global fits for parton distributions. The procedure combines elements of the ACOT({chi}) scheme and the Thorne-Roberts scheme. Despite the fact that at NNLO the parton distributions are discontinuous as one changes the number of active quark flavors, all physical quantities are continuous at flavor transitions and the comparison with data is successful.

  3. Localization scheme for relativistic spinors

    NASA Astrophysics Data System (ADS)

    Ciupka, J.; Hanrath, M.; Dolg, M.

    2011-12-01

    A new method to determine localized complex-valued one-electron functions in the occupied space is presented. The approach allows the calculation of localized orbitals regardless of their structure and of the entries in the spinor coefficient matrix, i.e., one-, two-, and four-component Kramers-restricted or unrestricted one-electron functions with real or complex expansion coefficients. The method is applicable to localization schemes that maximize (or minimize) a functional of the occupied spinors and that use a localization operator for which a matrix representation is available. The approach relies on the approximate joint diagonalization (AJD) of several Hermitian (symmetric) matrices which is utilized in electronic signal processing. The use of AJD in this approach has the advantage that it allows a reformulation of the localization criterion on an iterative 2 × 2 pair rotating basis in an analytical closed form which has not yet been described in the literature for multi-component (complex-valued) spinors. For the one-component case, the approach delivers the same Foster-Boys or Pipek-Mezey localized orbitals that one obtains from standard quantum chemical software, whereas in the multi-component case complex-valued spinors satisfying the selected localization criterion are obtained. These localized spinors allow the formulation of local correlation methods in a multi-component relativistic framework, which was not yet available. As an example, several heavy and super-heavy element systems are calculated using a Kramers-restricted self-consistent field and relativistic two-component pseudopotentials in order to investigate the effect of spin-orbit coupling on localization.

  4. An Accounting Scheme for Personality Study.

    ERIC Educational Resources Information Center

    Dillon, James J.; Feldman, S. Shirley

    Realizing the importance of human personality variables in comprehensive educational assessment structures, Operation PEP sought to develop a tool to assess specific human personality characteristics. The resulting accounting scheme is divided into three chapters: (1) an outline and definition of relevant terminology, (2) a scheme to account for…

  5. Finite volume renormalization scheme for fermionic operators

    SciTech Connect

    Monahan, Christopher; Orginos, Kostas

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  6. A novel key management scheme using biometrics

    NASA Astrophysics Data System (ADS)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  7. Splitting scheme for poroelasticity and thermoelasticity problems

    NASA Astrophysics Data System (ADS)

    Vabishchevich, P. N.; Vasil'eva, M. V.; Kolesov, A. E.

    2014-08-01

    Boundary value problems in thermoelasticity and poroelasticity (filtration consolidation) are solved numerically. The underlying system of equations consists of the Lamé stationary equations for displacements and nonstationary equations for temperature or pressure in the porous medium. The numerical algorithm is based on a finite-element approximation in space. Standard stability conditions are formulated for two-level schemes with weights. Such schemes are numerically implemented by solving a system of coupled equations for displacements and temperature (pressure). Splitting schemes with respect to physical processes are constructed, in which the transition to a new time level is associated with solving separate elliptic problems for the desired displacements and temperature (pressure). Unconditionally stable additive schemes are constructed by choosing a weight of a three-level scheme.

  8. Structural stability of Lattice Boltzmann schemes

    NASA Astrophysics Data System (ADS)

    David, Claire; Sagaut, Pierre

    2016-02-01

    The goal of this work is to determine classes of traveling solitary wave solutions for Lattice Boltzmann schemes by means of a hyperbolic ansatz. It is shown that spurious solitary waves can occur in finite-difference solutions of nonlinear wave equation. The occurrence of such a spurious solitary wave, which exhibits a very long life time, results in a non-vanishing numerical error for arbitrary time in unbounded numerical domain. Such a behavior is referred here to have a structural instability of the scheme, since the space of solutions spanned by the numerical scheme encompasses types of solutions (solitary waves in the present case) that are not solutions of the original continuous equations. This paper extends our previous work about classical schemes to Lattice Boltzmann schemes (David and Sagaut 2011; 2009a,b; David et al. 2007).

  9. Investigation of nonlinear motion simulator washout schemes

    NASA Technical Reports Server (NTRS)

    Riedel, S. A.; Hofmann, L. G.

    1978-01-01

    An overview is presented of some of the promising washout schemes which have been devised. The four schemes presented fall into two basic configurations; crossfeed and crossproduct. Various nonlinear modifications further differentiate the four schemes. One nonlinear scheme is discussed in detail. This washout scheme takes advantage of subliminal motions to speed up simulator cab centering. It exploits so-called perceptual indifference thresholds to center the simulator cab at a faster rate whenever the input to the simulator is below the perceptual indifference level. The effect is to reduce the angular and translational simulation motion by comparison with that for the linear washout case. Finally, the conclusions and implications for further research in the area of nonlinear washout filters are presented.

  10. Quantum proxy signature scheme with public verifiability

    NASA Astrophysics Data System (ADS)

    Zhou, Jingxian; Zhou, Yajian; Niu, Xinxin; Yang, Yixian

    2011-10-01

    In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However, the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person. Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantum entanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key when he generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone can verify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be public verified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal.

  11. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-07-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  12. Efficient DSMC collision-partner selection schemes.

    SciTech Connect

    Gallis, Michail A.; Torczynski, John Robert

    2010-05-01

    The effect of collision-partner selection schemes on the accuracy and the efficiency of the Direct Simulation Monte Carlo (DSMC) method of Bird is investigated. Several schemes to reduce the total discretization error as a function of the mean collision separation and the mean collision time are examined. These include the historically first sub-cell scheme, the more recent nearest-neighbor scheme, and various near-neighbor schemes, which are evaluated for their effect on the thermal conductivity for Fourier flow. Their convergence characteristics as a function of spatial and temporal discretization and the number of simulators per cell are compared to the convergence characteristics of the sophisticated and standard DSMC algorithms. Improved performance is obtained if the population from which possible collision partners are selected is an appropriate fraction of the population of the cell.

  13. Two level scheme solvers for nuclear spectroscopy

    NASA Astrophysics Data System (ADS)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  14. The basic function scheme of polynomial type

    SciTech Connect

    WU, Wang-yi; Lin, Guang

    2009-12-01

    A new numerical method---Basic Function Method is proposed. This method can directly discrete differential operator on unstructured grids. By using the expansion of basic function to approach the exact function, the central and upwind schemes of derivative are constructed. By using the second-order polynomial as basic function and applying the technique of flux splitting method and the combination of central and upwind schemes to suppress the non-physical fluctuation near the shock wave, the second-order basic function scheme of polynomial type for solving inviscid compressible flow numerically is constructed in this paper. Several numerical results of many typical examples for two dimensional inviscid compressible transonic and supersonic steady flow illustrate that it is a new scheme with high accuracy and high resolution for shock wave. Especially, combining with the adaptive remeshing technique, the satisfactory results can be obtained by these schemes.

  15. Complex Modelling Scheme Of An Additive Manufacturing Centre

    NASA Astrophysics Data System (ADS)

    Popescu, Liliana Georgeta

    2015-09-01

    This paper presents a modelling scheme sustaining the development of an additive manufacturing research centre model and its processes. This modelling is performed using IDEF0, the resulting model process representing the basic processes required in developing such a centre in any university. While the activities presented in this study are those recommended in general, changes may occur in specific existing situations in a research centre.

  16. Testing hydrodynamics schemes in galaxy disc simulations

    NASA Astrophysics Data System (ADS)

    Few, C. G.; Dobbs, C.; Pettitt, A.; Konstandin, L.

    2016-08-01

    We examine how three fundamentally different numerical hydrodynamics codes follow the evolution of an isothermal galactic disc with an external spiral potential. We compare an adaptive mesh refinement code (RAMSES), a smoothed particle hydrodynamics code (SPHNG), and a volume-discretized mesh-less code (GIZMO). Using standard refinement criteria, we find that RAMSES produces a disc that is less vertically concentrated and does not reach such high densities as the SPHNG or GIZMO runs. The gas surface density in the spiral arms increases at a lower rate for the RAMSES simulations compared to the other codes. There is also a greater degree of substructure in the SPHNG and GIZMO runs and secondary spiral arms are more pronounced. By resolving the Jeans length with a greater number of grid cells, we achieve more similar results to the Lagrangian codes used in this study. Other alterations to the refinement scheme (adding extra levels of refinement and refining based on local density gradients) are less successful in reducing the disparity between RAMSES and SPHNG/GIZMO. Although more similar, SPHNG displays different density distributions and vertical mass profiles to all modes of GIZMO (including the smoothed particle hydrodynamics version). This suggests differences also arise which are not intrinsic to the particular method but rather due to its implementation. The discrepancies between codes (in particular, the densities reached in the spiral arms) could potentially result in differences in the locations and time-scales for gravitational collapse, and therefore impact star formation activity in more complex galaxy disc simulations.

  17. Camouflage, Color Schemes, and Cubism.

    ERIC Educational Resources Information Center

    Guhin, Paula

    2002-01-01

    Presents an art activity where students learn about Cubism and color mixing. Explains that the students create camouflaged animals after learning about the work, "Female Torso" (Pablo Picasso). Includes directions for how to create the pictures and states that the assignment can be used with students of all ages. (CMK)

  18. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  19. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-09-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  20. Towards an "All Speed" Unstructured Upwind Scheme

    NASA Technical Reports Server (NTRS)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  1. A nonconservative scheme for isentropic gas dynamics

    SciTech Connect

    Chen, Gui-Qiang |; Liu, Jian-Guo

    1994-05-01

    In this paper, we construct a second-order nonconservative for the system of isentropic gas dynamics to capture the physical invariant regions for preventing negative density, to treat the vacuum singularity, and to control the local entropy from dramatically increasing near shock waves. The main difference in the construction of the scheme discussed here is that we use piecewise linear functions to approximate the Riemann invariants w and z instead of the physical variables {rho} and m. Our scheme is a natural extension of the schemes for scalar conservation laws and it can be numerical implemented easily because the system is diagonalized in this coordinate system. Another advantage of using Riemann invariants is that the Hessian matrix of any weak entropy has no singularity in the Riemann invariant plane w-z, whereas the Hessian matrices of the weak entropies have singularity at the vacuum points in the physical plane p-m. We prove that this scheme converges to an entropy solution for the Cauchy problem with L{sup {infinity}} initial data. By convergence here we mean that there is a subsequent convergence to a generalized solution satisfying the entrophy condition. As long as the entropy solution is unique, the whole sequence converges to a physical solution. This shows that this kind of scheme is quite reliable from theoretical view of point. In addition to being interested in the scheme itself, we wish to provide an approach to rigorously analyze nonconservative finite difference schemes.

  2. Towards a genuinely multi-dimensional upwind scheme

    NASA Technical Reports Server (NTRS)

    Powell, Kenneth G.; Vanleer, Bram; Roe, Philip L.

    1990-01-01

    Methods of incorporating multi-dimensional ideas into algorithms for the solution of Euler equations are presented. Three schemes are developed and tested: a scheme based on a downwind distribution, a scheme based on a rotated Riemann solver and a scheme based on a generalized Riemann solver. The schemes show an improvement over first-order, grid-aligned upwind schemes, but the higher-order performance is less impressive. An outlook for the future of multi-dimensional upwind schemes is given.

  3. A Spatial Domain Quantum Watermarking Scheme

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  4. Novel neural networks-based fault tolerant control scheme with fault alarm.

    PubMed

    Shen, Qikun; Jiang, Bin; Shi, Peng; Lim, Cheng-Chew

    2014-11-01

    In this paper, the problem of adaptive active fault-tolerant control for a class of nonlinear systems with unknown actuator fault is investigated. The actuator fault is assumed to have no traditional affine appearance of the system state variables and control input. The useful property of the basis function of the radial basis function neural network (NN), which will be used in the design of the fault tolerant controller, is explored. Based on the analysis of the design of normal and passive fault tolerant controllers, by using the implicit function theorem, a novel NN-based active fault-tolerant control scheme with fault alarm is proposed. Comparing with results in the literature, the fault-tolerant control scheme can minimize the time delay between fault occurrence and accommodation that is called the time delay due to fault diagnosis, and reduce the adverse effect on system performance. In addition, the FTC scheme has the advantages of a passive fault-tolerant control scheme as well as the traditional active fault-tolerant control scheme's properties. Furthermore, the fault-tolerant control scheme requires no additional fault detection and isolation model which is necessary in the traditional active fault-tolerant control scheme. Finally, simulation results are presented to demonstrate the efficiency of the developed techniques. PMID:25014982

  5. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery. PMID:26433889

  6. Palmprint based multidimensional fuzzy vault scheme.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  7. PICOBIT: A Compact Scheme System for Microcontrollers

    NASA Astrophysics Data System (ADS)

    St-Amour, Vincent; Feeley, Marc

    Due to their tight memory constraints, small microcontroller based embedded systems have traditionally been implemented using low-level languages. This paper shows that the Scheme programming language can also be used for such applications, with less than 7 kB of total memory. We present PICOBIT, a very compact implementation of Scheme suitable for memory constrained embedded systems. To achieve a compact system we have tackled the space issue in three ways: the design of a Scheme compiler generating compact bytecode, a small virtual machine, and an optimizing C compiler suited to the compilation of the virtual machine.

  8. A classification scheme for chimera states

    NASA Astrophysics Data System (ADS)

    Kemeth, Felix P.; Haugland, Sindre W.; Schmidt, Lennart; Kevrekidis, Ioannis G.; Krischer, Katharina

    2016-09-01

    We present a universal characterization scheme for chimera states applicable to both numerical and experimental data sets. The scheme is based on two correlation measures that enable a meaningful definition of chimera states as well as their classification into three categories: stationary, turbulent, and breathing. In addition, these categories can be further subdivided according to the time-stationarity of these two measures. We demonstrate that this approach is both consistent with previously recognized chimera states and enables us to classify states as chimeras which have not been categorized as such before. Furthermore, the scheme allows for a qualitative and quantitative comparison of experimental chimeras with chimeras obtained through numerical simulations.

  9. Improved Quantum Signature Scheme with Weak Arbitrator

    NASA Astrophysics Data System (ADS)

    Su, Qi; Li, Wen-Min

    2013-09-01

    In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

  10. Finite-volume scheme for anisotropic diffusion

    NASA Astrophysics Data System (ADS)

    van Es, Bram; Koren, Barry; de Blank, Hugo J.

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  11. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  12. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error contol in data communications was analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of errors after the inner code decoding. Probability of undetected error of the proposed scheme is derived. An efficient method for computing this probability is presented. Throughout efficiency of the proposed error control scheme incorporated with a selective repeat ARQ retransmission strategy is analyzed.

  13. The GEMPAK Barnes objective analysis scheme

    NASA Technical Reports Server (NTRS)

    Koch, S. E.; Desjardins, M.; Kocin, P. J.

    1981-01-01

    GEMPAK, an interactive computer software system developed for the purpose of assimilating, analyzing, and displaying various conventional and satellite meteorological data types is discussed. The objective map analysis scheme possesses certain characteristics that allowed it to be adapted to meet the analysis needs GEMPAK. Those characteristics and the specific adaptation of the scheme to GEMPAK are described. A step-by-step guide for using the GEMPAK Barnes scheme on an interactive computer (in real time) to analyze various types of meteorological datasets is also presented.

  14. Higher order Godunov schemes for isothermal hydrodynamics

    NASA Technical Reports Server (NTRS)

    Balsara, Dinshaw S.

    1994-01-01

    In this paper we construct higher order Godunov schemes for isothermal flow. Isothermal hydrodynamics serves as a good representation for several systems of astrophysical interest. The schemes designed here have second-order accuracy in space and time and some are third-order accurate for advection. Moreover, several ingredients of these schemes are essential components of even higher order. The methods designed here have excellent ability to represent smooth flow yet capture shocks with high resolution. Several test problems are presented. The algorithms presented here are compared with other algorithms having a comparable formal order of accuracy.

  15. A diagonally inverted LU implicit multigrid scheme

    NASA Technical Reports Server (NTRS)

    Yokota, Jeffrey W.; Caughey, David A.; Chima, Rodrick V.

    1988-01-01

    A new Diagonally Inverted LU Implicit scheme is developed within the framework of the multigrid method for the 3-D unsteady Euler equations. The matrix systems that are to be inverted in the LU scheme are treated by local diagonalizing transformations that decouple them into systems of scalar equations. Unlike the Diagonalized ADI method, the time accuracy of the LU scheme is not reduced since the diagonalization procedure does not destroy time conservation. Even more importantly, this diagonalization significantly reduces the computational effort required to solve the LU approximation and therefore transforms it into a more efficient method of numerically solving the 3-D Euler equations.

  16. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. PMID:25666924

  17. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Y. C.; Sayood, Khalid; Nelson, D. J.

    1991-01-01

    We present a layered packet video coding algorithm based on a progressive transmission scheme. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  18. Secure Wake-Up Scheme for WBANs

    NASA Astrophysics Data System (ADS)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  19. An efficient medical image compression scheme.

    PubMed

    Li, Xiaofeng; Shen, Yi; Ma, Jiachen

    2005-01-01

    In this paper, a fast lossless compression scheme is presented for the medical image. This scheme consists of two stages. In the first stage, a Differential Pulse Code Modulation (DPCM) is used to decorrelate the raw image data, therefore increasing the compressibility of the medical image. In the second stage, an effective scheme based on the Huffman coding method is developed to encode the residual image. This newly proposed scheme could reduce the cost for the Huffman coding table while achieving high compression ratio. With this algorithm, a compression ratio higher than that of the lossless JPEG method for image can be obtained. At the same time, this method is quicker than the lossless JPEG2000. In other words, the newly proposed algorithm provides a good means for lossless medical image compression. PMID:17280962

  20. Optimal Symmetric Ternary Quantum Encryption Schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yu-qi; She, Kun; Huang, Ru-fen; Ouyang, Zhong

    2016-07-01

    In this paper, we present two definitions of the orthogonality and orthogonal rate of an encryption operator, and we provide a verification process for the former. Then, four improved ternary quantum encryption schemes are constructed. Compared with Scheme 1 (see Section 2.3), these four schemes demonstrate significant improvements in term of calculation and execution efficiency. Especially, under the premise of the orthogonal rate ɛ as secure parameter, Scheme 3 (see Section 4.1) shows the highest level of security among them. Through custom interpolation functions, the ternary secret key source, which is composed of the digits 0, 1 and 2, is constructed. Finally, we discuss the security of both the ternary encryption operator and the secret key source, and both of them show a high level of security and high performance in execution efficiency.

  1. ONU Power Saving Scheme for EPON System

    NASA Astrophysics Data System (ADS)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  2. A robust coding scheme for packet video

    NASA Technical Reports Server (NTRS)

    Chen, Yun-Chung; Sayood, Khalid; Nelson, Don J.

    1992-01-01

    A layered packet video coding algorithm based on a progressive transmission scheme is presented. The algorithm provides good compression and can handle significant packet loss with graceful degradation in the reconstruction sequence. Simulation results for various conditions are presented.

  3. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2009-01-01

    A third-order Energy Stable Weighted Essentially Non-Oscillatory (ESWENO) finite difference scheme developed by Yamaleev and Carpenter was proven to be stable in the energy norm for both continuous and discontinuous solutions of systems of linear hyperbolic equations. Herein, a systematic approach is presented that enables 'energy stable' modifications for existing WENO schemes of any order. The technique is demonstrated by developing a one-parameter family of fifth-order upwind-biased ESWENO schemes; ESWENO schemes up to eighth order are presented in the appendix. New weight functions are also developed that provide (1) formal consistency, (2) much faster convergence for smooth solutions with an arbitrary number of vanishing derivatives, and (3) improved resolution near strong discontinuities.

  4. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  5. Composite centered schemes for multidimensional conservation laws

    SciTech Connect

    Liska, R.; Wendroff, B.

    1998-05-08

    The oscillations of a centered second order finite difference scheme and the excessive diffusion of a first order centered scheme can be overcome by global composition of the two, that is by performing cycles consisting of several time steps of the second order method followed by one step of the diffusive method. The authors show the effectiveness of this approach on some test problems in two and three dimensions.

  6. Dynamic Restarting Schemes for Eigenvalue Problems

    SciTech Connect

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  7. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  8. Efficient multiparty quantum-secret-sharing schemes

    SciTech Connect

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-05-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.

  9. Adaptive MPEG-2 video data hiding scheme

    NASA Astrophysics Data System (ADS)

    Sarkar, Anindya; Madhow, Upamanyu; Chandrasekaran, Shivkumar; Manjunath, Bangalore S.

    2007-02-01

    We have investigated adaptive mechanisms for high-volume transform-domain data hiding in MPEG-2 video which can be tuned to sustain varying levels of compression attacks. The data is hidden in the uncompressed domain by scalar quantization index modulation (QIM) on a selected set of low-frequency discrete cosine transform (DCT) coefficients. We propose an adaptive hiding scheme where the embedding rate is varied according to the type of frame and the reference quantization parameter (decided according to MPEG-2 rate control scheme) for that frame. For a 1.5 Mbps video and a frame-rate of 25 frames/sec, we are able to embed almost 7500 bits/sec. Also, the adaptive scheme hides 20% more data and incurs significantly less frame errors (frames for which the embedded data is not fully recovered) than the non-adaptive scheme. Our embedding scheme incurs insertions and deletions at the decoder which may cause de-synchronization and decoding failure. This problem is solved by the use of powerful turbo-like codes and erasures at the encoder. The channel capacity estimate gives an idea of the minimum code redundancy factor required for reliable decoding of hidden data transmitted through the channel. To that end, we have modeled the MPEG-2 video channel using the transition probability matrices given by the data hiding procedure, using which we compute the (hiding scheme dependent) channel capacity.

  10. Simplification of the unified gas kinetic scheme.

    PubMed

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function. PMID:27627418

  11. Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael Chung-Wei

    2015-01-01

    Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. PMID:25692179

  12. Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

    PubMed Central

    Heng, Swee-Huay; Phan, Raphael Chung-Wei

    2015-01-01

    Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-more discrete logarithm assumption, translating to weaker security guarantees due to the interactive nature of these assumptions. The Schnorr-IBI scheme was first proposed through the Kurosawa-Heng transformation from the Schnorr signature. It remains one of the fastest yet most secure IBI schemes under impersonation against passive attacks due to its pairing-free design. However, when required to be secure against impersonators under active and concurrent attacks, it deteriorates greatly in terms of efficiency due to the protocol having to be repeated multiple times. In this paper, we upgrade the Schnorr-IBI scheme to be secure against impersonation under active and concurrent attacks using only the classical discrete logarithm assumption. This translates to a higher degree of security guarantee with only some minor increments in operational costs. Furthermore, because the scheme operates without pairings, it still retains its efficiency and superiority when compared to other pairing-based IBI schemes. PMID:25692179

  13. Standardization of 64Cu using an improved decay scheme

    NASA Astrophysics Data System (ADS)

    Amiot, M. N.; Bé, M. M.; Branger, T.; Cassette, P.; Lépy, M. C.; Ménesguen, Y.; Da Silva, I.

    2012-08-01

    A 64Cu solution was standardized by means of liquid scintillation counting. The activity of the solution was also determined with an ionization chamber whose response was simulated by using a Monte Carlo code. The photon emission intensities including K X-rays were determined to be I511=35.1 (3)%; I1346=0.472 (12)%, IKα=14.41 (15)%, IKβ=2.01 (3)%, respectively. 64Cu half-life was also determined as 12.718 (23) h. The new decay scheme used in the present work was established following the EURAMET 1085 exercise where a good agreement between activity measurement techniques was found.

  14. A factorial assessment of the sensitivity of the BATS land-surface parameterization scheme. [BATS (Biosphere-Atmosphere Transfer Scheme)

    SciTech Connect

    Henderson-Sellers, A. )

    1993-02-01

    Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.

  15. ESTIMATING PLUME DISPERSION: A COMPARISON OF SEVERAL SIGMA SCHEMES

    EPA Science Inventory

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, ...

  16. Testing hydrodynamics schemes in galaxy disc simulations

    NASA Astrophysics Data System (ADS)

    Few, C. G.; Dobbs, C.; Pettitt, A.; Konstandin, L.

    2016-08-01

    We examine how three fundamentally different numerical hydrodynamics codes follow the evolution of an isothermal galactic disc with an external spiral potential. We compare an adaptive mesh refinement code (RAMSES), a smoothed particle hydrodynamics code (sphNG), and a volume-discretised meshless code (GIZMO). Using standard refinement criteria, we find that RAMSES produces a disc that is less vertically concentrated and does not reach such high densities as the sphNG or GIZMO runs. The gas surface density in the spiral arms increases at a lower rate for the RAMSES simulations compared to the other codes. There is also a greater degree of substructure in the sphNG and GIZMO runs and secondary spiral arms are more pronounced. By resolving the Jeans' length with a greater number of grid cells we achieve more similar results to the Lagrangian codes used in this study. Other alterations to the refinement scheme (adding extra levels of refinement and refining based on local density gradients) are less successful in reducing the disparity between RAMSES and sphNG/GIZMO. Although more similar, sphNG displays different density distributions and vertical mass profiles to all modes of GIZMO (including the smoothed particle hydrodynamics version). This suggests differences also arise which are not intrinsic to the particular method but rather due to its implementation. The discrepancies between codes (in particular, the densities reached in the spiral arms) could potentially result in differences in the locations and timescales for gravitational collapse, and therefore impact star formation activity in more complex galaxy disc simulations.

  17. An efficient authentication scheme for telecare medicine information systems.

    PubMed

    Zhu, Zhian

    2012-12-01

    To ensure patients' privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user's smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme. PMID:22527784

  18. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  19. A classification scheme for risk assessment methods.

    SciTech Connect

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In Section 2 we provide context for this report

  20. Simple theory for designing tidal power schemes

    NASA Astrophysics Data System (ADS)

    Prandle, D.

    Basic parameters governing the design of tidal power schemes are identified and converted to dimensionless form by reference to (i) the mean tidal range and (ii) the surface area of the enclosed basin. Optimum values for these dimensionless parameters are derived and comparison made with actual engineering designs. A theoretical framework is thus established which can be used (i) to make a rudimentary design at any specific location or (ii) to compare and evaluate designs for various locations. Both one-way (flood or ebb) and two-way (flood and ebb) schemes are examined and, theoretically, the two-way scheme is shown to be more efficient. However, in practice, two-way schemes suffer disadvantages arising from (i) two-way flow through both turbines and sluices and (ii) lower average turbine heads. An important dimensional aspect of tidal power schemes is that, while energy extracted is proportional to the tidal amplitude squared, the requisite sluicing area is proportional to the square root of the tidal amplitude. In consequence, sites with large tidal amplitudes are best suited to tidal power development whereas for sites with low tidal amplitudes sluicing costs may be prohibitive.

  1. Identification Schemes from Key Encapsulation Mechanisms

    NASA Astrophysics Data System (ADS)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  2. A flexible gridding scheme for reservoir simulation

    SciTech Connect

    Verma, S.

    1995-12-31

    This paper describes a new control volume based finite difference scheme for petroleum reservoir simulation which can be used with unstructured grids. The numerical scheme to model fluid flow is shown to be easily used for Voronoi grids in 2D. It can also be used with certain geometrical limitations for 3D Voronoi grids. The scheme can be used without any significant limitations for triangle or tetrahedron based grids where control volumes are constructed around their vertices. It assumes uniform properties inside such control volumes. Full, anisotropic and asymmetric permeability tensor can be easily handled with the proposed method. The permeability tensor can vary from block to block. Thus it will be of great value in modeling fluid flow in reservoirs where principal directions of permeability varies between beds or within a bed. The paper also presents an analysis of some of the published flexible gridding schemes which use a control volume type algebraic approximation and demonstrate the advantages of the method presented here. The technique for grid construction is also discussed. Test results presented here demonstrate the need for proper representation of reservoir geometry to predict the correct flow behavior. The gridding scheme described in this paper achieves that purpose.

  3. Selecting optimal partitioning schemes for phylogenomic datasets

    PubMed Central

    2014-01-01

    Background Partitioning involves estimating independent models of molecular evolution for different subsets of sites in a sequence alignment, and has been shown to improve phylogenetic inference. Current methods for estimating best-fit partitioning schemes, however, are only computationally feasible with datasets of fewer than 100 loci. This is a problem because datasets with thousands of loci are increasingly common in phylogenetics. Methods We develop two novel methods for estimating best-fit partitioning schemes on large phylogenomic datasets: strict and relaxed hierarchical clustering. These methods use information from the underlying data to cluster together similar subsets of sites in an alignment, and build on clustering approaches that have been proposed elsewhere. Results We compare the performance of our methods to each other, and to existing methods for selecting partitioning schemes. We demonstrate that while strict hierarchical clustering has the best computational efficiency on very large datasets, relaxed hierarchical clustering provides scalable efficiency and returns dramatically better partitioning schemes as assessed by common criteria such as AICc and BIC scores. Conclusions These two methods provide the best current approaches to inferring partitioning schemes for very large datasets. We provide free open-source implementations of the methods in the PartitionFinder software. We hope that the use of these methods will help to improve the inferences made from large phylogenomic datasets. PMID:24742000

  4. Upwind and symmetric shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1987-01-01

    The development of numerical methods for hyperbolic conservation laws has been a rapidly growing area for the last ten years. Many of the fundamental concepts and state-of-the-art developments can only be found in meeting proceedings or internal reports. This review paper attempts to give an overview and a unified formulation of a class of shock-capturing methods. Special emphasis is on the construction of the basic nonlinear scalar second-order schemes and the methods of extending these nonlinear scalar schemes to nonlinear systems via the extact Riemann solver, approximate Riemann solvers, and flux-vector splitting approaches. Generalization of these methods to efficiently include real gases and large systems of nonequilibrium flows is discussed. The performance of some of these schemes is illustrated by numerical examples for one-, two- and three-dimensional gas dynamics problems.

  5. A compositional classification scheme for meteoritic chondrules

    NASA Technical Reports Server (NTRS)

    Sears, Derek W. G.; Jie, LU; Benoit, Paul H.; Dehart, John M.; Lofgren, Gary E.

    1992-01-01

    A compositionally based classification scheme for chondrules is proposed that will help in systematizing the wealth of data available and disentangling the effects of nebular and subsequent processes. The classification is not by texture or the composition of a single phase, or a mixture of these two, but rather is a comprehensive, systematic approach which uses the composition of the two main chondrule components. This scheme is applicable to over 95 percent of the chondrules and is easily applied using an electron microprobe. It stresses the original diversity of the chondrules and the complex yet facile way in which they respond to parent-body metamorphism. Results using this classification scheme suggest that arguments against an important role of chondrules in determining the compositional trends of the chondrites have been premature.

  6. Scheme for multistep resonance photoionization of atoms

    NASA Astrophysics Data System (ADS)

    Liu, Bo; Ning, Xi-Jing

    2001-07-01

    Traditional schemes for multistep resonance photoionization of atoms let every employed laser beam interact with the atoms simultaneously. In such a situation, analyses via time-dependent Schrödinger equation show that high ionization probability requires all the laser beams must be intense enough. In order to decrease laser intensity, we proposed a scheme that the laser beam used to pump the excited atoms (in a higher bound state) into an autoionization state does not interact with the atoms until all the population is transferred by the other lasers from a ground state to the bound state. As an interesting example, we examined three-step photoionization of 235U with our scheme, showing that the intensity of two laser beams can be lowered by two orders of magnitude without losing high ionization probability.

  7. An adaptive Cartesian control scheme for manipulators

    NASA Technical Reports Server (NTRS)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  8. Cooling scheme for turbine hot parts

    DOEpatents

    Hultgren, Kent Goran; Owen, Brian Charles; Dowman, Steven Wayne; Nordlund, Raymond Scott; Smith, Ricky Lee

    2000-01-01

    A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.

  9. O Shallow Cumulus Parameterization Schemes for General Circulation Model Planetary Boundary Layers

    NASA Astrophysics Data System (ADS)

    Li, Jui-Lin Frank

    that near cloud base the heating and moistening rates are unrealistic for all traditional schemes unless small-scale nonlocal fluxes and cloud root effects are taken into account. We have found that the Betts-Miller adjustment and its modified schemes are very sensitive to small-scale turbulence processes at the cloud base and the choice of temperature and humidity reference profiles. A proper inclusion of subcloud layer adjustment (cloud root effects) into the entire PBL may be necessary in the schemes. The results from running the model with a modified cumulus mass flux scheme and our new scheme give more reasonable convective heating and moistening rates, in agreement with the composite observed budgets of heat and moisture. Unlike the other parameterization schemes, the new eddy diffusion scheme yields upward cloud scale buoyancy fluxes in unstable conditions which agree with observations. Exclusion of nonlocal cumulus fluxes shows too much cumulus-scale cooling and moistening in the upper cloud layer. We conclude that this new scheme is able to represent different kinds of shallow cumulus clouds which range from very weak to very strongly active in a model. Our study suggests that a high vertical resolution one-D PBL model is a useful tool to understand indirect interactions between small-scale and cloud-scale processes and can be used as a complement to observations for the improvement of shallow cumulus parameterization schemes in large-scale models. The new cumulus diffusion scheme is useful for its simplicity and can be easily implemented in a GCM.

  10. The Nonlinear Characteristic scheme in X-Y geometries

    SciTech Connect

    Walters, W.F.; Wareing, T.A.

    1994-08-01

    The Nonlinear Characteristic (NC) scheme for solving the discrete-ordinates form of the transport equation has recently been introduced and used to analyze one-dimensional slab transport problems. The purpose of this paper is to determine the accuracy and positivity of the NC scheme as extended to solve two-dimensional X-Y problems. We compare the results obtained using the NC scheme to those obtained using the Bilinear Discontinuous (BLD) scheme, the Bilinear Nodal (BLN) scheme, Linear Characteristic scheme, and the Diamond Difference with Fixup (DD/F) scheme. As was found in one-dimensional applications, the NC scheme is strictly positive and as accurate or more accurate than the other schemes for all meshes examined. The accuracy of the NC scheme for coarse meshes is particularity outstanding compared to that of the other schemes.

  11. Steady-state Analysis Model for Advanced Fuelcycle Schemes

    Energy Science and Technology Software Center (ESTSC)

    2006-05-12

    The model was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003—2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down the cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high—level waste along time are included in the model and can be displayed. The user can modify easily the values of mass flows and/or cost parameters and see the corresponding changes in the results. The model calculates: front—end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs. It performs Monte Carlo simulations with changing the values of all unit costs within their respective ranges (from lower to upper bounds).« less

  12. Steady-State Analysis Model for Advanced Fuel Cycle Schemes.

    Energy Science and Technology Software Center (ESTSC)

    2008-03-17

    Version 00 SMAFS was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003-2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high-level waste along time are included in the model and can be displayed. The user can easily modify values of mass flows and/or cost parameters and see corresponding changes in the results. The model calculates: front-end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs.« less

  13. A Trade-off Traitor Tracing Scheme

    NASA Astrophysics Data System (ADS)

    Ohtake, Go; Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of dynamic traitor tracing. Their framework requires dynamic computation transactions according to the real-time responses of the pirate, and it presumes real-time observation of content redistribution. Therefore, it cannot be simply utilized in an application where such an assumption is not valid. In this paper, we propose a new scheme that provides the advantages of dynamic traitor tracing schemes and also overcomes their problems.

  14. Low overhead slipless carrier phase estimation scheme.

    PubMed

    Cheng, Haiquan; Li, Yan; Kong, Deming; Zang, Jizhao; Wu, Jian; Lin, Jintong

    2014-08-25

    Two slipless schemes are compared with application to single carrier 30 Gbaud quadrature phase shift keying (QPSK) system. An equivalent linewidth model considering the phase noise induced by both the laser linewidth and fiber nonlinearity is applied in the performance analysis. The simulation results show that it is possible to mitigate cycle slip (CS) using only 0.39% pilot overhead for the proposed blind carrier phase recovery (CPR) + pilot-symbols-aided phase unwrapping (PAPU) scheme within 1 dB signal-to-noise ratio (SNR) penalty limit at the bit error ratio (BER) of 10(-3) with 4 MHz equivalent linewidth. PMID:25321277

  15. A COMPLETE SCHEME FOR A MUON COLLIDER.

    SciTech Connect

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  16. Security problem on arbitrated quantum signature schemes

    SciTech Connect

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. Security problem on arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  18. An Improved Bulk Microphysical Scheme for Studying Precipitation Processes: Comparisons with Other Schemes

    NASA Technical Reports Server (NTRS)

    Tao, W. K.; Shi, J. J.; Lang, S.; Chen, S.; Hong, S-Y.; Peters-Lidard, C.

    2007-01-01

    Cloud microphysical processes play an important role in non-hydrostatic high-resolution simulations. Over the past decade both research and operational numerical weather prediction models have started using more complex cloud microphysical schemes that were originally developed for high-resolution cloud-resolving models. An improved bulk microphysical parameterization (adopted from the Goddard microphysics schemes) has recently implemented into the Weather Research and Forecasting (WRF) model. This bulk microphysical scheme has three different options --- 2ICE (cloud ice & snow), 3ICE-graupel (cloud ice, snow & graupel) and 3ICE-hail (cloud ice, snow & hail). High-resolution model simulations are conducted to examine the impact of microphysical schemes on two different weather events (a midlatitude linear convective system and an Atlantic hurricane). In addition, this bulk microphysical parameterization is compared with WIRF's three other bulk microphysical schemes.

  19. Seasonal activity and morphological changes in martian gullies

    USGS Publications Warehouse

    Dundas, Colin M.; Diniega, Serina; Hansen, Candice J.; Byrne, Shane; McEwen, Alfred S.

    2012-01-01

    Recent studies of martian dune and non-dune gullies have suggested a seasonal control on present-day gully activity. The timing of current gully activity, especially activity involving the formation or modification of channels (which commonly have been taken as evidence of fluvial processes), has important implications regarding likely gully formation processes and necessary environmental conditions. In this study, we describe the results of frequent meter-scale monitoring of several active gully sites by the High Resolution Imaging Science Experiment (HiRISE) on the Mars Reconnaissance Orbiter (MRO). The aim is to better assess the scope and nature of current morphological changes and to provide improved constraints on timing of gully activity on both dune and non-dune slopes. Our observations indicate that (1) gully formation on Mars is ongoing today and (2) the most significant morphological changes are strongly associated with seasonal frost and defrosting activity. Observed changes include formation of all major components of typical gully landforms, although we have not observed alcove formation in coherent bedrock. These results reduce the need to invoke recent climate change or present-day groundwater seepage to explain the many martian gullies with pristine appearance.

  20. Student Loans Schemes in Mauritius: Experience, Analysis and Scenarios

    ERIC Educational Resources Information Center

    Mohadeb, Praveen

    2006-01-01

    This study makes a comprehensive review of the situation of student loans schemes in Mauritius, and makes recommendations, based on best practices, for setting up a national scheme that attempts to avoid weaknesses identified in some of the loans schemes of other countries. It suggests that such a scheme would be cost-effective and beneficial both…

  1. Numerical viscosity and the entropy condition for conservative difference schemes

    NASA Technical Reports Server (NTRS)

    Tadmor, E.

    1983-01-01

    Consider a scalar, nonlinear conservative difference scheme satisfying the entropy condition. It is shown that difference schemes containing more numerical viscosity will necessarily converge to the unique, physically relevant weak solution of the approximated conservation equation. In particular, entropy satisfying convergence follows for E schemes - those containing more numerical viscosity than Godunov's scheme.

  2. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  3. A classification scheme for LWR fuel assemblies

    SciTech Connect

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  4. Creating Culturally Sustainable Agri-Environmental Schemes

    ERIC Educational Resources Information Center

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming cultures as…

  5. Configuration-Control Scheme Copes With Singularities

    NASA Technical Reports Server (NTRS)

    Seraji, Homayoun; Colbaugh, Richard D.

    1993-01-01

    Improved configuration-control scheme for robotic manipulator having redundant degrees of freedom suppresses large joint velocities near singularities, at expense of small trajectory errors. Provides means to enforce order of priority of tasks assigned to robot. Basic concept of configuration control of redundant robot described in "Increasing The Dexterity Of Redundant Robots" (NPO-17801).

  6. How Can Conceptual Schemes Change Teaching?

    ERIC Educational Resources Information Center

    Wickman, Per-Olof

    2012-01-01

    Lundqvist, Almqvist and Ostman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the "epistemological moves",…

  7. Unstaggered Central Schemes for Hyperbolic Systems

    NASA Astrophysics Data System (ADS)

    Touma, R.

    2009-09-01

    We develop an unstaggered central scheme for approximating the solution of general two-dimensional hyperbolic systems. In particular, we are interested in solving applied problems arising in hydrodynamics and astrophysics. In contrast with standard central schemes that evolve the numerical solution on two staggered grids at consecutive time steps, the method we propose evolves the numerical solution on a single grid, and avoids the resolution of the Riemann problems arising at the cell interfaces, thanks to a layer of ghost cells implicitly used. The numerical base scheme is used to solve shallow water equation problems and ideal magnetohydrodynamic problems. To satisfy the divergence-free constraint of the magnetic field in the numerical solution of ideal magnetohydrodynamic problems, we adapt Evans and Hawley's the constrained transport method to our unstaggered base scheme, and apply it to correct the magnetic field components at the end of each time step. The obtained results are in good agreement with corresponding ones appearing in the recent literature, thus confirming the efficiency and the potential of the proposed method.

  8. Sex-roles in Reading Schemes

    ERIC Educational Resources Information Center

    Lobban, Glenys

    1974-01-01

    Author contended that no broad-ranging study of the way sex-roles are presented in British reading schemes exists. In this article he described a preliminary study on sex-role content in readers in order to remedy this lack of information. (Author/RK)

  9. HeLIN Pilot Mentoring Scheme.

    ERIC Educational Resources Information Center

    Brice, Anne; Brown, Cathryn; Hickman, Marie; Thorburn, Lis

    2002-01-01

    Describes a pilot mentoring program at the Health Libraries and Information Network (HeLIN) at the University of Oxford that was designed to increase understanding of mentoring for continuing professional and personal development; to investigate existing mentoring schemes; to incorporate a program for accreditation of mentors; and to evaluate the…

  10. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  11. A conservative box-scheme for the Euler equations

    NASA Astrophysics Data System (ADS)

    Chattot, Jean-Jacques

    1999-09-01

    The work presented in this paper shows that the mixed-type scheme of Murman and Cole, originally developed for a scalar equation, can be extended to systems of conservation laws. A characteristic scheme for the equations of gas dynamics is introduced that has a close connection to a four operator scheme for the Burgers-Hopf equation. The results indicate that the scheme performs well on the classical test cases. The scheme has no tuning parameters and can be interpreted as the projection of an L-stable scheme. At steady state second order accuracy is obtained as a by-product of the box-scheme feature. Copyright

  12. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services. PMID:26349803

  13. A Target Coverage Scheduling Scheme Based on Genetic Algorithms in Directional Sensor Networks

    PubMed Central

    Gil, Joon-Min; Han, Youn-Hee

    2011-01-01

    As a promising tool for monitoring the physical world, directional sensor networks (DSNs) consisting of a large number of directional sensors are attracting increasing attention. As directional sensors in DSNs have limited battery power and restricted angles of sensing range, maximizing the network lifetime while monitoring all the targets in a given area remains a challenge. A major technique to conserve the energy of directional sensors is to use a node wake-up scheduling protocol by which some sensors remain active to provide sensing services, while the others are inactive to conserve their energy. In this paper, we first address a Maximum Set Covers for DSNs (MSCD) problem, which is known to be NP-complete, and present a greedy algorithm-based target coverage scheduling scheme that can solve this problem by heuristics. This scheme is used as a baseline for comparison. We then propose a target coverage scheduling scheme based on a genetic algorithm that can find the optimal cover sets to extend the network lifetime while monitoring all targets by the evolutionary global search technique. To verify and evaluate these schemes, we conducted simulations and showed that the schemes can contribute to extending the network lifetime. Simulation results indicated that the genetic algorithm-based scheduling scheme had better performance than the greedy algorithm-based scheme in terms of maximizing network lifetime. PMID:22319387

  14. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  15. Strong authentication scheme for telecare medicine information systems.

    PubMed

    Pu, Qiong; Wang, Jian; Zhao, Rongyong

    2012-08-01

    The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. In this paper, we propose a generic construction of smart-card-based password authentication protocol and prove its security. The proposed framework is superior to previous schemes in three following aspects : (1) our scheme is a true two-factor authentication scheme. (2) our scheme can yield a forward secure two-factor authentication scheme with user anonymity when appropriately instantiated. (3) our scheme utilizes each user's unique identity to accomplish the user authentication and does not need to store or verify others's certificates. And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system. PMID:21594637

  16. Implicit and semi-implicit schemes: Algorithms

    NASA Astrophysics Data System (ADS)

    Keppens, R.; Tóth, G.; Botchev, M. A.; van der Ploeg, A.

    1999-06-01

    This study formulates general guidelines to extend an explicit code with a great variety of implicit and semi-implicit time integration schemes. The discussion is based on their specific implementation in the Versatile Advection Code, which is a general purpose software package for solving systems of non-linear hyperbolic (and/or parabolic) partial differential equations, using standard high resolution shock capturing schemes. For all combinations of explicit high resolution schemes with implicit and semi-implicit treatments, it is shown how second-order spatial and temporal accuracy for the smooth part of the solutions can be maintained. Strategies to obtain steady state and time accurate solutions implicitly are discussed. The implicit and semi-implicit schemes require the solution of large linear systems containing the Jacobian matrix. The Jacobian matrix itself is calculated numerically to ensure the generality of this implementation. Three options are discussed in terms of applicability, storage requirements and computational efficiency. One option is the easily implemented matrix-free approach, but the Jacobian matrix can also be calculated by using a general grid masking algorithm, or by an efficient implementation for a specific Lax-Friedrich-type total variation diminishing (TVD) spatial discretization. The choice of the linear solver depends on the dimensionality of the problem. In one dimension, a direct block tridiagonal solver can be applied, while in more than one spatial dimension, a conjugate gradient (CG)-type iterative solver is used. For advection-dominated problems, preconditioning is needed to accelerate the convergence of the iterative schemes. The modified block incomplete LU-preconditioner is implemented, which performs very well. Examples from two-dimensional hydrodynamic and magnetohydrodynamic computations are given. They model transonic stellar outflow and recover the complex magnetohydrodynamic bow shock flow in the switch-on regime

  17. Electricity storage using a thermal storage scheme

    SciTech Connect

    White, Alexander

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  18. Electricity storage using a thermal storage scheme

    NASA Astrophysics Data System (ADS)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  19. Simple Numerical Schemes for the Korteweg-deVries Equation

    SciTech Connect

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  20. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  1. Finite difference schemes for long-time integration

    NASA Technical Reports Server (NTRS)

    Haras, Zigo; Taasan, Shlomo

    1993-01-01

    Finite difference schemes for the evaluation of first and second derivatives are presented. These second order compact schemes were designed for long-time integration of evolution equations by solving a quadratic constrained minimization problem. The quadratic cost function measures the global truncation error while taking into account the initial data. The resulting schemes are applicable for integration times fourfold, or more, longer than similar previously studied schemes. A similar approach was used to obtain improved integration schemes.

  2. A New Multisignature Scheme Using Re-Encryption Technique

    NASA Astrophysics Data System (ADS)

    Aboud, Sattar J.; Al-Fayoumi, Mohammed A.

    Anew multisignature scheme using re-encryption technique based on the RSA algorithm is suggested what enhance version of Okamoto scheme. The suggested scheme results bit expansion in block length of the multisignature, but the bit size of the expansion is not larger than the number of signers irrespective of their modulus. In addition, the new scheme has no limitations in signing order and in fact is more efficient than the Okamoto scheme.

  3. Arbitrated quantum signature scheme based on reusable key

    NASA Astrophysics Data System (ADS)

    Yu, ChaoHua; Guo, GongDe; Lin, Song

    2014-11-01

    An arbitrated quantum signature scheme without using entangled states is proposed. In the scheme, by employing a classical hash function and random numbers, the secret keys of signer and receiver can be reused. It is shown that the proposed scheme is secure against several well-known attacks. Specifically, it can stand against the receiver's disavowal attack. Moreover, compared with previous relevant arbitrated quantum signature schemes, the scheme proposed has the advantage of less transmission complexity.

  4. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID

  5. An active alignment scheme for the MPTS array. [contour sensors

    NASA Technical Reports Server (NTRS)

    Iwasaki, R.

    1980-01-01

    In order to achieve and maintain required flatness of the antenna array, a rotating laser beam used for leveling applications on earth was utilized as a reference system. A photoconductive sensor with a reflective collecting surface determines the displacement and polarity of any misalignment and automatically engages a stepping motor to drive a variable-length mechanism to make the necessary corrections. Once aligned, little power is dissipated since a nulling bridge circuit that centers on the beam is used. A three-point subarray alignment arrangement is described which independently adjusts, in the three orthogonal directions, the height and tilt of subarrays within the MPTS array and readily adapts to any physical distortions of the secondary structure (such as that resulting from severe temperature extremes caused by an eclipse of the Sun). It is shown that only one rotating laser system is required since optical blockage is minimal on the array surface and that it is possible to incorporate a number of redundant laser systems for reliability without affecting the overall performance.

  6. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  7. How might a statistical cloud scheme be coupled to a mass-flux convection scheme?

    SciTech Connect

    Klein, Stephen A.; Pincus, Robert; Hannay, Cecile; Xu, Kuan-man

    2004-09-27

    The coupling of statistical cloud schemes with mass-flux convection schemes is addressed. Source terms representing the impact of convection are derived within the framework of prognostic equations for the width and asymmetry of the probability distribution function of total water mixing ratio. The accuracy of these source terms is quantified by examining output from a cloud resolving model simulation of deep convection. Practical suggestions for inclusion of these source terms in large-scale models are offered.

  8. Local discrimination scheme for some unitary operations

    NASA Astrophysics Data System (ADS)

    Cao, TianQing; Gao, Fei; Tian, GuoJing; Xie, ShuCui; Wen, QiaoYan

    2016-09-01

    It has been shown that for two different multipartite unitary operations U 1 and U 2, when tr( U 1 † U 2) = 0, they can always be perfectly distinguished by local operations and classical communication in the single-run scenario. However, how to find the detailed scheme to complete the local discrimination is still a fascinating problem. In this paper, aiming at some U 1 and U 2 acting on the bipartite and tripartite space respectively, especially for U 1 † U 2 locally unitary equivalent to the high dimensional X-type hermitian unitary matrix V with tr V = 0, we put forward the explicit local distinguishing schemes in the single-run scenario.

  9. Trefftz difference schemes on irregular stencils

    SciTech Connect

    Tsukerman, Igor

    2010-04-20

    The recently developed Flexible Local Approximation MEthod (FLAME) produces accurate difference schemes by replacing the usual Taylor expansion with Trefftz functions - local solutions of the underlying differential equation. This paper advances and casts in a general form a significant modification of FLAME proposed recently by Pinheiro and Webb: a least-squares fit instead of the exact match of the approximate solution at the stencil nodes. As a consequence of that, FLAME schemes can now be generated on irregular stencils with the number of nodes substantially greater than the number of approximating functions. The accuracy of the method is preserved but its robustness is improved. For demonstration, the paper presents a number of numerical examples in 2D and 3D: electrostatic (magnetostatic) particle interactions, scattering of electromagnetic (acoustic) waves, and wave propagation in a photonic crystal. The examples explore the role of the grid and stencil size, of the number of approximating functions, and of the irregularity of the stencils.

  10. An improved WENO-Z scheme

    NASA Astrophysics Data System (ADS)

    Acker, F.; B. de R. Borges, R.; Costa, B.

    2016-05-01

    In this article, we show that for a WENO scheme to improve the numerical resolution of smooth waves, increasing to some extent the contribution of the substencils where the solution is less smooth is much more important than improving the accuracy at critical points. WENO-Z, for instance, achieved less dissipative results than classical WENO through the use of a high-order global smoothness measurement, τ, which increased the weights of less-smooth substencils. This time, we present a way of further increasing the relevance of less-smooth substencils by adding a new term to the WENO-Z weights that uses information which is already available in its formula. The improved scheme attains much better resolution at the smooth parts of the solution, while keeping the same numerical stability of the original WENO-Z at shocks and discontinuities.

  11. A differential spin current detection scheme

    NASA Astrophysics Data System (ADS)

    Hemingway, Bryan; Appelbaum, Ian

    2014-03-01

    We offer an alternative scheme to detect spin polarization of conduction electrons injected into a nonmagnetic metal or degeneratively doped semiconductor using transport to two oppositely polarized ferromagnetic metal contacts. We show that, as in the well-known spin injection problem, detection efficiency can be amplified by the addition of spin-selective tunneling barriers. Considering the appropriate geometry and achievable injection rates, we estimate that the differential current can be as high as 1-10?nA for reasonable design parameters. We will also discuss the realization of this detection scheme in laboratory set-ups. ONR No. N000141110637, NSF Nos. ECCS0901941 and ECCS1231855, and DTRA No. HDTRA1-13-1-0013.

  12. The Linear Bicharacteristic Scheme for Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.

    2001-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to model lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media and for perfect electrical conductors. Heterogeneous media are modeled through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  13. A universal scheme for indirect quantum control

    NASA Astrophysics Data System (ADS)

    Layden, David; Martin-Martinez, Eduardo; Kempf, Achim

    The goal of indirect quantum control is to coherently steer a quantum system solely by acting on a quantum actuator to which it is coupled. This approach to quantum control is convenient in many physical settings, as it allows one to avoid direct addressing of the system--and any associated difficulties--altogether. While it is known in principle that control of the actuator typically yields universal control of the system, the practical details of how such indirect control can be achieved are less clear. This deficiency has led to a number of implementation- and model-specific indirect control schemes, in lieu of a general recipe applicable to any physical setting. Here, we present such a recipe, in the form of an open-loop control scheme which implements arbitrary unitary operations on the system by exploiting open dynamics in the actuator. arXiv:1506.06749.

  14. Multidimensional numerical scheme for resistive relativistic magnetohydrodynamics

    NASA Astrophysics Data System (ADS)

    Komissarov, Serguei S.

    2007-12-01

    The paper describes a new upwind conservative numerical scheme for special relativistic resistive magnetohydrodynamics with scalar resistivity. The magnetic field is kept approximately divergence free and the divergence of the electric field is kept consistent with the electric charge distribution via the method of Generalized Lagrange Multiplier. The hyperbolic fluxes are computed using the Harten-Lax-van Leer (HLL) prescription and the source terms are accounted via the time-splitting technique. The results of test simulations show that the scheme can handle equally well both resistive current sheets and shock waves, and thus can be a useful tool for studying phenomena of relativistic astrophysics that involve both colliding supersonic flows and magnetic reconnection.

  15. Improving the accuracy of central difference schemes

    NASA Technical Reports Server (NTRS)

    Turkel, Eli

    1988-01-01

    General difference approximations to the fluid dynamic equations require an artificial viscosity in order to converge to a steady state. This artificial viscosity serves two purposes. One is to suppress high frequency noise which is not damped by the central differences. The second purpose is to introduce an entropy-like condition so that shocks can be captured. These viscosities need a coefficient to measure the amount of viscosity to be added. In the standard scheme, a scalar coefficient is used based on the spectral radius of the Jacobian of the convective flux. However, this can add too much viscosity to the slower waves. Hence, it is suggested that a matrix viscosity be used. This gives an appropriate viscosity for each wave component. With this matrix valued coefficient, the central difference scheme becomes closer to upwind biased methods.

  16. Iterated upwind schemes for gas dynamics

    SciTech Connect

    Smolarkiewicz, Piotr K. Szmelter, Joanna

    2009-01-10

    A class of high-resolution schemes established in integration of anelastic equations is extended to fully compressible flows, and documented for unsteady (and steady) problems through a span of Mach numbers from zero to supersonic. The schemes stem from iterated upwind technology of the multidimensional positive definite advection transport algorithm (MPDATA). The derived algorithms employ standard and modified forms of the equations of gas dynamics for conservation of mass, momentum and either total or internal energy as well as potential temperature. Numerical examples from elementary wave propagation, through computational aerodynamics benchmarks, to atmospheric small- and large-amplitude acoustics with intricate wave-flow interactions verify the approach for both structured and unstructured meshes, and demonstrate its flexibility and robustness.

  17. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  18. A multivariable control scheme for robot manipulators

    NASA Technical Reports Server (NTRS)

    Tarokh, M.; Seraji, H.

    1991-01-01

    The article puts forward a simple scheme for multivariable control of robot manipulators to achieve trajectory tracking. The scheme is composed of an inner loop stabilizing controller and an outer loop tracking controller. The inner loop utilizes a multivariable PD controller to stabilize the robot by placing the poles of the linearized robot model at some desired locations. The outer loop employs a multivariable PID controller to achieve input-output decoupling and trajectory tracking. The gains of the PD and PID controllers are related directly to the linearized robot model by simple closed-form expressions. The controller gains are updated on-line to cope with variations in the robot model during gross motion and for payload change. Alternatively, the use of high gain controllers for gross motion and payload change is discussed. Computer simulation results are given for illustration.

  19. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  20. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  1. Automatic-repeat-request error control schemes

    NASA Technical Reports Server (NTRS)

    Lin, S.; Costello, D. J., Jr.; Miller, M. J.

    1983-01-01

    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed.

  2. The Emergent Universe scheme and tunneling

    SciTech Connect

    Labraña, Pedro

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  3. Classification schemes for dental school libraries.

    PubMed

    McMaugh, D R

    1979-12-01

    The provision of an efficient and acceptable library system for the dental literature is examined. It is suggested that an index to the dental literature is best provided by a combination of Index Medicus and Medical Subject Headings. The Library of Congress scheme would be best for an autonomous dental school and, where a dental school library is provided by a large medical library, the National Library of Medicine Classification would be suitable for dental student use. PMID:395935

  4. Evolutionary Algorithm for Optimal Vaccination Scheme

    NASA Astrophysics Data System (ADS)

    Parousis-Orthodoxou, K. J.; Vlachos, D. S.

    2014-03-01

    The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease.

  5. Development of new flux splitting schemes

    NASA Technical Reports Server (NTRS)

    Liou, MENG-S.; Steffen, Christopher J., Jr.

    1991-01-01

    Maximizing both accuracy and efficiency has been the primary objective in designing a numerical algorithm for CFD. This is especially important for solution of complex three-dimensional systems of Navier-Stokes equations which often include turbulence modeling and chemistry effects. Recently, upwind schemes have been well received for both their capability of resolving discontinuities and their sound theoretical basis in characteristic theory for hyperbolic systems. With this in mind, two new flux splitting techniques are presented for upwind differencing.

  6. Cryptanalysis of Quantum Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zuo, Huijuan

    2013-01-01

    In this paper, we study the cryptanalysis of two quantum blind signature schemes and one quantum proxy blind signature protocol. We show that in these protocols the verifier can forge the signature under known message attack. The attack strategies are described in detail respectively. This kind of problem deserves more research attention in the following related study. We further point out that the arbitrator should be involved in the procedure of any dispute and some discussions of these protocols are given.

  7. Novel transmit protection scheme for ultrasound systems.

    PubMed

    Fuller, Michael I; Blalock, Travis N; Hossack, John A; Walker, William F

    2007-01-01

    The problem of protecting or isolating extremely sensitive receive circuitry from high-voltage transmit circuitry is commonly addressed through the use of diode bridges, transformers, or high-voltage switches, which prove to be prohibitively expensive, bulky, and power consuming for use in portable, low-cost, battery-powered systems. These approaches also compound the interconnect difficulties associated with two-dimensional (2-D) transducer arrays. In this paper we present a novel transmit protection scheme that allows compact MOSFET shunting devices to be brought on-chip within each receive channel implemented in a standard CMOS integrated circuit process. During transmit, the high voltage transmit pulse is driven onto the common connection of the transducer array and the on-chip MOSFET devices shunt the current to ground. During receive, these devices are turned off, the common connection of the transducer array is shunted to ground, and the received echo can be detected as usual. The transmit protection scheme was experimentally shown to shunt a 16 mA peak current resulting from the equivalent of a 100-V, 25-ns-risetime transmit pulse through a 4 pF transducer element. The scheme was also incorporated into a prototype 1024-channel, low-cost, ultrasound system successfully used to form pulse echo images. PMID:17225802

  8. Thermal analysis finds optimum FCCU revamp scheme

    SciTech Connect

    Aguilar-Rodriquez, E.; Ortiz-Estrada, C.; Aguilera-Lopez, M. )

    1994-11-07

    The 25,000 b/d fluid catalytic cracking unit (FCCU) at Petroleos Mexicanos' idle Azcapotzalco refinery near Mexico City has been relocated to Pemex's 235,000 b/d Cadereyta refinery. The results of a thermal-integration analysis are being used to revamp the unit and optimize its vapor-recovery scheme. For the case of the Azcapotzalco FCCU, the old unit was designed in the 1950s, so modifications to the reactor/regenerator section incorporate many important changes, including a new riser, feed nozzles, cyclones, air distributor, and other internals. For the new scheme, the analysis was based on the following restrictions: (1) Two cases concerning gas oil feed conditions must be met. In the hot-feed case, feed is introduced from a processing unit outside battery limits (OSBL) at 188 C. For the cold-feed case, feed is introduced from OSBL from storage tanks at 70 C. (2) No new fire heaters are to be installed. (3) Existing equipment must be reused whenever possible. The paper describes and analyzes three alternative schemes.

  9. Cooperative medical schemes in contemporary rural China.

    PubMed

    Feng, X; Tang, S; Bloom, G; Segall, M; Gu, Y

    1995-10-01

    Improvements in rural health care in China in the 1950s, 1960s and 1970s were largely due to the development of cooperative medical schemes (CMSs) and the establishment of a three-tier rural health network. Since the economic reforms were instituted in the late 1970s, the financing and delivery of rural health services have seen many changes, some positive, others not. Most CMSs have collapsed. In the absence of CMSs, the rural population has to pay for health care out-of-pocket and poor families have greater difficulty in getting access to essential health care. In the meantime, emphases of health services have tended to shift from lower to higher levels, from preventive to curative services, and from planning and management to market forces. This paper outlines the evolution of CMSs, reasons for their collapse, and their likely impact on rural health services. The main focus is on the development of a new generation of rural cooperative health care schemes, given their importance in the process of consolidating the rural three-tier health network after the impact of the economic reforms: the characteristics of some schemes, the apparent conditions for success, and government policy towards the development of cooperative health care financing are presented. PMID:8578334

  10. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  11. Activity.

    ERIC Educational Resources Information Center

    Clearing: Nature and Learning in the Pacific Northwest, 1984

    1984-01-01

    Presents three activities: (1) investigating succession in a schoolground; (2) investigating oak galls; and (3) making sun prints (photographs made without camera or darkroom). Each activity includes a list of materials needed and procedures used. (JN)

  12. Uncertainty of Microphysics Schemes in CRMs

    NASA Astrophysics Data System (ADS)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  13. A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal roll

    NASA Technical Reports Server (NTRS)

    2002-01-01

    A modified F/A-18 in a distinctive red, white and blue paint scheme was showcased during formal rollout ceremonies for the Active Aeroelastic Wing flight research program at NASA's Dryden Flight Research Center on March 27, 2002.

  14. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks. PMID:24061705

  15. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    NASA Astrophysics Data System (ADS)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  16. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  17. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  18. An evaluation of a vocational training scheme for dental therapists (TVT).

    PubMed

    Bullock, A D; Falcon, H C; Mehra, S; Stearns, K

    2010-09-25

    Commissioned by NHS Education South Central (NESC) Postgraduate Dental Deanery, this work provided an external, independent formative evaluation of the Dental Therapists Vocational Training (TVT) scheme in its first year of operation. Undertaken between March-September 2009, the evaluation engaged with all those involved in the TVT scheme: the newly qualified dental therapists (n = 9; group discussion and questionnaire; portfolio extracts) and interviews with their trainers (n = 9), Associate Postgraduate Dental Dean and TVT Scheme Adviser. Most of those on the scheme did not feel well prepared for work at the point of initial qualification and benefitted from enhancement of confidence and skills. Although the number of treatments undertaken by each of the trainees varied considerably, there was commonality in terms of treatment types. Benefits for trainers included the opportunity to work with a dental therapist and develop a better understanding of their role. They praised the trainees' skills with nervous patients and children and their preventative work. A therapist on the team released the dentist for more complex treatments. Challenges related to the recruitment of trainees and trainers, the relative lack of knowledge about the work of dental therapists, concerns about maintaining the range of therapy skills and issues about UDA (unit of dental activity) distribution. There was widespread support for a mandatory TVT scheme. This scheme could be improved by providing further guidance on the amount and type of clinical experience required. PMID:20871556

  19. Minimal dissipation hybrid bicompact schemes for hyperbolic equations

    NASA Astrophysics Data System (ADS)

    Bragin, M. D.; Rogov, B. V.

    2016-06-01

    New monotonicity-preserving hybrid schemes are proposed for multidimensional hyperbolic equations. They are convex combinations of high-order accurate central bicompact schemes and upwind schemes of first-order accuracy in time and space. The weighting coefficients in these combinations depend on the local difference between the solutions produced by the high- and low-order accurate schemes at the current space-time point. The bicompact schemes are third-order accurate in time, while having the fourth order of accuracy and the first difference order in space. At every time level, they can be solved by marching in each spatial variable without using spatial splitting. The upwind schemes have minimal dissipation among all monotone schemes constructed on a minimum space-time stencil. The hybrid schemes constructed has been successfully tested as applied to a number of two-dimensional gas dynamics benchmark problems.

  20. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Vanleer, B.

    1983-01-01

    First and second order explicit difference schemes are derived for a three dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind (backward) biased and optimally stable.

  1. Multidimensional explicit difference schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Van Leer, B.

    1984-01-01

    First- and second-order explicit difference schemes are derived for a three-dimensional hyperbolic system of conservation laws, without recourse to dimensional factorization. All schemes are upwind biased and optimally stable.

  2. Scheme and Schema in Children's Memory of Their Own Drawings

    ERIC Educational Resources Information Center

    Stacey, John T.; Ross, Bruce M.

    1975-01-01

    Investigated Piaget's distinction between the roles of scheme and schema in memory. Proposed that schemas may vary within wide limits while the underlying schemes from which the schemas stem remain stable. Subjects were 78, 6-year-old children. (SDH)

  3. Parallelization of implicit finite difference schemes in computational fluid dynamics

    NASA Technical Reports Server (NTRS)

    Decker, Naomi H.; Naik, Vijay K.; Nicoules, Michel

    1990-01-01

    Implicit finite difference schemes are often the preferred numerical schemes in computational fluid dynamics, requiring less stringent stability bounds than the explicit schemes. Each iteration in an implicit scheme involves global data dependencies in the form of second and higher order recurrences. Efficient parallel implementations of such iterative methods are considerably more difficult and non-intuitive. The parallelization of the implicit schemes that are used for solving the Euler and the thin layer Navier-Stokes equations and that require inversions of large linear systems in the form of block tri-diagonal and/or block penta-diagonal matrices is discussed. Three-dimensional cases are emphasized and schemes that minimize the total execution time are presented. Partitioning and scheduling schemes for alleviating the effects of the global data dependencies are described. An analysis of the communication and the computation aspects of these methods is presented. The effect of the boundary conditions on the parallel schemes is also discussed.

  4. The Pharmaceutical Benefits Scheme 2003-2004.

    PubMed

    Harvey, Ken J

    2005-01-12

    The Pharmaceutical Benefits Scheme (PBS) grew by 8% in 2003-04; a slower rate than the 12.0% pa average growth over the last decade. Nevertheless, the sustainability of the Scheme remained an ongoing concern given an aging population and the continued introduction of useful (but increasingly expensive) new medicines. There was also concern that the Australia-United States Free Trade Agreement could place further pressure on the Scheme. In 2003, as in 2002, the government proposed a 27% increase in PBS patient co-payments and safety-net thresholds in order to transfer more of the cost of the PBS from the government to consumers. While this measure was initially blocked by the Senate, the forthcoming election resulted in the Labor Party eventually supporting this policy. Recommendations of the Pharmaceutical Benefits Advisory Committee to list, not list or defer a decision to list a medicine on the PBS were made publicly available for the first time and the full cost of PBS medicines appeared on medicine labels if the price was greater than the co-payment. Pharmaceutical reform in Victorian public hospitals designed to minimise PBS cost-shifting was evaluated and extended to other States and Territories. Programs promoting the quality use of medicines were further developed coordinated by the National Prescribing Service, Australian Divisions of General Practice and the Pharmacy Guild of Australia. The extensive uptake of computerised prescribing software by GPs produced benefits but also problems. The latter included pharmaceutical promotion occurring at the time of prescribing, failure to incorporate key sources of objective therapeutic information in the software and gross variation in the ability of various programs to detect important drug-drug interactions. These issues remain to be tackled. PMID:15679896

  5. A new optical scheme for teleportation of entangled coherent state

    NASA Astrophysics Data System (ADS)

    Liao, Jie-Qiao; Kuang, Le-Man

    2006-10-01

    We propose a nearly perfect optical scheme for the quantum teleportation of entangled coherent states using optical devices such as nonlinear Kerr media, beam splitters, phase shifters, and photon detectors. Different from those previous schemes, our scheme needs only ``yes'' or `no' measurements of the photon number of the related modes, i.e. nonzero- and zero-photon measurements, while in previous schemes one has to exactly identify the even or odd parity character of the photon numbers detected by detectors.

  6. Connection Between the Lattice Boltzmann Equation and the Beam Scheme

    NASA Technical Reports Server (NTRS)

    Xu, Kun; Luo, Li-Shi

    1999-01-01

    In this paper we analyze and compare the lattice Boltzmann equation with the beam scheme in details. We notice the similarity and differences between the lattice Boltzmann equation and the beam scheme. We show that the accuracy of the lattice Boltzmann equation is indeed second order in space. We discuss the advantages and limitations of lattice Boltzmann equation and the beam scheme. Based on our analysis, we propose an improved multi-dimensional beam scheme.

  7. Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme

    NASA Astrophysics Data System (ADS)

    Gotaishi, Masahito; Tadaki, Kohtaro; Fujita, Ryo; Tsujii, Shigeo

    A new signature scheme of MPKC is proposed. It is created by perturbing a traditional encryption scheme in two ways. The proposed perturbation polynomials successfully reinforce the Matsumoto-Imai cryptosystem This new signature scheme has a structure very difficult to cryptanalyze. Along with the security against algebraic attacks, its security against existing attacks is discussed. The experimental data imply that the scheme can create a both lightweight and secure signature system.

  8. Rabi resonances in the {lambda} excitation scheme

    SciTech Connect

    Godone, Aldo; Micalizio, Salvatore; Levi, Filippo

    2002-12-01

    We consider the interaction of a three-level system with phase-modulated resonant fields in the {lambda} excitation scheme. We treat theoretically the case of a sinusoidal phase modulation, a phase step perturbation, and a stochastic phase modulation. The appearance of a Rabi resonance both in the spectrum of the optical transmitted signal (electromagnetically induced transparency) and in the spectrum of the microwave emission (coherent population trapping maser) is considered in detail. All the theoretical results are compared with the analogous ones reported for the two-level system and with our experimental observations obtained for the case of rubidium in a buffer gas.

  9. A numerical scheme for ionizing shock waves

    SciTech Connect

    Aslan, Necdet . E-mail: naslan@yeditepe.edu.tr; Mond, Michael

    2005-12-10

    A two-dimensional (2D) visual computer code to solve the steady state (SS) or transient shock problems including partially ionizing plasma is presented. Since the flows considered are hypersonic and the resulting temperatures are high, the plasma is partially ionized. Hence the plasma constituents are electrons, ions and neutral atoms. It is assumed that all the above species are in thermal equilibrium, namely, that they all have the same temperature. The ionization degree is calculated from Saha equation as a function of electron density and pressure by means of a nonlinear Newton type root finding algorithms. The code utilizes a wave model and numerical fluctuation distribution (FD) scheme that runs on structured or unstructured triangular meshes. This scheme is based on evaluating the mesh averaged fluctuations arising from a number of waves and distributing them to the nodes of these meshes in an upwind manner. The physical properties (directions, strengths, etc.) of these wave patterns are obtained by a new wave model: ION-A developed from the eigen-system of the flux Jacobian matrices. Since the equation of state (EOS) which is used to close up the conservation laws includes electronic effects, it is a nonlinear function and it must be inverted by iterations to determine the ionization degree as a function of density and temperature. For the time advancement, the scheme utilizes a multi-stage Runge-Kutta (RK) algorithm with time steps carefully evaluated from the maximum possible propagation speed in the solution domain. The code runs interactively with the user and allows to create different meshes to use different initial and boundary conditions and to see changes of desired physical quantities in the form of color and vector graphics. The details of the visual properties of the code has been published before (see [N. Aslan, A visual fluctuation splitting scheme for magneto-hydrodynamics with a new sonic fix and Euler limit, J. Comput. Phys. 197 (2004) 1

  10. A differential spin current detection scheme

    NASA Astrophysics Data System (ADS)

    Hemingway, Bryan; Appelbaum, Ian

    2013-09-01

    We provide detailed calculations for modeling an alternative scheme to detect spin polarization of conduction electrons injected into a nonmagnetic metal or degeneratively doped semiconductor using transport to two oppositely polarized ferromagnetic metal contacts. We show that, as in the well-known spin injection problem, detection efficiency can be amplified by the addition of spin-selective tunneling barriers. Considering the appropriate geometry and achievable injection rates, we estimate that the differential current can be as high as 1-10 nA for reasonable design parameters.

  11. A Classification Scheme for Glaciological AVA Responses

    NASA Astrophysics Data System (ADS)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  12. Numerical Schemes for Rough Parabolic Equations

    SciTech Connect

    Deya, Aurelien

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  13. Recent developments in shock-capturing schemes

    NASA Technical Reports Server (NTRS)

    Harten, Ami

    1991-01-01

    The development of the shock capturing methodology is reviewed, paying special attention to the increasing nonlinearity in its design and its relation to interpolation. It is well-known that higher-order approximations to a discontinuous function generate spurious oscillations near the discontinuity (Gibbs phenomenon). Unlike standard finite-difference methods which use a fixed stencil, modern shock capturing schemes use an adaptive stencil which is selected according to the local smoothness of the solution. Near discontinuities this technique automatically switches to one-sided approximations, thus avoiding the use of discontinuous data which brings about spurious oscillations.

  14. Level-scheme investigation of 33S

    NASA Astrophysics Data System (ADS)

    Gavrilov, G. Tz; Goutev, N.; Dimitrov, B. I.; Tonev, D.; Petkov, P.; de Angelis, G.; Recchia, F.; Farnea, E.; Ur, C. A.; Aydin, S.; Bizzeti, P. G.; Bizzeti-Sona, A. M.; Deloncle, I.; Gottardo, A.; Laftchiev, H.; Lunardi, S.; Mengoni, D.; Michelangoli, C.; Napoli, D. R.; Orlandi, R.; Sahin, E.; Stefanova, E. A.; Valente-Dobon, J. J.; Marinov, Tz K.; Yavahchova, M. S.

    2014-09-01

    An angular correlation experiment was carried out for 33 S at Laboratori Nazionali di Legnaro with the gamma-ray detector array GASP. The reaction used was 24Mg(14N,α p)33S at a beam energy of 40MeV. An analysis of DCO ratios and triple gamma coincidences was performed. So far, a new level depopulated by 3 γ -ray transitions has been found and its spin was determined. The work for further extension of the level scheme is in progress.

  15. Investigation of a monochromator scheme for SPEAR

    SciTech Connect

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended.

  16. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  17. Cosmological SUSY Breaking and the Pyramid Scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom

    2014-12-01

    I review the ideas of holographic space-time (HST), Cosmological SUSY breaking (CSB), and the Pyramid Schemes, which are the only known models of Tera-scale physics consistent with CSB, current particle data, and gauge coupling unification. There is considerable uncertainty in the estimate of the masses of supersymmetric partners of the standard model particles, but the model predicts that the gluino is probably out of reach of the LHC, squarks may be in reach, and the NLSP is a right handed slepton, which should be discovered soon.

  18. Cosmological SUSY breaking and the pyramid scheme

    NASA Astrophysics Data System (ADS)

    Banks, Tom

    2015-04-01

    I review the ideas of holographic spacetime (HST), cosmological SUSY breaking (CSB), and the Pyramid Schemes, which are the only known models of Tera-scale physics consistent with CSB, current particle data, and gauge coupling unification. There is considerable uncertainty in the estimate of the masses of supersymmetric partners of the Standard Model particles, but the model predicts that the gluino is probably out of reach of the LHC, squarks may be in reach, and the NLSP is a right-handed slepton, which should be discovered soon.

  19. A new lossless digital image encryption scheme

    NASA Astrophysics Data System (ADS)

    Pareek, Narendra K.; Patidar, Vinod; Sud, Krishan K.

    2011-12-01

    We propose a new lossless digital image encryption scheme based on the permutation and substitution architecture. Initially, original image is divided into squared sub-images and then three layers of pixels corresponding to additive primary colours (RGB) of each sub-image are separated. Each layer of pixels of squared sub-images are scrambled by three different ways in the permutation process whereas a simple arithmetic, mainly sorting and differencing, is performed on each layer of pixels to achieve the substitution. The results of several experiments show that the proposed image cipher provides an efficient way for image encryption with high decryption rate.

  20. Vehicle scheduling schemes for commercial and emergency logistics integration.

    PubMed

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models. PMID:24391724

  1. Vehicle Scheduling Schemes for Commercial and Emergency Logistics Integration

    PubMed Central

    Li, Xiaohui; Tan, Qingmei

    2013-01-01

    In modern logistics operations, large-scale logistics companies, besides active participation in profit-seeking commercial business, also play an essential role during an emergency relief process by dispatching urgently-required materials to disaster-affected areas. Therefore, an issue has been widely addressed by logistics practitioners and caught researchers' more attention as to how the logistics companies achieve maximum commercial profit on condition that emergency tasks are effectively and performed satisfactorily. In this paper, two vehicle scheduling models are proposed to solve the problem. One is a prediction-related scheme, which predicts the amounts of disaster-relief materials and commercial business and then accepts the business that will generate maximum profits; the other is a priority-directed scheme, which, firstly groups commercial and emergency business according to priority grades and then schedules both types of business jointly and simultaneously by arriving at the maximum priority in total. Moreover, computer-based simulations are carried out to evaluate the performance of these two models by comparing them with two traditional disaster-relief tactics in China. The results testify the feasibility and effectiveness of the proposed models. PMID:24391724

  2. Highly accurate adaptive finite element schemes for nonlinear hyperbolic problems

    NASA Astrophysics Data System (ADS)

    Oden, J. T.

    1992-08-01

    This document is a final report of research activities supported under General Contract DAAL03-89-K-0120 between the Army Research Office and the University of Texas at Austin from July 1, 1989 through June 30, 1992. The project supported several Ph.D. students over the contract period, two of which are scheduled to complete dissertations during the 1992-93 academic year. Research results produced during the course of this effort led to 6 journal articles, 5 research reports, 4 conference papers and presentations, 1 book chapter, and two dissertations (nearing completion). It is felt that several significant advances were made during the course of this project that should have an impact on the field of numerical analysis of wave phenomena. These include the development of high-order, adaptive, hp-finite element methods for elastodynamic calculations and high-order schemes for linear and nonlinear hyperbolic systems. Also, a theory of multi-stage Taylor-Galerkin schemes was developed and implemented in the analysis of several wave propagation problems, and was configured within a general hp-adaptive strategy for these types of problems. Further details on research results and on areas requiring additional study are given in the Appendix.

  3. A new configurational bias scheme for sampling supramolecular structures

    NASA Astrophysics Data System (ADS)

    De Gernier, Robin; Curk, Tine; Dubacheva, Galina V.; Richter, Ralf P.; Mognetti, Bortolo M.

    2014-12-01

    We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such a plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular, we compute the density of states of adsorbed polymers as a function of the number of ligand-receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking.

  4. A new configurational bias scheme for sampling supramolecular structures

    SciTech Connect

    De Gernier, Robin; Mognetti, Bortolo M.; Curk, Tine; Dubacheva, Galina V.; Richter, Ralf P.

    2014-12-28

    We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such a plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular, we compute the density of states of adsorbed polymers as a function of the number of ligand–receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking.

  5. A new configurational bias scheme for sampling supramolecular structures.

    PubMed

    De Gernier, Robin; Curk, Tine; Dubacheva, Galina V; Richter, Ralf P; Mognetti, Bortolo M

    2014-12-28

    We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such a plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular, we compute the density of states of adsorbed polymers as a function of the number of ligand-receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking. PMID:25554182

  6. A Uniform Indexing Scheme for Object-Oriented Databases.

    ERIC Educational Resources Information Center

    Gudes, Ehud

    1997-01-01

    Performance is a critical factor hindering the use of object-oriented databases (OODB). This article proposes a new and uniform indexing scheme for enhancing OODBs with advantages for small range, clustered sets queries. Reviews several other indexing schemes; presents the U-index scheme; discusses its performance; and presents experimental…

  7. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  8. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  9. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  10. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  11. 30 CFR 75.900-2 - Approved circuit schemes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Approved circuit schemes. 75.900-2 Section 75... Alternating Current Circuits § 75.900-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuit required by § 75.900: (a) Ground check...

  12. A quantum identification scheme based on polarization modulation

    NASA Astrophysics Data System (ADS)

    He, Guang-Qiang; Zeng, Gui-Hua

    2005-03-01

    A quantum identification scheme including registration and identification phases is proposed. The users' passwords are transmitted by qubit string and recorded as a set of quantum operators. The security of the proposed scheme is guaranteed by the no-cloning theorem. Based on photon polarization modulation, an experimental approach is also designed to implement our proposed scheme.

  13. Taxonomic scheme for the identification of marine bacteria

    NASA Astrophysics Data System (ADS)

    Oliver, James D.

    1982-06-01

    A recently developed taxonomic scheme for the identification of marine bacteria is presented. The scheme is based on numerous reviews and monographs on marine bacteria, as well as Bergey's Manual of Determinative Bacteriology. While fairly extensive, the scheme is designed to identify marine bacteria using relatively few tests.

  14. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  15. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under...

  16. 30 CFR 75.800-2 - Approved circuit schemes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Approved circuit schemes. 75.800-2 Section 75... § 75.800-2 Approved circuit schemes. The following circuit schemes will be regarded as providing the necessary protection to the circuits required by § 75.800: (a) Ground check relays may be used...

  17. The hybrid Eulerian Lagrangian numerical scheme tested with Chemistry

    NASA Astrophysics Data System (ADS)

    Hansen, A. B.; Sørensen, B.; Tarning-Andersen, P.; Christensen, J. H.; Brandt, J.; Kaas, E.

    2012-11-01

    A newly developed advection scheme, the Hybrid Eulerian Lagrangian (HEL) scheme, has been tested, including a module for atmospheric chemistry, including 58 chemical species, and compared to two other traditional advection schemes; a classical pseudospectral Eulerian method the Accurate Space Derivative (ASD) scheme and the bi-cubic semi-Lagrangian (SL) scheme using classical rotation tests. The rotation tests have been designed to test and compare the advection schemes for different spatial and temporal resolutions in different chemical conditions (rural and urban) and for different shapes (cone and slotted cylinder) giving the advection schemes different challenges with respect to relatively slow or fast chemistry and smooth or sharp gradients, respectively. In every test, error measures have been calculated and used for ranking of the advection schemes with respect to performance, i.e. lowest overall errors for all chemical species. Furthermore, the HEL and SL schemes have been compared in a shallow water model, demonstrating the performance in a more realistic non-linear deformation flow. The results in this paper show that the new advection scheme, HEL, by far outperforms both the Eulerian and semi-Lagrangian schemes with very low error estimates compared to the two other schemes. Although no analytic solution can be obtained for the performance in the non-linear shallow water model flow, the tracer distribution appears realistic as compared to LMCSL when a mixing between local parcel concentrations is introduced in HEL.

  18. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat... determined appropriate by NRCS. (b) A scheme or device includes, but is not limited to, coercion,...

  19. 7 CFR 633.18 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  20. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the...

  1. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment...

  2. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part,...

  3. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to...

  4. 7 CFR 1410.60 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this...

  5. 7 CFR 795.17 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the...

  6. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to...

  7. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part,...

  8. Novel scheme of assist-light injection through waveguide coupling in a semiconductor optical amplifier for fast gain recovery

    NASA Astrophysics Data System (ADS)

    Nithin, V.; Kumar, Yogesh; Shenoy, M. R.

    2016-01-01

    We propose a novel scheme for injection of assist-light into the active region of a semiconductor optical amplifier (SOA) for fast gain recovery. In the proposed scheme, the assist-light is coupled into the active region of the SOA through an adjacent channel waveguide. Numerical results based on the well established model for carrier dynamics in SOA show that the gain recovery is faster in the proposed scheme as compared to the earlier reported scheme of counter-propagating assist-light injection. Our analysis shows that a desired power profile of the assist-light can be maintained in the active region of the SOA by tailoring the coupling through suitable design of the adjacent channel waveguide. The dependence of gain recovery on the input power of the assist-light in the proposed scheme has also been studied. Under typical operating conditions, it is found that 20 dBm of assist-light power injection in the proposed scheme is as effective as 27 dBm of assist-light power in the counter-propagating scheme.

  9. Activities.

    ERIC Educational Resources Information Center

    Moody, Mally

    1992-01-01

    A series of four activities are presented to enhance students' abilities to appreciate and use trigonometry as a tool in problem solving. Activities cover problems applying the law of sines, the law of cosines, and matching equivalent trigonometric expressions. A teacher's guide, worksheets, and answers are provided. (MDH)

  10. A closure scheme for chemical master equations

    PubMed Central

    Smadbeck, Patrick; Kaznessis, Yiannis N.

    2013-01-01

    Probability reigns in biology, with random molecular events dictating the fate of individual organisms, and propelling populations of species through evolution. In principle, the master probability equation provides the most complete model of probabilistic behavior in biomolecular networks. In practice, master equations describing complex reaction networks have remained unsolved for over 70 years. This practical challenge is a reason why master equations, for all their potential, have not inspired biological discovery. Herein, we present a closure scheme that solves the master probability equation of networks of chemical or biochemical reactions. We cast the master equation in terms of ordinary differential equations that describe the time evolution of probability distribution moments. We postulate that a finite number of moments capture all of the necessary information, and compute the probability distribution and higher-order moments by maximizing the information entropy of the system. An accurate order closure is selected, and the dynamic evolution of molecular populations is simulated. Comparison with kinetic Monte Carlo simulations, which merely sample the probability distribution, demonstrates this closure scheme is accurate for several small reaction networks. The importance of this result notwithstanding, a most striking finding is that the steady state of stochastic reaction networks can now be readily computed in a single-step calculation, without the need to simulate the evolution of the probability distribution in time. PMID:23940327

  11. Gaussian translation operator in a multilevel scheme

    NASA Astrophysics Data System (ADS)

    Hansen, Thorkild B.; Borries, Oscar

    2015-08-01

    A multilevel computation scheme for time-harmonic fields in three dimensions will be formulated with a new Gaussian translation operator that decays exponentially outside a circular cone centered on the line connecting the source and observation groups. This Gaussian translation operator is directional and diagonal with its sharpness determined by a beam parameter. When the beam parameter is set to zero, the Gaussian translation operator reduces to the standard fast multipole method translation operator. The directionality of the Gaussian translation operator makes it possible to reduce the number of plane waves required to achieve a given accuracy. The sampling rate can be determined straightforwardly to achieve any desired accuracy. The use of the computation scheme will be illustrated through a near-field scanning problem where the far-field pattern of a source is determined from near-field measurements with a known probe. Here the Gaussian translation operator improves the condition number of the matrix equation that determines the far-field pattern. The Gaussian translation operator can also be used when the probe pattern is known only in one hemisphere, as is common in practice. Also, the Gaussian translation operator will be used to solve the scattering problem of the perfectly conducting sphere.

  12. The Linear Bicharacteristic Scheme for Computational Electromagnetics

    NASA Technical Reports Server (NTRS)

    Beggs, John H.; Chan, Siew-Loong

    2000-01-01

    The upwind leapfrog or Linear Bicharacteristic Scheme (LBS) has previously been implemented and demonstrated on electromagnetic wave propagation problems. This paper extends the Linear Bicharacteristic Scheme for computational electromagnetics to treat lossy dielectric and magnetic materials and perfect electrical conductors. This is accomplished by proper implementation of the LBS for homogeneous lossy dielectric and magnetic media, and treatment of perfect electrical conductors (PECs) are shown to follow directly in the limit of high conductivity. Heterogeneous media are treated through implementation of surface boundary conditions and no special extrapolations or interpolations at dielectric material boundaries are required. Results are presented for one-dimensional model problems on both uniform and nonuniform grids, and the FDTD algorithm is chosen as a convenient reference algorithm for comparison. The results demonstrate that the explicit LBS is a dissipation-free, second-order accurate algorithm which uses a smaller stencil than the FDTD algorithm, yet it has approximately one-third the phase velocity error. The LBS is also more accurate on nonuniform grids.

  13. Conservation properties of unstructured staggered mesh schemes

    SciTech Connect

    Perot, B.

    2000-03-20

    Classic Cartesian staggered mesh schemes have a number of attractive properties. They do not display spurious pressure modes and they have been shown to locally conserve, mass, momentum, kinetic energy, and circulation to machine precision. Recently, a number of generalizations of the staggered mesh approach have been proposed for unstructured (triangular or tetrahedral) meshes. These unstructured staggered mesh methods have been created to retain the attractive pressure aspects and mass conservation properties of the classic Cartesian mesh method. This work addresses the momentum, kinetic energy, and circulation conservation properties of unstructured staggered mesh methods. It is shown that with certain choices of the velocity interpolation, unstructured staggered mesh discretization of the divergence form of the Navier-Stokes equations can conserve kinetic energy and momentum both locally and globally. In addition, it is shown that unstructured staggered mesh discretization of the rotational form of the Navier-Stokes equations can conserve kinetic energy and circulation both locally and globally. The analysis includes viscous terms and a generalization of the concept of conservation in the presence of viscosity to include a negative definite dissipation term in the kinetic energy equation. These novel conserving unstructured staggered mesh schemes have not been previously analyzed. It is shown that they are first-order accurate on nonuniform two-dimensional unstructured meshes and second-order accurate on uniform unstructured meshes. Numerical confirmation of the conservation properties and the order of accuracy of these unstructured staggered mesh methods is presented.

  14. Multiplexing schemes for quantum repeater networks

    NASA Astrophysics Data System (ADS)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  15. Multi-resolution analysis for ENO schemes

    NASA Technical Reports Server (NTRS)

    Harten, Ami

    1993-01-01

    Given a function u(x) which is represented by its cell-averages in cells which are formed by some unstructured grid, we show how to decompose the function into various scales of variation. This is done by considering a set of nested grids in which the given grid is the finest, and identifying in each locality the coarsest grid in the set from which u(x) can be recovered to a prescribed accuracy. We apply this multi-resolution analysis to Essentially Non-oscillatory Schemes (ENO) schemes in order to reduce the number of numerical flux computations which is needed in order to advance the solution by one time-step. This is accomplished by decomposing the numerical solution at the beginning of each time-step into levels of resolution, and performing the computation in each locality at the appropriate coarser grid. We present an efficient algorithm for implementing this program in the one-dimensional case; this algorithm can be extended to the multi-dimensional case with cartesian grids.

  16. Optimized Handover Schemes over WiMAX

    NASA Astrophysics Data System (ADS)

    Jerjees, Zina; Al-Raweshidy, H. S.; Al-Banna, Zaineb

    Voice Over Internet Protocol (VoIP) applications have received significant interests from the Mobile WiMAX standard in terms of capabilities and means of delivery multimedia services, by providing high bandwidth over long-range transmission. However, one of the main problems of IEEE 802.16 is that it covers multi BS with too many profiled layers, which can lead to potential interoperability problems. The multi BS mode requires multiple BSs to be scanned synchronously before initiating the transmission of broadcast data. In this paper, we first identify the key issues for VoIP over WiMAX. Then we present a MAC Layer solution to guarantee the demanded bandwidth and supporting a higher possible throughput between two WiMAX end points during the handover. Moreover, we propose a PHY and MAC layers scheme to maintain the required communication channel quality for VoIP during handover. Results show that our proposed schemes can significantly improve the network throughput up to 55%, reducing the data dropped to 70% while satisfying VoIP quality requirements.

  17. A subgrid parameterization scheme for precipitation

    NASA Astrophysics Data System (ADS)

    Turner, S.; Brenguier, J.-L.; Lac, C.

    2011-07-01

    With increasing computing power, the horizontal resolution of numerical weather prediction (NWP) models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed PDF of relative humidity spatial variability within the grid, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II) and fair weather cumulus (RICO) and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  18. A subgrid parameterization scheme for precipitation

    NASA Astrophysics Data System (ADS)

    Turner, S.; Brenguier, J.-L.; Lac, C.

    2012-04-01

    With increasing computing power, the horizontal resolution of numerical weather prediction (NWP) models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF) of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II) and fair weather cumulus (RICO) and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  19. Coupling Schemes in Terahertz Planar Metamaterials

    DOE PAGESBeta

    Roy Chowdhury, Dibakar; Singh, Ranjan; Taylor, Antoinette J.; Chen, Hou-Tong; Zhang, Weili; Azad, Abul K.

    2012-01-01

    We present a review of the different coupling schemes in a planar array of terahertz metamaterials. The gap-to-gap near-field capacitive coupling between split-ring resonators in a unit cell leads to either blue shift or red shift of the fundamental inductive-capacitive ( LC ) resonance, depending on the position of the split gap. The inductive coupling is enhanced by decreasing the inter resonator distance resulting in strong blue shifts of the LC resonance. We observe the LC resonance tuning only when the split-ring resonators are in close proximity of each other; otherwise, they appear to be uncoupled. Conversely, the higher-ordermore » resonances are sensitive to the smallest change in the inter particle distance or split-ring resonator orientation and undergo tremendous resonance line reshaping giving rise to a sharp subradiant resonance mode which produces hot spots useful for sensing applications. Most of the coupling schemes in a metamaterial are based on a near-field effect, though there also exists a mechanism to couple the resonators through the excitation of lowest-order lattice mode which facilitates the long-range radiative or diffractive coupling in the split-ring resonator plane leading to resonance line narrowing of the fundamental as well as the higher order resonance modes.« less

  20. A concatenated coding scheme for error control

    NASA Technical Reports Server (NTRS)

    Lin, S.

    1985-01-01

    A concatenated coding scheme for error control in data communications is analyzed. The inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. The probability of undetected error of the above error control scheme is derived and upper bounded. Two specific exmaples are analyzed. In the first example, the inner code is a distance-4 shortened Hamming code with generator polynomial (X+1)(X(6)+X+1) = X(7)+X(6)+X(2)+1 and the outer code is a distance-4 shortened Hamming code with generator polynomial (X+1)X(15+X(14)+X(13)+X(12)+X(4)+X(3)+X(2)+X+1) = X(16)+X(12)+X(5)+1 which is the X.25 standard for packet-switched data network. This example is proposed for error control on NASA telecommand links. In the second example, the inner code is the same as that in the first example but the outer code is a shortened Reed-Solomon code with symbols from GF(2(8)) and generator polynomial (X+1)(X+alpha) where alpha is a primitive element in GF(z(8)).

  1. Special Protection Scheme at BTPS Power Station

    NASA Astrophysics Data System (ADS)

    Ballal, Makarand Sudhakar; Suryawanshi, Hiralal Murlidhar; Ballal, Deepali Makarand; Mishra, Mahesh Kumar

    2016-03-01

    After 2003 free licensees' act in power sector, it is observed that many power plants from public sector as well as from private sectors are going to be commissioned. The load growth in India is about more than 10% pa. As these plants are going to connect to the power grid, therefore the grid is going to become more complicated. Also the problems related to grid stability are enhanced. There shall be possibilities regarding failure of grid system and under such circumstance it is always desirable to island minimum single generating unit in power plant of specified geographical area. After islanding the generating unit, this unit has to survive not only for the restoration of grid but also for power supply to important consumers. For the grid stability and effective survival of islanded generating unit, it is mandatory to maintain the power balance equation. This paper focuses on the lacunae's observed in implementation of special protection scheme to carry out islanding operation at Bhusawal Thermal Power Station (BTPS) by considering the case studies. The concepts of islanding, load shedding, generator tripping and along with importance of power balance equation is discussed. Efforts are made to provide the solution for the survival of islanding scheme.

  2. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  3. Special Semaphore Scheme for UHF Spacecraft Communications

    NASA Technical Reports Server (NTRS)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  4. Finite-difference schemes for anisotropic diffusion

    SciTech Connect

    Es, Bram van; Koren, Barry; Blank, Hugo J. de

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  5. Compact finite difference schemes with spectral-like resolution

    NASA Technical Reports Server (NTRS)

    Lele, Sanjiva K.

    1992-01-01

    The present finite-difference schemes for the evaluation of first-order, second-order, and higher-order derivatives yield improved representation of a range of scales and may be used on nonuniform meshes. Various boundary conditions may be invoked, and both accurate interpolation and spectral-like filtering can be accomplished by means of schemes for derivatives at mid-cell locations. This family of schemes reduces to the Pade schemes when the maximal formal accuracy constraint is imposed with a specific computational stencil. Attention is given to illustrative applications of these schemes in fluid dynamics.

  6. A group signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  7. On the security of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Chengqing; Wen, Zhonghua; Zhao, Weizhong; Chan, Wai Hong

    2013-01-01

    Due to the potential capability of providing unconditional security, arbitrated quantum signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were cryptanalyzed and improved. In this paper, we analyze the security property of some AQS schemes and show that all the previous AQS schemes, no matter whether original or improved, are still insecure in the sense that the messages and the corresponding signatures can be exchanged among different receivers, allowing the receivers to deny having accepted the signature of an appointed message. Some further improved methods on the AQS schemes are also discussed.

  8. Exploring the Perceptions of Success in an Exercise Referral Scheme: A Mixed Method Investigation

    ERIC Educational Resources Information Center

    Mills, Hayley; Crone, Diane; James, David V. B.; Johnston, Lynne H.

    2012-01-01

    Background: Exercise referral schemes feature as one of the prevalent primary care physical activity interventions in the United Kingdom, without extensive understanding of how those involved in providing and participating view success. The present research explores and reveals the constituents of "success," through comparison, contradiction, and…

  9. Block-classified motion compensation scheme for digital video

    SciTech Connect

    Zafar, S.; Zhang, Ya-Qin; Jabbari, B.

    1996-03-01

    A novel scheme for block-based motion compensation is introduced in which a block is classified according to the energy that is directly related to the motion activity it represents. This classification allows more flexibility in controlling the bit rate arid the signal-to-noise ratio and results in a reduction in motion search complexity. The method introduced is not dependent on the particular type of motion search algorithm implemented and can thus be used with any method assuming that the underlying matching criteria used is minimum absolute difference. It has been shown that the method is superior to a simple motion compensation algorithm where all blocks are motion compensated regardless of the energy resulting after the displaced difference.

  10. New scheme for polarimetric glucose sensing without polarizers

    NASA Astrophysics Data System (ADS)

    Winkler, Amy M.; Bonnema, Garret T.; Barton, Jennifer K.

    2010-02-01

    Polarimetric glucose sensing is a promising method for noninvasive estimation of blood glucose concentration. Published methods of polarimetric glucose sensing generally rely on measuring the rotation of light as it traverses the aqueous humor of the eye. In this article, an interferometer is described that can detect polarization changes due to glucose without the use of polarization control or polarization analyzing elements. Without polarizers, this system is sensitive to optical activity, inherent to glucose, but minimally sensitive to linear retardance, inherent to the cornea. The underlying principle of the system was experimentally verified using spectral domain optical coherence tomography. A detection scheme involving amplitude modulation was simulated, demonstrating sensitivity to clinically relevant glucose concentrations and an acceptable error due to time varying linear birefringence of the cornea using Clarke Error Grid Analysis.

  11. The hybrid Eulerian Lagrangian numerical scheme tested with Chemistry

    NASA Astrophysics Data System (ADS)

    Hansen, A. B.; Sørensen, B.; Tarning-Andersen, P.; Christensen, J. H.; Brandt, J.; Kaas, E.

    2012-12-01

    A newly developed transport scheme, the Hybrid Eulerian Lagrangian (HEL) scheme, has been tested using a module for atmospheric chemistry, including 58 chemical species, and compared to two other traditional advection schemes; a classical pseudospectral Eulerian method the Accurate Space Derivative (ASD) scheme and the bi-cubic semi-Lagrangian (SL) scheme using classical rotation tests. The rotation tests have been designed to test and compare the advection schemes for different spatial and temporal resolutions in different chemical conditions (rural and urban) and for different shapes (cone and slotted cylinder). This gives the advection schemes different challenges with respect to relatively slow or fast chemistry and smooth or sharp gradients. In every test, error measures have been calculated and used for ranking of the advection schemes with respect to performance, i.e. lowest overall errors for all chemical species. The results presented show that the new transport scheme, HEL, by far outperforms both the Eulerian and semi-Lagrangian schemes with very low error estimates compared to the two other schemes.

  12. An evaluation of RAMS radiation schemes by field measurements

    SciTech Connect

    Zhong, S; Doran, J C

    1994-02-01

    At present, two radiation schemes are used in RAMS: the Mahrer and Pielke (M-P) scheme and the Chen and Cotton (C-C) scheme. The M-P scheme requires little computational expense, but does not include the radiative effects of liquid water or ice; the C-C scheme accounts for the radiative effects of liquid water and ice but is fairly expensive computationally. For simulations with clouds, the C-C scheme is obviously a better choice, but for clear sky conditions, RAMS users face a decision regarding which radiation scheme to use. It has been noted that the choice of radiation scheme may result in significantly different results for the same case. To examine the differences in the radiative fluxes and the boundary-layer structure corresponding to the two radiation schemes in RAMS we have carried out a study where Rams was used to simulate the same case with two different radiation schemes. The modeled radiative fluxes by the two schemes were then compared with the field measurements. A description of the observations and the case study, a comparison and discussion of the results, and a summary and conclusions follow.

  13. Implicit Space-Time Conservation Element and Solution Element Schemes

    NASA Technical Reports Server (NTRS)

    Chang, Sin-Chung; Himansu, Ananda; Wang, Xiao-Yen

    1999-01-01

    Artificial numerical dissipation is in important issue in large Reynolds number computations. In such computations, the artificial dissipation inherent in traditional numerical schemes can overwhelm the physical dissipation and yield inaccurate results on meshes of practical size. In the present work, the space-time conservation element and solution element method is used to construct new and accurate implicit numerical schemes such that artificial numerical dissipation will not overwhelm physical dissipation. Specifically, these schemes have the property that numerical dissipation vanishes when the physical viscosity goes to zero. These new schemes therefore accurately model the physical dissipation even when it is extremely small. The new schemes presented are two highly accurate implicit solvers for a convection-diffusion equation. The two schemes become identical in the pure convection case, and in the pure diffusion case. The implicit schemes are applicable over the whole Reynolds number range, from purely diffusive equations to convection-dominated equations with very small viscosity. The stability and consistency of the schemes are analysed, and some numerical results are presented. It is shown that, in the inviscid case, the new schemes become explicit and their amplification factors are identical to those of the Leapfrog scheme. On the other hand, in the pure diffusion case, their principal amplification factor becomes the amplification factor of the Crank-Nicolson scheme.

  14. Two efficient schemes for probabilistic remote state preparation and the combination of both schemes

    NASA Astrophysics Data System (ADS)

    Wei, Jiahua; Dai, Hong-Yi; Zhang, Ming

    2014-09-01

    We propose two novel schemes for probabilistic remote preparation of an arbitrary quantum state with the aid of the introduction of auxiliary particles and appropriate local unitary operations. The first new proposal could be used to improve the total successful probability of the remote preparation of a general quantum state, and the successful probability is twice as much as the one of the preceding schemes. Meanwhile, one can make use of the second proposal to realize the remote state preparation when the information of the partially entangled state is only available for the sender. This is in contrast to the fact that the receiver must know the non-maximally entangled state in previous typical schemes. Hence, our second proposal could enlarge the applied range of probabilistic remote state preparation. Additionally, we will illustrate how to combine these novel proposals in detail, and our results show that the union has the advantages of both schemes. Of course, our protocols are implemented at the cost of the increased complexity of the practical realizations.

  15. On smoothing of the Crank-Nicolson scheme and higher order schemes for pricing barrier options

    NASA Astrophysics Data System (ADS)

    Wade, B. A.; Khaliq, A. Q. M.; Yousuf, M.; Vigo-Aguiar, J.; Deininger, R.

    2007-07-01

    Most option pricing problems have nonsmooth payoffs or discontinuous derivatives at the exercise price. Discrete barrier options have not only nonsmooth payoffs but also time dependent discontinuities. In pricing barrier options, certain aspects are triggered if the asset price becomes too high or too low. Standard smoothing schemes used to solve problems with nonsmooth payoff do not work well for discrete barrier options because of discontinuities introduced in the time domain when each barrier is applied. Moreover, these unwanted oscillations become worse when estimating the hedging parameters, e.g., Delta and Gamma. We have an improved smoothing strategy for the Crank-Nicolson method which is unique in achieving optimal order convergence for barrier option problems. Numerical experiments are discussed for one asset and two asset problems. Time evolution graphs are obtained for one asset problems to show how option prices change with respect to time. This smoothing strategy is then extended to higher order methods using diagonal (m,m)--Pade main schemes under a smoothing strategy of using as damping schemes the (0,2m-1) subdiagonal Pade schemes.

  16. Total Variation Diminishing (TVD) schemes of uniform accuracy

    NASA Technical Reports Server (NTRS)

    Hartwich, PETER-M.; Hsu, Chung-Hao; Liu, C. H.

    1988-01-01

    Explicit second-order accurate finite-difference schemes for the approximation of hyperbolic conservation laws are presented. These schemes are nonlinear even for the constant coefficient case. They are based on first-order upwind schemes. Their accuracy is enhanced by locally replacing the first-order one-sided differences with either second-order one-sided differences or central differences or a blend thereof. The appropriate local difference stencils are selected such that they give TVD schemes of uniform second-order accuracy in the scalar, or linear systems, case. Like conventional TVD schemes, the new schemes avoid a Gibbs phenomenon at discontinuities of the solution, but they do not switch back to first-order accuracy, in the sense of truncation error, at extrema of the solution. The performance of the new schemes is demonstrated in several numerical tests.

  17. An optimized finite-difference scheme for wave propagation problems

    NASA Technical Reports Server (NTRS)

    Zingg, D. W.; Lomax, H.; Jurgens, H.

    1993-01-01

    Two fully-discrete finite-difference schemes for wave propagation problems are presented, a maximum-order scheme and an optimized (or spectral-like) scheme. Both combine a seven-point spatial operator and an explicit six-stage time-march method. The maximum-order operator is fifth-order in space and is sixth-order in time for a linear problem with periodic boundary conditions. The phase and amplitude errors of the schemes obtained using Fourier analysis are given and compared with a second-order and a fourth-order method. Numerical experiments are presented which demonstrate the usefulness of the schemes for a range of problems. For some problems, the optimized scheme leads to a reduction in global error compared to the maximum-order scheme with no additional computational expense.

  18. SM-stability of operator-difference schemes

    NASA Astrophysics Data System (ADS)

    Vabishchevich, P. N.

    2012-06-01

    The spectral mimetic (SM) properties of operator-difference schemes for solving the Cauchy problem for first-order evolutionary equations concern the time evolution of individual harmonics of the solution. Keeping track of the spectral characteristics makes it possible to select more appropriate approximations with respect to time. Among two-level implicit schemes of improved accuracy based on Padé approximations, SM-stability holds for schemes based on polynomial approximations if the operator in an evolutionary equation is self-adjoint and for symmetric schemes if the operator is skew-symmetric. In this paper, additive schemes (also called splitting schemes) are constructed for evolutionary equations with general operators. These schemes are based on the extraction of the self-adjoint and skew-symmetric components of the corresponding operator.

  19. An efficient compression scheme for bitmap indices

    SciTech Connect

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  20. Improved Timing Scheme for Spaceborne Precipitation Radar

    NASA Technical Reports Server (NTRS)

    Berkun, Andrew; Fischman, Mark

    2004-01-01

    An improved timing scheme has been conceived for operation of a scanning satellite-borne rain-measuring radar system. The scheme allows a real-time-generated solution, which is required for auto targeting. The current timing scheme used in radar satellites involves pre-computing a solution that allows the instrument to catch all transmitted pulses without transmitting and receiving at the same time. Satellite altitude requires many pulses in flight at any time, and the timing solution to prevent transmit and receive operations from colliding is usually found iteratively. The proposed satellite has a large number of scanning beams each with a different range to target and few pulses per beam. Furthermore, the satellite will be self-targeting, so the selection of which beams are used will change from sweep to sweep. The proposed timing solution guarantees no echo collisions, can be generated using simple FPGA-based hardware in real time, and can be mathematically shown to deliver the maximum number of pulses per second, given the timing constraints. The timing solution is computed every sweep, and consists of three phases: (1) a build-up phase, (2) a feedback phase, and (3) a build-down phase. Before the build-up phase can begin, the beams to be transmitted are sorted in numerical order. The numerical order of the beams is also the order from shortest range to longest range. Sorting the list guarantees no pulse collisions. The build-up phase begins by transmitting the first pulse from the first beam on the list. Transmission of this pulse starts a delay counter, which stores the beam number and the time delay to the beginning of the receive window for that beam. The timing generator waits just long enough to complete the transmit pulse plus one receive window, then sends out the second pulse. The second pulse starts a second delay counter, which stores its beam number and time delay. This process continues until an output from the first timer indicates there is less

  1. Doping Scheme of Semiconducting Atomic Chains

    NASA Technical Reports Server (NTRS)

    Toshishige, Yamada; Saini, Subhash (Technical Monitor)

    1998-01-01

    Atomic chains, precise structures of atomic scale created on an atomically regulated substrate surface, are candidates for future electronics. A doping scheme for intrinsic semiconducting Mg chains is considered. In order to suppress the unwanted Anderson localization and minimize the deformation of the original band shape, atomic modulation doping is considered, which is to place dopant atoms beside the chain periodically. Group I atoms are donors, and group VI or VII atoms are acceptors. As long as the lattice constant is long so that the s-p band crossing has not occurred, whether dopant atoms behave as donors or acceptors is closely related to the energy level alignment of isolated atomic levels. Band structures are calculated for Br-doped (p-type) and Cs-doped (n-type) Mg chains using the tight-binding theory with universal parameters, and it is shown that the band deformation is minimized and only the Fermi energy position is modified.

  2. Ionization Scheme Development at the ISOLDE RILIS

    NASA Astrophysics Data System (ADS)

    Fedosseev, V. N.; Marsh, B. A.; Fedorov, D. V.; Köster, U.; Tengborn, E.

    2005-04-01

    The resonance ionization laser ion source (RILIS) of the ISOLDE on-line isotope separation facility is based on the method of laser step-wise resonance ionization of atoms in a hot metal cavity. The atomic selectivity of the RILIS complements the mass selection process of the ISOLDE separator magnets to provide beams of a chosen isotope with greatly reduced isobaric contamination. Using a system of dye lasers pumped by copper vapour lasers, ion beams of 24 elements have been generated at ISOLDE with ionization efficiencies in the range of 0.5-15%. As part of the ongoing RILIS development off-line resonance ionization spectroscopy studies carried out in 2003 and 2004 have determined the optimal three-step ionization schemes for scandium, antimony, dysprosium and yttrium.

  3. Evolution of Advection Upstream Splitting Method Schemes

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing

    2010-01-01

    This paper focuses on the evolution of advection upstream splitting method(AUSM) schemes. The main ingredients that have led to the development of modern computational fluid dynamics (CFD) methods have been reviewed, thus the ideas behind AUSM. First and foremost is the concept of upwinding. Second, the use of Riemann problem in constructing the numerical flux in the finite-volume setting. Third, the necessity of including all physical processes, as characterised by the linear (convection) and nonlinear (acoustic) fields. Fourth, the realisation of separating the flux into convection and pressure fluxes. The rest of this review briefly outlines the technical evolution of AUSM and more details can be found in the cited references. Keywords: Computational fluid dynamics methods, hyperbolic systems, advection upstream splitting method, conservation laws, upwinding, CFD

  4. Practical calculation scheme for generalized seniority

    NASA Astrophysics Data System (ADS)

    Jia, L. Y.

    2015-11-01

    We propose a scheme or procedure for performing practical calculations with generalized seniority. It reduces the total computing time by precalculating a set of intermediate quantities. We show that practically the computational (time and space) complexity of the algorithm does not depend on the valence particle number, in sharp contrast to the standard shell model. The method is demonstrated in semi-magic nuclei {}{46,48,50}Ca, 116Sn, and 182Pb, where the low-lying states could be well reproduced through achieved convergence at high generalized seniority. Odd particle-number systems or possible three-body terms from the Hamiltonian could be treated by the same formalism without complication.

  5. M1 excitation scheme in deformed nuclei

    NASA Astrophysics Data System (ADS)

    Otsuka, Takaharu; Morrison, Iain

    1991-10-01

    We present the M1 excitation scheme in even-even deformed nuclei from the sum-rule viewpoint based on the Nilsson+BCS approach. The sum-rule states are introduced for the Scissors, spin and spin-flip modes. The functional form of the B(M1) sum rule of the Scissors mode is obtained, and its actual value is shown to be 4˜6(μN2). The spin excitation B(M1) is 10˜15(μN2) including the spin-flip transitions. The total B(M1) is 15˜20(μN2). The effect of the SD and SDG pair truncation is studied to test IBM-2 for M1 excitations. The SDG truncation reproduces very well the calculation without truncation. The SD truncation reproduces the orbital excitation, whereas yields some deviations for the spin excitation.

  6. Multi-resolution analysis for ENO schemes

    NASA Technical Reports Server (NTRS)

    Harten, Ami

    1991-01-01

    Given an function, u(x), which is represented by its cell-averages in cells which are formed by some unstructured grid, we show how to decompose the function into various scales of variation. This is done by considering a set of nested grids in which the given grid is the finest, and identifying in each locality the coarsest grid in the set from which u(x) can be recovered to a prescribed accuracy. This multi-resolution analysis was applied to essentially non-oscillatory (ENO) schemes in order to advance the solution by one time-step. This is accomplished by decomposing the numerical solution at the beginning of each time-step into levels of resolution, and performing the computation in each locality at the appropriate coarser grid. An efficient algorithm for implementing this program in the 1-D case is presented; this algorithm can be extended to the multi-dimensional case with Cartesian grids.

  7. A Scheme for Targeting Optical SETI Observations

    NASA Astrophysics Data System (ADS)

    Shostak, Seth

    2004-06-01

    In optical SETI (OSETI) experiments, it is generally assumed that signals will be deliberate, narrowly targeted beacons sent by extraterrestrial societies to large numbers of candidate star systems. If this is so, then it may be unrealistic to expect a high duty cycle for the received signal. Ergo, an advantage accrues to any OSETI scheme that realistically suggests where and when to search. In this paper, we elaborate a proposal (Castellano, Doyle, &McIntosh 2000) for selecting regions of sky for intensive optical SETI monitoring based on characteristics of our solar system that would be visible at great distance. This can enormously lessen the amount of sky that needs to be searched. In addition, this is an attractive approach for the transmitting society because it both increases the chances of reception and provides a large reduction in energy required. With good astrometric information, the transmitter need be no more powerful than an automobile tail light.

  8. Plastics waste trashes German recycling scheme

    SciTech Connect

    Chynoweth, E.

    1993-06-30

    Plastics waste is causing a major headache for Duales System Deutschland (DSD: Bonn), one of Europe`s groundbreaking national packaging recycling programs. Five of Germany`s states have threatened to withdraw from the plan mainly because of the lack of plastics recycling capacity, says a DSD spokeswoman. {open_quotes}The pace of establishing recycling capacity does not meet the zeal in collection.{close_quotes} she notes. In addition, the organization has been crippled by a lack of funds. It claims that up to half the subscribers to the scheme - who pay a fee to display a green dot on packaging - are either irregular payers or not paying fees in proportion to their use of the green dot. The cost of setting up and paying for plastics recycling - not originally part of DSD`s responsibility - is also hurting the organization.

  9. A New Class of Finite Difference Schemes

    NASA Technical Reports Server (NTRS)

    Mahesh, K.

    1996-01-01

    Fluid flows in the transitional and turbulent regimes possess a wide range of length and time scales. The numerical computation of these flows therefore requires numerical methods that can accurately represent the entire, or at least a significant portion, of this range of scales. The inaccurate representation of small scales is inherent to non-spectral schemes. This can be detrimental to computations where the energy in the small scales is comparable to that in the larger scales, e.g. large-eddy simulations of high Reynolds number turbulence. The inaccurate numerical representation of the small scales in these large-eddy simulations can result in the numerical error overwhelming the contribution of the subgrid-scale model.

  10. Finite element or Galerkin type semidiscrete schemes

    NASA Technical Reports Server (NTRS)

    Durgun, K.

    1983-01-01

    A finite element of Galerkin type semidiscrete method is proposed for numerical solution of a linear hyperbolic partial differential equation. The question of stability is reduced to the stability of a system of ordinary differential equations for which Dahlquist theory applied. Results of separating the part of numerical solution which causes the spurious oscillation near shock-like response of semidiscrete scheme to a step function initial condition are presented. In general all methods produce such oscillatory overshoots on either side of shocks. This overshoot pathology, which displays a behavior similar to Gibb's phenomena of Fourier series, is explained on the basis of dispersion of separated Fourier components which relies on linearized theory to be satisfactory. Expository results represented.

  11. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    SciTech Connect

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  12. Development and evaluation of packet video schemes

    NASA Technical Reports Server (NTRS)

    Sayood, Khalid; Chen, Y. C.; Hadenfeldt, A. C.

    1990-01-01

    Reflecting the two tasks proposed for the current year, namely a feasibility study of simulating the NASA network, and a study of progressive transmission schemes, are presented. The view of the NASA network, gleaned from the various technical reports made available to use, is provided. Also included is a brief overview of how the current simulator could be modified to accomplish the goal of simulating the NASA network. As the material in this section would be the basis for the actual simulation, it is important to make sure that it is an accurate reflection of the requirements on the simulator. Brief descriptions of the set of progressive transmission algorithms selected for the study are contained. The results available in the literature were obtained under a variety of different assumptions, not all of which are stated. As such, the only way to compare the efficiency and the implementational complexity of the various algorithms is to simulate them.

  13. Recycling scheme for twin BWRs reactors

    SciTech Connect

    Ramirez-Sanchez, J. R.; Perry, R. T.; Gustavo Alonso, V.; Javier Palacios, H.

    2006-07-01

    To asses the advantages of reprocess and recycle the spent fuel from nuclear power reactors, against a once through policy, a MOX fuel design is proposed to match a generic scenario for twin BWRs and establish a fuel management scheme. Calculations for the amount of fuel that the plants will use during 40 years of operation were done, and an evaluation of costs using constant money method for each option applying current prices for uranium and services were made. Finally a comparison between the options was made, resulting that even the current high prices of uranium, still the recycling option is more expensive that the once through alternative. But reprocessing could be an alternative to reduce the amount of spent fuel stored in the reactor pools. (authors)

  14. Investigation of Near Shannon Limit Coding Schemes

    NASA Technical Reports Server (NTRS)

    Kwatra, S. C.; Kim, J.; Mo, Fan

    1999-01-01

    Turbo codes can deliver performance that is very close to the Shannon limit. This report investigates algorithms for convolutional turbo codes and block turbo codes. Both coding schemes can achieve performance near Shannon limit. The performance of the schemes is obtained using computer simulations. There are three sections in this report. First section is the introduction. The fundamental knowledge about coding, block coding and convolutional coding is discussed. In the second section, the basic concepts of convolutional turbo codes are introduced and the performance of turbo codes, especially high rate turbo codes, is provided from the simulation results. After introducing all the parameters that help turbo codes achieve such a good performance, it is concluded that output weight distribution should be the main consideration in designing turbo codes. Based on the output weight distribution, the performance bounds for turbo codes are given. Then, the relationships between the output weight distribution and the factors like generator polynomial, interleaver and puncturing pattern are examined. The criterion for the best selection of system components is provided. The puncturing pattern algorithm is discussed in detail. Different puncturing patterns are compared for each high rate. For most of the high rate codes, the puncturing pattern does not show any significant effect on the code performance if pseudo - random interleaver is used in the system. For some special rate codes with poor performance, an alternative puncturing algorithm is designed which restores their performance close to the Shannon limit. Finally, in section three, for iterative decoding of block codes, the method of building trellis for block codes, the structure of the iterative decoding system and the calculation of extrinsic values are discussed.

  15. Topology-independent shape modeling scheme

    NASA Astrophysics Data System (ADS)

    Malladi, Ravikanth; Sethian, James A.; Vemuri, Baba C.

    1993-06-01

    Developing shape models is an important aspect of computer vision research. Geometric and differential properties of the surface can be computed from shape models. They also aid the tasks of object representation and recognition. In this paper we present an innovative new approach for shape modeling which, while retaining important features of the existing methods, overcomes most of their limitations. Our technique can be applied to model arbitrarily complex shapes, shapes with protrusions, and to situations where no a priori assumption about the object's topology can be made. A single instance of our model, when presented with an image having more than one object of interest, has the ability to split freely to represent each object. Our method is based on the level set ideas developed by Osher & Sethian to follow propagating solid/liquid interfaces with curvature-dependent speeds. The interface is a closed, nonintersecting, hypersurface flowing along its gradient field with constant speed or a speed that depends on the curvature. We move the interface by solving a `Hamilton-Jacobi' type equation written for a function in which the interface is a particular level set. A speed function synthesized from the image is used to stop the interface in the vicinity of the object boundaries. The resulting equations of motion are solved by numerical techniques borrowed from the technology of hyperbolic conservation laws. An added advantage of this scheme is that it can easily be extended to any number of space dimensions. The efficacy of the scheme is demonstrated with numerical experiments on synthesized images and noisy medical images.

  16. Pointing Reference Scheme for Free-Space Optical Communications Systems

    NASA Technical Reports Server (NTRS)

    Wright, Malcolm; Ortiz, Gerardo; Jeganathan, Muthu

    2006-01-01

    A scheme is proposed for referencing the propagation direction of the transmit laser signal in pointing a free-space optical communications terminal. This recently developed scheme enables the use of low-cost, commercial silicon-based sensors for tracking the direction of the transmit laser, regardless of the transmit wavelength. Compared with previous methods, the scheme offers some advantages of less mechanical and optical complexity and avoids expensive and exotic sensor technologies. In free-space optical communications, the transmit beam must be accurately pointed toward the receiver in order to maintain the communication link. The current approaches to achieve this function call for part of the transmit beam to be split off and projected onto an optical sensor used to infer the pointed direction. This requires that the optical sensor be sensitive to the wavelength of the transmit laser. If a different transmit wavelength is desired, for example to obtain a source capable of higher data rates, this can become quite impractical because of the unavailability or inefficiency of sensors at these wavelengths. The innovation proposed here decouples this requirement by allowing any transmit wavelength to be used with any sensor. We have applied this idea to a particular system that transmits at the standard telecommunication wavelength of 1,550 nm and uses a silicon-based sensor, sensitive from 0.5 to 1.0 micrometers, to determine the pointing direction. The scheme shown in the figure involves integrating a low-power 980-nm reference or boresight laser beam coupled to the 1,550-nm transmit beam via a wavelength-division-multiplexed fiber coupler. Both of these signals propagate through the optical fiber where they achieve an extremely high level of co-alignment before they are launched into the telescope. The telescope uses a dichroic beam splitter to reflect the 980- nm beam onto the silicon image sensor (a quad detector, charge-coupled device, or active

  17. WALK Community Grants Scheme: lessons learned in developing and administering a health promotion microgrants program.

    PubMed

    Caperchione, Cristina; Mummery, W Kerry; Joyner, Kelly

    2010-09-01

    The Women's Active Living Kits (WALK) Community Grant Scheme was a key component of a federally funded Australian initiative aimed at increasing local capacity to promote and engage priority women's groups in health-related physical activity. Under the program, community groups and organizations were provided with the opportunity to apply and receive small grants to support the development of women's walking groups with the aim of increasing physical activity participation levels in women, supporting innovative community ideas for increasing women's physical activity by improving social structures and environments, or both. This article describes the development and administration of the WALK Community Grant Scheme, outlines challenges and barriers encountered throughout the grant program process, and provides practical insights for replicating this initiative. PMID:19129437

  18. Activities.

    ERIC Educational Resources Information Center

    Kincaid, Charlene; And Others

    1993-01-01

    Presents an activity in which students collect and organize data from a real-world simulation of the scientific concept of half life. Students collect data using a marble sifter, analyze the data using a graphing calculator, and determine an appropriate mathematical model. Includes reproducible worksheets. (MDH)

  19. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  20. MIMO transmit scheme based on morphological perceptron with competitive learning.

    PubMed

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. PMID:27135805

  1. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  2. Security analysis and improvements of arbitrated quantum signature schemes

    SciTech Connect

    Zou Xiangfu; Qiu Daowen

    2010-10-15

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  3. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  4. Security analysis and improvements of arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  5. Semi-Passive Chemical Oxidation Schemes for the Long-Term Treatment of Contaminants

    SciTech Connect

    Schwartz, Frank

    2004-12-01

    In situ chemical oxidation or ISCO schemes involve the addition of a chemical oxidant, such as potassium permanganate (KMnO4), which destroys chlorinated solvents like TCE in a straightforward reaction. Although ISCO is now regarded as a developing technology in an industrial sense, beyond active flushing schemes, there have been relatively limited investigations in how ISCO might be better used. Our previous study showed that KMnO4 flushing approaches often would be frustrated by the inability to control the delivery of the treatment fluid due to precipitation of low-permeability reaction by-product like MnO2 and other problems. It was therefore suggested that development of a new ISCO scheme that can provide both destruction efficiencies and plugging control would be required.

  6. State of the art of control schemes for smart systems featuring magneto-rheological materials

    NASA Astrophysics Data System (ADS)

    Choi, Seung-Bok; Li, Weihua; Yu, Miao; Du, Haiping; Fu, Jie; Do, Phu Xuan

    2016-04-01

    This review presents various control strategies for application systems utilizing smart magneto-rheological fluid (MRF) and magneto-rheological elastomers (MRE). It is well known that both MRF and MRE are actively studied and applied to many practical systems such as vehicle dampers. The mandatory requirements for successful applications of MRF and MRE include several factors: advanced material properties, optimal mechanisms, suitable modeling, and appropriate control schemes. Among these requirements, the use of an appropriate control scheme is a crucial factor since it is the final action stage of the application systems to achieve the desired output responses. There are numerous different control strategies which have been applied to many different application systems of MRF and MRE, summarized in this review. In the literature review, advantages and disadvantages of each control scheme are discussed so that potential researchers can develop more effective strategies to achieve higher control performance of many application systems utilizing magneto-rheological materials.

  7. Double-moment cloud microphysics scheme for the deep convection parameterization in the GFDL AM3

    NASA Astrophysics Data System (ADS)

    Belochitski, A.; Donner, L.

    2014-12-01

    A double-moment cloud microphysical scheme originally developed by Morrision and Gettelman (2008) for the stratiform clouds and later adopted for the deep convection by Song and Zhang (2011) has been implemented in to the Geophysical Fluid Dynamics Laboratory's atmospheric general circulation model AM3. The scheme treats cloud drop, cloud ice, rain, and snow number concentrations and mixing ratios as diagnostic variables and incorporates processes of autoconversion, self-collection, collection between hydrometeor species, sedimentation, ice nucleation, drop activation, homogeneous and heterogeneous freezing, and the Bergeron-Findeisen process. Such detailed representation of microphysical processes makes the scheme suitable for studying the interactions between aerosols and convection, as well as aerosols' indirect effects on clouds and their roles in climate change. The scheme is first tested in the single column version of the GFDL AM3 using forcing data obtained at the U.S. Department of Energy Atmospheric Radiation Measurment project's Southern Great Planes site. Scheme's impact on SCM simulations is discussed. As the next step, runs of the full atmospheric GCM incorporating the new parameterization are compared to the unmodified version of GFDL AM3. Global climatological fields and their variability are contrasted with those of the original version of the GCM. Impact on cloud radiative forcing and climate sensitivity is investigated.

  8. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  9. Improved Scheme for Modeling Mass Transfer between Fracture and Matrix Continua with Particle Tracking Method

    SciTech Connect

    L. Pan; Y. Seol; G. Bodvarsson

    2004-04-29

    The dual-continuum random-walk particle tracking approach is an attractive simulation method for simulating transport in a fractured porous medium. In order to be truly successful for such a model, however, the key issue is to properly simulate the mass transfer between the fracture and matrix continua. In a recent paper, Pan and Bodvarsson (2002) proposed an improved scheme for simulating fracture-matrix mass transfer, by introducing the concept of activity range into the calculation of fracture-matrix particle-transfer probability. By comparing with analytical solutions, they showed that their scheme successfully captured the transient diffusion depth into the matrix without any additional subgrid (matrix) cells. This technical note presents an expansion of their scheme to cases in which significant water flow through the fracture-matrix interface exists. The dual-continuum particle tracker with this new scheme was found to be as accurate as a numerical model using a more detailed grid. The improved scheme can be readily incorporated into the existing particle-tracking code, while still maintaining the advantage of needing no additional matrix cells to capture transient features of particle penetration into the matrix.

  10. Assessment of various convective parametrisation schemes for warm season precipitation foracasts

    NASA Astrophysics Data System (ADS)

    Mazarakis, Nikos; Kotroni, Vassiliki; Lagouvardos, Konstantinos; Argyriou, Athanassios

    2010-05-01

    In the frame of the EU/FP6-funded FLASH project the sensitivity of numerical model quantitative precipitation forecasts to the choice of the convective parameterization scheme (CPS) has been examined for twenty selected cases characterized by intense convective activity and widespread precipitation over Greece, during the warm period of 2005 - 2007. The schemes are: Kain - Fritsch, Grell and Betts - Miller - Janjic. The simulated precipitation from the 8-km grid was verified against raingauge measurements and lightning data provided by the ZEUS long-range lightning detection system. The validation against both sources of data showed that among the three CPSs, the more consistent behavior in quantitative precipitation forecasting was obtained by the Kain - Fritsch scheme that provided the best statistical scores. Further various modifications of the Kain-Fritsch (KF) have been examined. The modifications include: (a) the maximization of the convective scheme precipitation efficiency, (b) the change of the convective time step, (c) the force of the convective scheme to produce more/less cloud material, (d) the alteration of the vertical profile of updraft mass flux detrainment.

  11. Variationally consistent discretization schemes and numerical algorithms for contact problems

    NASA Astrophysics Data System (ADS)

    Wohlmuth, Barbara

    We consider variationally consistent discretization schemes for mechanical contact problems. Most of the results can also be applied to other variational inequalities, such as those for phase transition problems in porous media, for plasticity or for option pricing applications from finance. The starting point is to weakly incorporate the constraint into the setting and to reformulate the inequality in the displacement in terms of a saddle-point problem. Here, the Lagrange multiplier represents the surface forces, and the constraints are restricted to the boundary of the simulation domain. Having a uniform inf-sup bound, one can then establish optimal low-order a priori convergence rates for the discretization error in the primal and dual variables. In addition to the abstract framework of linear saddle-point theory, complementarity terms have to be taken into account. The resulting inequality system is solved by rewriting it equivalently by means of the non-linear complementarity function as a system of equations. Although it is not differentiable in the classical sense, semi-smooth Newton methods, yielding super-linear convergence rates, can be applied and easily implemented in terms of a primal-dual active set strategy. Quite often the solution of contact problems has a low regularity, and the efficiency of the approach can be improved by using adaptive refinement techniques. Different standard types, such as residual- and equilibrated-based a posteriori error estimators, can be designed based on the interpretation of the dual variable as Neumann boundary condition. For the fully dynamic setting it is of interest to apply energy-preserving time-integration schemes. However, the differential algebraic character of the system can result in high oscillations if standard methods are applied. A possible remedy is to modify the fully discretized system by a local redistribution of the mass. Numerical results in two and three dimensions illustrate the wide range of

  12. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient. PMID:22374237

  13. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. PMID:23321972

  14. Hybrid ARQ schemes employing coded modulation and sequence combining

    NASA Astrophysics Data System (ADS)

    Deng, Robert H.

    1994-06-01

    We propose and analyze two hybrid automatic-repeat-request (ARQ) schemes employing bandwidth efficient coded modulation and coded sequence combining. In the first scheme, a trellis-coded modulation (TCM) is used to control channel noise; while in the second scheme a concatenated coded modulation is employed. The concatenated coded modulation is formed by cascading a Reed-Solomon (RS) outer code and a coded modulation (BCM) inner code. In both schemes, the coded modulation decoder, by performing sequence combining and soft-decision maximum likelihood decoding, makes full use of the information available in all received sequences corresponding to a given information message. It is shown, by means of analysis as well as computer simulations, that both schemes are capable of providing high throughput efficiencies over a wide range of signal-to-noise ratios. The schemes are suitable for large file transfers over satellite communication links where high throughput and high reliability are required.

  15. A novel quantum group signature scheme without using entangled states

    NASA Astrophysics Data System (ADS)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  16. An arbitrated quantum signature scheme with fast signing and verifying

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Qin, Su-Juan; Su, Qi

    2013-11-01

    Existing arbitrated quantum signature (AQS) schemes are almost all based on the Leung quantum one-time pad (L-QOTP) algorithm. In these schemes, the receiver can achieve an existential forgery of the sender's signatures under the known message attack, and the sender can successfully disavow any of her/his signatures by a simple attack. In this paper, a solution of solving the problems is given, through designing a new QOTP algorithm relying largely on inserting decoy states into fixed insertion positions. Furthermore, we present an AQS scheme with fast signing and verifying, which is based on the new QOTP algorithm. It is just using single particle states and is unconditional secure. To fulfill the functions of AQS schemes, our scheme needs a significantly lower computational costs than that required by other AQS schemes based on the L-QOTP algorithm.

  17. A New Neutron Multiplicity Deadtime Scheme

    SciTech Connect

    Croft, S.; Menaa, N.; Kirkpatrick, J.; Philips, S.; McElroy, R.D.

    2008-07-01

    Deadtime corrections for passive neutron coincidence counting are traditionally formulated in terms of the Totals counting rate. The deadtime correction is exponential in form with the effective deadtime being linear in terms of observed Totals rate. The deadtime coefficient for the Reals rate is traditionally fixed at four times that of the Totals rate parameter. When it comes to multiplicity counting, however, more complex expressions are typically used for the Doubles and Triples rates based on mathematical actions to the multiplicity histograms with the Singles (or Trigger) rate being treated rather simplistically. Since the Totals and Singles and Reals and Doubles, respectively, are effectively equivalent measures, the difference in deadtime treatment results is an inconsistency. Furthermore, additional empirical correction factors are often applied in the case of the multiplicity deadtime corrections and these do not follow from the underlying theoretical framework. The purpose of this paper is to re-examine the semi-empirical deadtime correction expressions from a fresh perspective. We propose to a scheme whereby Totals and Singles are treated equivalently with the correction having the transcendental form of the paralysable model. The impact of correlations on the Totals deadtime correction is shown to be modest. The deadtime correction factor for Reals and Doubles are again treated similarly also using an exponential form in terms of the corrected Total event rate but with a deadtime parameter which is not fixed ahead of time to be four times that used in the Totals correction. In the case of the Triples correction, which is evaluated from a composite expression, the deadtime corrections for the Singles and Doubles are used as appropriate but a new empirical correction, again given in terms of the corrected rate, is introduced. The new correction acts only on the part of the Triples expression which is does not represent the correlated-accidentals. The new

  18. A scoring scheme for evaluating magnetofossil identifications

    NASA Astrophysics Data System (ADS)

    Kopp, R. E.; Kirschvink, J. L.

    2007-12-01

    In many Quaternary lacustrine and marine settings, fossil magnetotactic bacteria are a major contributor to sedimentary magnetization [1]. Magnetite particles produced by magnetotactic bacteria have traits, shaped by natural selection, that increase the efficiency with which the bacteria utilize iron and also facilitate the recognition of the particles' biological origin. In particular, magnetotactic bacteria generally produce particles with characteristic shapes and narrow size and shape distributions that lie within the single domain stability field. The particles have effective positive magnetic anisotropy, produced by alignment in chains and frequently by particle elongation. In addition, the crystals are often nearly stochiometric and have few crystallographic defects. Yet, despite these distinctive traits, there are few identified magnetofossils that predate the Quaternary, and many putative identifications are highly controversial. We propose a six-criteria scoring scheme for evaluating identifications based on the quality of the geological, magnetic, and electron microscopic evidence. Our criteria are: (1) whether the geological context is well-constrained stratigraphically, and whether paleomagnetic evidence suggests a primary magnetization; (2) whether magnetic or microscopic evidence support the presence of significant single-domain magnetite; (3) whether magnetic or ferromagnetic resonance evidence indicates narrow size and shape distributions, and whether microscopic evidence reveals single-domain particles with truncated edges, elongate single-domain particles, and/or narrow size and shape distributions; (4) whether ferromagnetic resonance, low-temperature magnetic, or electron microscopic evidence reveals the presence of chains; (5) whether low-temperature magnetometry, energy dispersive X-ray spectroscopy, or other techniques demonstrate the near-stochiometry of the particles; and (6) whether high-resolution TEM indicates the near- absence of

  19. JOURNAL SCOPE GUIDELINES: Paper classification scheme

    NASA Astrophysics Data System (ADS)

    2005-06-01

    This scheme is used to clarify the journal's scope and enable authors and readers to more easily locate the appropriate section for their work. For each of the sections listed in the scope statement we suggest some more detailed subject areas which help define that subject area. These lists are by no means exhaustive and are intended only as a guide to the type of papers we envisage appearing in each section. We acknowledge that no classification scheme can be perfect and that there are some papers which might be placed in more than one section. We are happy to provide further advice on paper classification to authors upon request (please email jphysa@iop.org). 1. Statistical physics numerical and computational methods statistical mechanics, phase transitions and critical phenomena quantum condensed matter theory Bose-Einstein condensation strongly correlated electron systems exactly solvable models in statistical mechanics lattice models, random walks and combinatorics field-theoretical models in statistical mechanics disordered systems, spin glasses and neural networks nonequilibrium systems network theory 2. Chaotic and complex systems nonlinear dynamics and classical chaos fractals and multifractals quantum chaos classical and quantum transport cellular automata granular systems and self-organization pattern formation biophysical models 3. Mathematical physics combinatorics algebraic structures and number theory matrix theory classical and quantum groups, symmetry and representation theory Lie algebras, special functions and orthogonal polynomials ordinary and partial differential equations difference and functional equations integrable systems soliton theory functional analysis and operator theory inverse problems geometry, differential geometry and topology numerical approximation and analysis geometric integration computational methods 4. Quantum mechanics and quantum information theory coherent states eigenvalue problems supersymmetric quantum mechanics

  20. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Technical Reports Server (NTRS)

    Lam, Quang; Ray, Surendra N.

    1995-01-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  1. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Astrophysics Data System (ADS)

    Lam, Quang; Ray, Surendra N.

    1995-05-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  2. A mirror based scheme of a laser projection microscope

    NASA Astrophysics Data System (ADS)

    Gubarev, F. A.; Li, Lin; Klenovskii, M. S.

    2016-04-01

    The paper discusses the design of a laser projection microscope with a mirror-based scheme of image formation. It is shown that the laser projection microscope with the mirror-based scheme of image formation is well suited for distant objects monitoring. This scheme allowed obtaining a field of view of more than 3 cm at the distance of 4 m from the brightness amplifier

  3. Scheme for atomic-state teleportation between two bad cavities

    SciTech Connect

    Zheng Shibiao; Guo Guangcan

    2006-03-15

    A scheme is presented for the long-distance teleportation of an unknown atomic state between two separated cavities. Our scheme works in the regime where the atom-cavity coupling strength is smaller than the cavity decay rate. Thus the requirement on the quality factor of the cavities is greatly relaxed. Furthermore, the fidelity of our scheme is not affected by the detection inefficiency and atomic decay. These advantages are important in view of experiments.

  4. A New Low Dissipative High Order Schemes for MHD Equations

    NASA Technical Reports Server (NTRS)

    Yee, H. C.; Sjoegreen, Bjoern; Mansour, Nagi (Technical Monitor)

    2002-01-01

    The goal of this talk is to extend our recently developed highly parallelizable nonlinear stable high order schemes for complex multiscale hydrodynamic applications to the viscous MHD equations. These schemes employed multiresolution wavelets as adaptive numerical dissipation controls to limit the amount and to aid the selection and/or blending of the appropriate types of dissipation to be used. The new scheme is formulated for both the conservative and non-conservative form of the MHD equations in curvilinear grids.

  5. New high order schemes in BATS-R-US

    NASA Astrophysics Data System (ADS)

    Toth, G.; van der Holst, B.; Daldorff, L.; Chen, Y.; Gombosi, T. I.

    2013-12-01

    The University of Michigan global magnetohydrodynamics code BATS-R-US has long relied on the block-adaptive mesh refinement (AMR) to increase accuracy in regions of interest, and we used a second order accurate TVD scheme. While AMR can in principle produce arbitrarily accurate results, there are still practical limitations due to computational resources. To further improve the accuracy of the BATS-R-US code, recently, we have implemented a 4th order accurate finite volume scheme (McCorquodale and Colella, 2011}), the 5th order accurate Monotonicity Preserving scheme (MP5, Suresh and Huynh, 1997) and the 5th order accurate CWENO5 scheme (Capdeville, 2008). In the first implementation the high order accuracy is achieved in the uniform parts of the Cartesian grids, and we still use the second order TVD scheme at resolution changes. For spherical grids the new schemes are only second order accurate so far, but still much less diffusive than the TVD scheme. We show a few verification tests that demonstrate the order of accuracy as well as challenging space physics applications. The high order schemes are less robust than the TVD scheme, and it requires some tricks and effort to make the code work. When the high order scheme works, however, we find that in most cases it can obtain similar or better results than the TVD scheme on twice finer grids. For three dimensional time dependent simulations this means that the high order scheme is almost 10 times faster requires 8 times less storage than the second order method.

  6. On high-resolution finite volume shock capturing schemes

    NASA Astrophysics Data System (ADS)

    Causon, D. M.; Clarke, N.

    1990-07-01

    Conservative, shock capturing methods for the unsteady Euler equations are reviewed and it is shown that the concepts of entropy satisfaction and total variation diminution can be applied to well-known classical schemes. For an associated scheme to be efficient in applications, it is necessary that it be constructed with economy of implementation in mind, and that it be able to capture strong shock waves with high resolution. We describe a scheme which is efficient in both respects.

  7. On high resolution finite volume shock capturing schemes

    NASA Astrophysics Data System (ADS)

    Causon, D. M.; Clarke, N.

    Conservative shock-capturing methods for the unsteady Euler equations are reviewed, and it is shown that the concepts of entropy satisfaction and total variation diminution can be applied to well known classical schemes. For an associated scheme to be efficient in applications, it is necessary that it be constructed with economy of implementation in mind, and that it be able to capture strong shock waves with high resolution. A scheme which is efficient in both respects is described.

  8. Dispersion-relation-preserving finite difference schemes for computational acoustics

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Webb, Jay C.

    1993-01-01

    Time-marching dispersion-relation-preserving (DRP) schemes can be constructed by optimizing the finite difference approximations of the space and time derivatives in wave number and frequency space. A set of radiation and outflow boundary conditions compatible with the DRP schemes is constructed, and a sequence of numerical simulations is conducted to test the effectiveness of the DRP schemes and the radiation and outflow boundary conditions. Close agreement with the exact solutions is obtained.

  9. Effects of sparse sampling schemes on image quality in low-dose CT

    SciTech Connect

    Abbas, Sajid; Lee, Taewon; Cho, Seungryong; Shin, Sukyoung; Lee, Rena

    2013-11-15

    Purpose: Various scanning methods and image reconstruction algorithms are actively investigated for low-dose computed tomography (CT) that can potentially reduce a health-risk related to radiation dose. Particularly, compressive-sensing (CS) based algorithms have been successfully developed for reconstructing images from sparsely sampled data. Although these algorithms have shown promises in low-dose CT, it has not been studied how sparse sampling schemes affect image quality in CS-based image reconstruction. In this work, the authors present several sparse-sampling schemes for low-dose CT, quantitatively analyze their data property, and compare effects of the sampling schemes on the image quality.Methods: Data properties of several sampling schemes are analyzed with respect to the CS-based image reconstruction using two measures: sampling density and data incoherence. The authors present five different sparse sampling schemes, and simulated those schemes to achieve a targeted dose reduction. Dose reduction factors of about 75% and 87.5%, compared to a conventional scan, were tested. A fully sampled circular cone-beam CT data set was used as a reference, and sparse sampling has been realized numerically based on the CBCT data.Results: It is found that both sampling density and data incoherence affect the image quality in the CS-based reconstruction. Among the sampling schemes the authors investigated, the sparse-view, many-view undersampling (MVUS)-fine, and MVUS-moving cases have shown promising results. These sampling schemes produced images with similar image quality compared to the reference image and their structure similarity index values were higher than 0.92 in the mouse head scan with 75% dose reduction.Conclusions: The authors found that in CS-based image reconstructions both sampling density and data incoherence affect the image quality, and suggest that a sampling scheme should be devised and optimized by use of these indicators. With this strategic

  10. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  11. The constant displacement scheme for tracking particles in heterogeneous aquifers

    SciTech Connect

    Wen, X.H.; Gomez-Hernandez, J.J.

    1996-01-01

    Simulation of mass transport by particle tracking or random walk in highly heterogeneous media may be inefficient from a computational point of view if the traditional constant time step scheme is used. A new scheme which adjusts automatically the time step for each particle according to the local pore velocity, so that each particle always travels a constant distance, is shown to be computationally faster for the same degree of accuracy than the constant time step method. Using the constant displacement scheme, transport calculations in a 2-D aquifer model, with nature log-transmissivity variance of 4, can be 8.6 times faster than using the constant time step scheme.

  12. An Efficient Variable-Length Data-Compression Scheme

    NASA Technical Reports Server (NTRS)

    Cheung, Kar-Ming; Kiely, Aaron B.

    1996-01-01

    Adaptive variable-length coding scheme for compression of stream of independent and identically distributed source data involves either Huffman code or alternating run-length Huffman (ARH) code, depending on characteristics of data. Enables efficient compression of output of lossless or lossy precompression process, with speed and simplicity greater than those of older coding schemes developed for same purpose. In addition, scheme suitable for parallel implementation on hardware with modular structure, provides for rapid adaptation to changing data source, compatible with block orientation to alleviate memory requirements, ensures efficiency over wide range of entropy, and easily combined with such other communication schemes as those for containment of errors and for packetization.

  13. A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Ding, Li-Yuan; Yu, Yao-Feng; Li, Peng-Fei

    2016-09-01

    In this paper, we propose a new electronic voting scheme using Bell entangled states as quantum channels. This scheme is based on quantum proxy signature. The voter Alice, vote management center Bob, teller Charlie and scrutineer Diana only perform single particle measurement to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. It can be easily realized. We use quantum key distribution and one-time pad to guarantee its unconditional security. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, unforgetability and undeniability.

  14. Embedded discontinuous Galerkin transport schemes with localised limiters

    NASA Astrophysics Data System (ADS)

    Cotter, C. J.; Kuzmin, D.

    2016-04-01

    Motivated by finite element spaces used for representation of temperature in the compatible finite element approach for numerical weather prediction, we introduce locally bounded transport schemes for (partially-)continuous finite element spaces. The underlying high-order transport scheme is constructed by injecting the partially-continuous field into an embedding discontinuous finite element space, applying a stable upwind discontinuous Galerkin (DG) scheme, and projecting back into the partially-continuous space; we call this an embedded DG transport scheme. We prove that this scheme is stable in L2 provided that the underlying upwind DG scheme is. We then provide a framework for applying limiters for embedded DG transport schemes. Standard DG limiters are applied during the underlying DG scheme. We introduce a new localised form of element-based flux-correction which we apply to limiting the projection back into the partially-continuous space, so that the whole transport scheme is bounded. We provide details in the specific case of tensor-product finite element spaces on wedge elements that are discontinuous P1/Q1 in the horizontal and continuous P2 in the vertical. The framework is illustrated with numerical tests.

  15. Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows.

    PubMed

    Li, Q; Luo, K H; Li, X J

    2012-07-01

    The pseudopotential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudoepotential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudopotential LB model. First, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme [Shan and Chen, Phys. Rev. E 47, 1815 (1993)] and the exact-difference-method forcing scheme [Kupershtokh et al., Comput. Math. Appl. 58, 965 (2009)]. The nature of these two schemes and their recovered macroscopic equations will be shown. Second, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudopotential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach to achieving thermodynamic consistency in the pseudopotential LB model. PMID:23005565

  16. Novel adsorption distillation hybrid scheme for propane/propylene separation

    SciTech Connect

    Kumar, R.; Golden, T.C.; White, T.R.; Rokicki, A. )

    1992-12-01

    A novel adsorption-distillation hybrid scheme is proposed for propane/propylene separation. The suggested scheme has potential for saving up to [approximately]50% energy and [approximately]15-30% in capital costs as compared with current technology. The key concept of the proposed scheme is to separate olefins from alkanes by adsorption and then separate individual olefins and alkanes by simple distillation, thereby eliminating energy intensive and expensive olefin-alkane distillation. A conceptual flow schematic for the proposed hybrid scheme and potential savings are outlined.s

  17. Studies of Inviscid Flux Schemes for Acoustics and Turbulence Problems

    NASA Technical Reports Server (NTRS)

    Morris, Chris

    2013-01-01

    Five different central difference schemes, based on a conservative differencing form of the Kennedy and Gruber skew-symmetric scheme, were compared with six different upwind schemes based on primitive variable reconstruction and the Roe flux. These eleven schemes were tested on a one-dimensional acoustic standing wave problem, the Taylor-Green vortex problem and a turbulent channel flow problem. The central schemes were generally very accurate and stable, provided the grid stretching rate was kept below 10%. As near-DNS grid resolutions, the results were comparable to reference DNS calculations. At coarser grid resolutions, the need for an LES SGS model became apparent. There was a noticeable improvement moving from CD-2 to CD-4, and higher-order schemes appear to yield clear benefits on coarser grids. The UB-7 and CU-5 upwind schemes also performed very well at near-DNS grid resolutions. The UB-5 upwind scheme does not do as well, but does appear to be suitable for well-resolved DNS. The UF-2 and UB-3 upwind schemes, which have significant dissipation over a wide spectral range, appear to be poorly suited for DNS or LES.

  18. Continuous variable (2, 3) threshold quantum secret sharing schemes

    NASA Astrophysics Data System (ADS)

    Lance, Andrew M.; Symul, Thomas; Bowen, Warwick P.; Tyc, Tomás; Sanders, Barry C.; Lam, Ping Koy

    2003-01-01

    We present two schemes to perform continuous variable (2, 3) threshold quantum secret sharing (QSS) on the quadrature amplitudes of bright light beams. Both schemes require a pair of entangled light beams. The first scheme utilizes two phase sensitive optical amplifiers, whilst the second uses an electro-optic feedforward loop for the reconstruction of the secret. We examine the efficacy of QSS in terms of fidelity, as well as the signal transfer coefficients and the conditional variances of the reconstructed output state. We show that both schemes in the ideal case yield perfect secret reconstruction.

  19. A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Ding, Li-Yuan; Yu, Yao-Feng; Li, Peng-Fei

    2016-06-01

    In this paper, we propose a new electronic voting scheme using Bell entangled states as quantum channels. This scheme is based on quantum proxy signature. The voter Alice, vote management center Bob, teller Charlie and scrutineer Diana only perform single particle measurement to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. It can be easily realized. We use quantum key distribution and one-time pad to guarantee its unconditional security. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, unforgetability and undeniability.

  20. A cancellable and fuzzy fingerprint scheme for mobile computing security

    NASA Astrophysics Data System (ADS)

    Yang, Wencheng; Xi, Kai; Li, Cai

    2012-09-01

    Fingerprint recognition provides an effective user authentication solution for mobile computing systems. However, as a fingerprint template protection scheme, fingerprint fuzzy vault is subject to cross-matching attacks, since the same finger might be registered for various applications. In this paper, we propose a fingerprint-based biometric security scheme named the cancellable and fuzzy fingerprint scheme, which combines a cancellable non-linear transformation with the client/server version of fuzzy vault, to address the cross-matching attack in a mobile computing system. Experimental results demonstrate that our scheme can provide reliable and secure protection to the mobile computing system while achieving an acceptable matching performance.

  1. The Alternative Scheme to Describe Nuclei with X(5) Symmetry

    NASA Astrophysics Data System (ADS)

    Dai, L. R.; Pan, F.; Liu, R. L.; Yu, H.; Zhang, W. L.

    The possible nuclei with X(5) symmetry are investigated in the Interacting Boson Model (IBM), in which the traditional scheme and a new alternative scheme from the spherical to the axially deformed limit of the IBM with a schematic Hamiltonian are studied by using the SU(3) quadrupole-quadrupole term and O(6) cubic interaction, respectively. The low-lying energy levels and E2 transition rates from the new scheme are calculated and compared with the experimental data and those of the traditional U(5) - SU(3) description. It is shown that the results from this new scheme seem better than those of the traditional description.

  2. Quantum fully homomorphic encryption scheme based on universal quantum circuit

    NASA Astrophysics Data System (ADS)

    Liang, Min

    2015-08-01

    Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on any encrypted data. The QFHE scheme is proved to be perfectly secure. In the scheme, the decryption key is different from the encryption key; however, the encryption key cannot be revealed. Moreover, the evaluation algorithm of the scheme is independent of the encryption key, so it is suitable for delegated quantum computing between two parties.

  3. Two-dimensional shallow water equations by composite schemes

    NASA Astrophysics Data System (ADS)

    Liska, Richard; Wendroff, Burton

    1999-06-01

    Composite schemes are formed by global composition of several Lax-Wendroff steps followed by a diffusive Lax-Friedrichs or WENO step, which filters out the oscillations around shocks typical for the Lax-Wendroff scheme. These schemes are applied to the shallow water equations in two dimensions. The Lax-Friedrichs composite is also formulated for a trapezoidal mesh, which is necessary in several example problems. The suitability of the composite schemes for the shallow water equations is demonstrated on several examples, including the circular dam break problem, the shock focusing problem and supercritical channel flow problems. Copyright

  4. A spectrum-scan routing scheme in flexible optical networks

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Hua, Nan; Wan, Xin; Zheng, Xiaoping; Liu, Zhigang

    2011-12-01

    The routing and spectrum assignment (RSA) is one of the key problems in flexible optical networks. When in a gridless fashion, the shortest-path RSA algorithms have exponential computational complexity, and are thus not suitable to be employed in real networks. On the other hand, today most optical components cannot support fully gridless tunability, which also limits the application of gridless RSA schemes. In this paper, we propose a novel grid-based spectrum-scan routing (SSR) scheme in flexible optical networks. The SSR scheme achieves optimal routing with a polynomial computational complexity. Compared with other RSA schemes, SSR has shorter computation time, lower blocking probability, and higher resource utilization.

  5. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  6. Robust AGC : Traditional Structure Versus Restructured Scheme

    NASA Astrophysics Data System (ADS)

    Bevrani, Hassan; Mitani, Yasunori; Tsuji, Kiichiro

    In this paper, a decentralized robust approach is proposed for the Automatic Generation Control (AGC) system based on a modified traditional AGC structure. This work addresses the new strategy to adapt well-tested classical AGC scheme to the changing environment of power system operation under deregulation. The effect of bilateral contracts is considered as a set of new input signals in each control area dynamical model. In practice, AGC systems use simple proportional-integral (PI) controllers. However, since the PI controller parameters are usually tuned based on classical or trial-and-error approaches, they are incapable of obtaining good dynamical performance for a wide range of operating conditions and various scenarios in deregulated environment. In this paper with regard to this problem, the AGC synthesis is formulated as an H∞ static output control problem and is solved using a developed iterative linear matrix inequalities (ILMI) algorithm to design of robust PI controllers in the restructured power system control areas. A three area power system example with possible contract scenarios and wide range of load changes is given to illustrate the proposed approach. The resulting controllers are shown to minimize the effect of disturbances and maintain the robust performance.

  7. Date attachable offline electronic cash scheme.

    PubMed

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  8. The midwives service scheme in Nigeria.

    PubMed

    Abimbola, Seye; Okoli, Ugo; Olubajo, Olalekan; Abdullahi, Mohammed J; Pate, Muhammad A

    2012-01-01

    Maternal, newborn, and child health indices in Nigeria vary widely across geopolitical zones and between urban and rural areas, mostly due to variations in the availability of skilled attendance at birth. To improve these indices, the Midwives Service Scheme (MSS) in Nigeria engaged newly graduated, unemployed, and retired midwives to work temporarily in rural areas. The midwives are posted for 1 year to selected primary care facilities linked through a cluster model in which four such facilities with the capacity to provide basic essential obstetric care are clustered around a secondary care facility with the capacity to provide comprehensive emergency obstetric care. The outcome of the MSS 1 year on has been an uneven improvement in maternal, newborn, and child health indices in the six geopolitical zones of Nigeria. Major challenges include retention, availability and training of midwives, and varying levels of commitment from state and local governments across the country, and despite the availability of skilled birth attendants at MSS facilities, women still deliver at home in some parts of the country. PMID:22563303

  9. Environmental endocrine disruptors: A proposed classification scheme

    SciTech Connect

    Fur, P.L. de; Roberts, J.

    1995-12-31

    A number of chemicals known to act on animal systems through the endocrine system have been termed environmental endocrine disruptors. This group includes some of the PCBs and TCDDs, as well as lead, mercury and a large number of pesticides. The common feature is that the chemicals interact with endogenous endocrine systems at the cellular and/or molecular level to alter normal processes that are controlled or regulated by hormones. Although the existence of artificial or environmental estrogens (e.g. chlordecone and DES) has been known for some time, recent data indicate that this phenomenon is widespread. Indeed, anti-androgens have been held responsible for reproductive dysfunction in alligator populations in Florida. But the significance of endocrine disruption was recognized by pesticide manufacturers when insect growth regulators were developed to interfere with hormonal control of growth. Controlling, regulating or managing these chemicals depends in no small part on the ability to identify, screen or otherwise know that a chemical is an endocrine disrupter. Two possible classifications schemes are: using the effects caused in an animal, or animals as an exposure indicator; and using a known screen for the point of contact with the animal. The former would require extensive knowledge of cause and effect relationships in dozens of animal groups; the latter would require a screening tool comparable to an estrogen binding assay. The authors present a possible classification based on chemicals known to disrupt estrogenic, androgenic and ecdysone regulated hormonal systems.

  10. Date Attachable Offline Electronic Cash Scheme

    PubMed Central

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  11. Effective biasing schemes for duct streaming problems.

    PubMed

    Broadhead, B L; Wagner, J C

    2005-01-01

    The effective use of biasing for the Monte Carlo solution of a void streaming problem is essential to obtaining a reasonable result in a reasonable amount of time. Most general purpose Monte Carlo shielding codes allow for the user to select the particular biasing techniques best oriented to the particular problem of interest. The biasing strategy for void streaming problems many times differs from that of a deep penetration problem. The key in void streaming is to bias particles into the streaming path, whereas in deep penetration problems the biasing is aimed at forcing particles through the shield. Until recently, the biasing scheme in the SCALE SAS4 shielding module was considered inadequate for void streaming problems due to the assumed one-dimensional nature of the automated bias prescription. A modified approach to the automated biasing in SAS4 has allowed for significant gains to be realised in the use of the code for void streaming problems. This paper applies the modified SAS4 procedures to a spent fuel storage cask model with vent ports. The results of the SAS4 analysis are compared with those of the ADVANTG methodology, which is an accelerated version of MCNP. Various options available for the implementation of the SAS4 methodology are reviewed and recommendations offered. PMID:16604687

  12. Multiview image compression based on LDV scheme

    NASA Astrophysics Data System (ADS)

    Battin, Benjamin; Niquin, Cédric; Vautrot, Philippe; Debons, Didier; Lucas, Laurent

    2011-03-01

    In recent years, we have seen several different approaches dealing with multiview compression. First, we can find the H264/MVC extension which generates quite heavy bitstreams when used on n-views autostereoscopic medias and does not allow inter-view reconstruction. Another solution relies on the MVD (MultiView+Depth) scheme which keeps p views (n > p > 1) and their associated depth-maps. This method is not suitable for multiview compression since it does not exploit the redundancy between the p views, moreover occlusion areas cannot be accurately filled. In this paper, we present our method based on the LDV (Layered Depth Video) approach which keeps one reference view with its associated depth-map and the n-1 residual ones required to fill occluded areas. We first perform a global per-pixel matching step (providing a good consistency between each view) in order to generate one unified-color RGB texture (where a unique color is devoted to all pixels corresponding to the same 3D-point, thus avoiding illumination artifacts) and a signed integer disparity texture. Next, we extract the non-redundant information and store it into two textures (a unified-color one and a disparity one) containing the reference and the n-1 residual views. The RGB texture is compressed with a conventional DCT or DWT-based algorithm and the disparity texture with a lossless dictionary algorithm. Then, we will discuss about the signal deformations generated by our approach.

  13. Concentric scheme of monkey auditory cortex

    NASA Astrophysics Data System (ADS)

    Kosaki, Hiroko; Saunders, Richard C.; Mishkin, Mortimer

    2003-04-01

    The cytoarchitecture of the rhesus monkey's auditory cortex was examined using immunocytochemical staining with parvalbumin, calbindin-D28K, and SMI32, as well as staining for cytochrome oxidase (CO). The results suggest that Kaas and Hackett's scheme of the auditory cortices can be extended to include five concentric rings surrounding an inner core. The inner core, containing areas A1 and R, is the most densely stained with parvalbumin and CO and can be separated on the basis of laminar patterns of SMI32 staining into lateral and medial subdivisions. From the inner core to the fifth (outermost) ring, parvalbumin staining gradually decreases and calbindin staining gradually increases. The first ring corresponds to Kaas and Hackett's auditory belt, and the second, to their parabelt. SMI32 staining revealed a clear border between these two. Rings 2 through 5 extend laterally into the dorsal bank of the superior temporal sulcus. The results also suggest that the rostral tip of the outermost ring adjoins the rostroventral part of the insula (area Pro) and the temporal pole, while the caudal tip adjoins the ventral part of area 7a.

  14. PPLN Device Characterization and Novel Entanglement Schemes

    NASA Astrophysics Data System (ADS)

    Krupa, Sean; Stinaff, Eric; Nippa, David; Oesterling, Lee

    2013-03-01

    Bright sources of entangled photons are of great interest in the quantum information community, and the non-linear optical process of Spontaneous Parametric Downconversion (SPDC) is a well-known means to create entangled photons. Additionally, periodic polling has emerged as a viable choice for quasi-phase matching the downconverted photons rendering them useful for experimentation. Periodically Poled Lithium Niobate (PPLN) is among the best choices for these materials as it optically robust, temperature tunable, and commercially available. The addition of waveguide structures in PPLN devices not only increase its viability as a source of entangled photons but can also become an integral part of the entanglement schemes as well. Thorough characterization of PPLN devices is essential for the optimization of SPDC and their use to create entangled states. We will report characterization results for wave-guided PPLN devices including: waveguide geometry, fiber coupling efficiency, polling period details, and downconversion efficiency. Of particular interest is our device's ability to be used for novel entanglement states involving one or more waveguides.

  15. Tuple decoders for traitor tracing schemes

    NASA Astrophysics Data System (ADS)

    Oosterwijk, Jan-Jaap; Doumen, Jeroen; Laarhoven, Thijs

    2014-02-01

    In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion function for simple decoders. Earlier, Moulin also considered another type of decoder: the generic joint decoder that compares all possible coalitions, and showed that usually the generic joint decoder outperforms the simple decoder. Both Amiri and Tardos, and Meerwald and Furon described constructions that assign suspicion levels to c-tuples, where c is the number of colluders. We investigate a novel idea: the tuple decoder, assigning a suspicion level to tuples of a fixed size. In contrast to earlier work, we use this in a novel accusation algorithm to decide for each distinct user whether or not to accuse him. We expect such a scheme to outperform simple decoders while not being as computationally intensive as the generic joint decoder. In this paper we generalize the optimal suspicion functions to tuples, and describe a family of accusation algorithms in this setting that accuses individual users using this tuple-based information.

  16. Shortwave radiation parameterization scheme for subgrid topography

    NASA Astrophysics Data System (ADS)

    Helbig, N.; LöWe, H.

    2012-02-01

    Topography is well known to alter the shortwave radiation balance at the surface. A detailed radiation balance is therefore required in mountainous terrain. In order to maintain the computational performance of large-scale models while at the same time increasing grid resolutions, subgrid parameterizations are gaining more importance. A complete radiation parameterization scheme for subgrid topography accounting for shading, limited sky view, and terrain reflections is presented. Each radiative flux is parameterized individually as a function of sky view factor, slope and sun elevation angle, and albedo. We validated the parameterization with domain-averaged values computed from a distributed radiation model which includes a detailed shortwave radiation balance. Furthermore, we quantify the individual topographic impacts on the shortwave radiation balance. Rather than using a limited set of real topographies we used a large ensemble of simulated topographies with a wide range of typical terrain characteristics to study all topographic influences on the radiation balance. To this end slopes and partial derivatives of seven real topographies from Switzerland and the United States were analyzed and Gaussian statistics were found to best approximate real topographies. Parameterized direct beam radiation presented previously compared well with modeled values over the entire range of slope angles. The approximation of multiple, anisotropic terrain reflections with single, isotropic terrain reflections was confirmed as long as domain-averaged values are considered. The validation of all parameterized radiative fluxes showed that it is indeed not necessary to compute subgrid fluxes in order to account for all topographic influences in large grid sizes.

  17. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  18. EXPERIMENTAL INVESTIGATION OF DEFROST USING WARM LIQUID REFRIGERANT

    EPA Science Inventory

    This paper reports the results from laboratory tests of a low-temperature supermarket refrigeration system with two open and two reach-in display cases. Tests were performed at condensing temperatures ranging from 10 to 40 C and at an evaporating temperature of -34 C. The perfo...

  19. 49 CFR 393.79 - Windshield defrosting and defogging systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... bus, truck, and truck-tractor manufactured on or after December 25, 1968, must have a windshield... manufacture. (b) Vehicles manufactured before December 25, 1968. Each bus, truck, and truck-tractor shall...

  20. Defrosting Polar Dunes--Changes Over a 26-Day Period

    NASA Technical Reports Server (NTRS)

    1999-01-01

    As the retreat of the south polar winter frost cap became visible in June 1999, high resolution images from the Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) began to show dark spots forming on the surfaces of frost-covered sand dunes. Immediately, the MOC science team began to plan to observe several dune fields more than once, should that opportunity arise, so that the evolution of these dark spots could be documented and studied. Such work will eventually lead to abetter understanding of how the martian polar caps retreat as winter ends and spring unfolds in each hemisphere.

    MGS is in a polar orbit, which means that, unlike many other places on Mars, the spacecraft has more opportunities to take pictures of the same place. Dune fields near 87o latitude can be repeatedly viewed; dunes near the equator are not likely to be photographed more than once during the entire MGS mission.

    The pictures presented here show changes on a set of nearly pear-shaped sand dunes located on the floor of an unnamed crater at 59oS, 353oW. The picture on the left shows the dunes as they appeared on June 19, 1999, the picture on the right shows the same dunes on July 15, 1999. The dark spots in the June 19picture--indicating areas where frost has sublimed away--became larger by July 15th. In addition, new spots had appeared as of mid-July. If possible, these dunes will be photographed by MOC again in mid-August and each month until the frost is gone.

    The pictures shown in (B) (above) are expanded views of portions of the pictures in (A). The 200 meter scale bar equals 656 feet; the 100 meter bar is 328 feet (109 yards) long. All images are illuminated from the upper left; north is toward the upper right.

    Malin Space Science Systems and the California Institute of Technology built the MOC using spare hardware from the Mars Observer mission. MSSS operates the camera from its facilities in San Diego, CA. The Jet Propulsion Laboratory's Mars Surveyor Operations Project operates the Mars Global Surveyor spacecraft with its industrial partner, Lockheed Martin Astronautics, from facilities in Pasadena, CA and Denver, CO.

  1. Self-defrosting recuperative air-to-air heat exchanger

    DOEpatents

    Drake, R.L.

    1993-12-28

    A heat exchanger is described which includes a stationary spirally or concentrically wound heat exchanger core with rotating baffles on upper and lower ends thereof. The rotating baffles include rotating inlets and outlets which are in communication with respective fixed inlets and outlets via annuli. The rotation of the baffles causes a concurrent rotation of the temperature distribution within the stationary exchanger core, thereby preventing frost build-up in some applications and preventing the formation of hot spots in other applications. 3 figures.

  2. Self-defrosting recuperative air-to-air heat exchanger

    DOEpatents

    Drake, Richard L.

    1993-01-01

    A heat exchanger includes a stationary spirally or concentrically wound heat exchanger core with rotating baffles on upper and lower ends thereof. The rotating baffles include rotating inlets and outlets which are in communication with respective fixed inlets and outlets via annuli. The rotation of the baffles causes a concurrent rotation of the temperature distribution within the stationary exchanger core, thereby preventing frost build-up in some applications and preventing the formation of hot spots in other applications.

  3. A Self-Adaptive Behavior-Aware Recruitment Scheme for Participatory Sensing.

    PubMed

    Zeng, Yuanyuan; Li, Deshi

    2015-01-01

    Participatory sensing services utilizing the abundant social participants with sensor-enabled handheld smart device resources are gaining high interest nowadays. One of the challenges faced is the recruitment of participants by fully utilizing their daily activity behavior with self-adaptiveness toward the realistic application scenarios. In the paper, we propose a self-adaptive behavior-aware recruitment scheme for participatory sensing. People are assumed to join the sensing tasks along with their daily activity without pre-defined ground truth or any instructions. The scheme is proposed to model the tempo-spatial behavior and data quality rating to select participants for participatory sensing campaign. Based on this, the recruitment is formulated as a linear programming problem by considering tempo-spatial coverage, data quality, and budget. The scheme enables one to check and adjust the recruitment strategy adaptively according to application scenarios. The evaluations show that our scheme provides efficient sensing performance as stability, low-cost, tempo-spatial correlation and self-adaptiveness. PMID:26389910

  4. New forcing scheme to sustain particle-laden homogeneous and isotropic turbulence

    NASA Astrophysics Data System (ADS)

    Mallouppas, G.; George, W. K.; van Wachem, B. G. M.

    2013-08-01

    This paper evaluates the effect of forcing to sustain turbulence on the transfer function of the fluid with particles suspended in a homogeneous and isotropic flow. As mentioned by Lucci et al. ["Modulation of isotropic turbulence by particles of Taylor length-scale size," J. Fluid Mech. 650, 5-55 (2010), 10.1017/S0022112009994022], there are three limitations of forcing particle-laden homogeneous and isotropic turbulence: (a) large fluctuations on the temporal evolution of the kinetic energy are created when forcing is active at low wavenumbers, (b) the redistribution of energy is affected when forcing is performed over all wavenumbers, and (c) the nonlinear transfer function of the fluid due to the triadic interactions is affected when forcing is active over a wavenumber range. These limitations make the interpretation of the effects of particles on the energy spectrum of the fluid difficult. A new forcing scheme in physical space has been designed which avoids these limitations in wavenumber space, so the spectral effects of particles can be evaluated. The performance of this forcing scheme is tested using Direct Numerical Simulations. It is shown that the nonlinear transfer function of the fluid with the current forcing scheme is only affected at the wavenumbers it is acting, consistent with the theory. Even so, the spatial coherence and phase spectra between the two-way coupling and the fluid computed from the simulations show that the new forcing scheme is only moderately correlated even for the forced wavenumbers, with correlation coefficient typically about 10%.

  5. A Self-Adaptive Behavior-Aware Recruitment Scheme for Participatory Sensing

    PubMed Central

    Zeng, Yuanyuan; Li, Deshi

    2015-01-01

    Participatory sensing services utilizing the abundant social participants with sensor-enabled handheld smart device resources are gaining high interest nowadays. One of the challenges faced is the recruitment of participants by fully utilizing their daily activity behavior with self-adaptiveness toward the realistic application scenarios. In the paper, we propose a self-adaptive behavior-aware recruitment scheme for participatory sensing. People are assumed to join the sensing tasks along with their daily activity without pre-defined ground truth or any instructions. The scheme is proposed to model the tempo-spatial behavior and data quality rating to select participants for participatory sensing campaign. Based on this, the recruitment is formulated as a linear programming problem by considering tempo-spatial coverage, data quality, and budget. The scheme enables one to check and adjust the recruitment strategy adaptively according to application scenarios. The evaluations show that our scheme provides efficient sensing performance as stability, low-cost, tempo-spatial correlation and self-adaptiveness. PMID:26389910

  6. Multi-rate time stepping schemes for hydro-geomechanical model for subsurface methane hydrate reservoirs

    NASA Astrophysics Data System (ADS)

    Gupta, Shubhangi; Wohlmuth, Barbara; Helmig, Rainer

    2016-05-01

    We present an extrapolation-based semi-implicit multi-rate time stepping (MRT) scheme and a compound-fast MRT scheme for a naturally partitioned, multi-time-scale hydro-geomechanical hydrate reservoir model. We evaluate the performance of the two MRT methods compared to an iteratively coupled solution scheme and discuss their advantages and disadvantages. The performance of the two MRT methods is evaluated in terms of speed-up and accuracy by comparison to an iteratively coupled solution scheme. We observe that the extrapolation-based semi-implicit method gives a higher speed-up but is strongly dependent on the relative time scales of the latent (slow) and active (fast) components. On the other hand, the compound-fast method is more robust and less sensitive to the relative time scales, but gives lower speed up as compared to the semi-implicit method, especially when the relative time scales of the active and latent components are comparable.

  7. An optimized spectral difference scheme for CAA problems

    NASA Astrophysics Data System (ADS)

    Gao, Junhui; Yang, Zhigang; Li, Xiaodong

    2012-05-01

    In the implementation of spectral difference (SD) method, the conserved variables at the flux points are calculated from the solution points using extrapolation or interpolation schemes. The errors incurred in using extrapolation and interpolation would result in instability. On the other hand, the difference between the left and right conserved variables at the edge interface will introduce dissipation to the SD method when applying a Riemann solver to compute the flux at the element interface. In this paper, an optimization of the extrapolation and interpolation schemes for the fourth order SD method on quadrilateral element is carried out in the wavenumber space through minimizing their dispersion error over a selected band of wavenumbers. The optimized coefficients of the extrapolation and interpolation are presented. And the dispersion error of the original and optimized schemes is plotted and compared. An improvement of the dispersion error over the resolvable wavenumber range of SD method is obtained. The stability of the optimized fourth order SD scheme is analyzed. It is found that the stability of the 4th order scheme with Chebyshev-Gauss-Lobatto flux points, which is originally weakly unstable, has been improved through the optimization. The weak instability is eliminated completely if an additional second order filter is applied on selected flux points. One and two dimensional linear wave propagation analyses are carried out for the optimized scheme. It is found that in the resolvable wavenumber range the new SD scheme is less dispersive and less dissipative than the original scheme, and the new scheme is less anisotropic for 2D wave propagation. The optimized SD solver is validated with four computational aeroacoustics (CAA) workshop benchmark problems. The numerical results with optimized schemes agree much better with the analytical data than those with the original schemes.

  8. Splitting based finite volume schemes for ideal MHD equations

    NASA Astrophysics Data System (ADS)

    Fuchs, F. G.; Mishra, S.; Risebro, N. H.

    2009-02-01

    We design finite volume schemes for the equations of ideal magnetohydrodynamics (MHD) and based on splitting these equations into a fluid part and a magnetic induction part. The fluid part leads to an extended Euler system with magnetic forces as source terms. This set of equations are approximated by suitable two- and three-wave HLL solvers. The magnetic part is modeled by the magnetic induction equations which are approximated using stable upwind schemes devised in a recent paper [F. Fuchs, K.H. Karlsen, S. Mishra, N.H. Risebro, Stable upwind schemes for the Magnetic Induction equation. Math. Model. Num. Anal., Available on conservation laws preprint server, submitted for publication, URL: ]. These two sets of schemes can be combined either component by component, or by using an operator splitting procedure to obtain a finite volume scheme for the MHD equations. The resulting schemes are simple to design and implement. These schemes are compared with existing HLL type and Roe type schemes for MHD equations in a series of numerical experiments. These tests reveal that the proposed schemes are robust and have a greater numerical resolution than HLL type solvers, particularly in several space dimensions. In fact, the numerical resolution is comparable to that of the Roe scheme on most test problems with the computational cost being at the level of a HLL type solver. Furthermore, the schemes are remarkably stable even at very fine mesh resolutions and handle the divergence constraint efficiently with low divergence errors.

  9. A Review of the Case of a Levy-Grant Scheme (LGS) in the UK Construction Industry

    ERIC Educational Resources Information Center

    Abdel-Wahab, Mohamed; Dainty, Andrew; Ison, Stephen

    2010-01-01

    A Levy-Grant Scheme (LGS) has existed in the UK construction industry since 1964 to provide financial support for companies undertaking training activities. Despite the support of the LGS for various training activities, notably apprenticeships, the construction industry continues to suffer from both labour shortages and an under-investment in…

  10. An improved SPH scheme for cosmological simulations

    NASA Astrophysics Data System (ADS)

    Beck, A. M.; Murante, G.; Arth, A.; Remus, R.-S.; Teklu, A. F.; Donnert, J. M. F.; Planelles, S.; Beck, M. C.; Förster, P.; Imgrund, M.; Dolag, K.; Borgani, S.

    2016-01-01

    We present an implementation of smoothed particle hydrodynamics (SPH) with improved accuracy for simulations of galaxies and the large-scale structure. In particular, we implement and test a vast majority of SPH improvement in the developer version of GADGET-3. We use the Wendland kernel functions, a particle wake-up time-step limiting mechanism and a time-dependent scheme for artificial viscosity including high-order gradient computation and shear flow limiter. Additionally, we include a novel prescription for time-dependent artificial conduction, which corrects for gravitationally induced pressure gradients and improves the SPH performance in capturing the development of gas-dynamical instabilities. We extensively test our new implementation in a wide range of hydrodynamical standard tests including weak and strong shocks as well as shear flows, turbulent spectra, gas mixing, hydrostatic equilibria and self-gravitating gas clouds. We jointly employ all modifications; however, when necessary we study the performance of individual code modules. We approximate hydrodynamical states more accurately and with significantly less noise than standard GADGET-SPH. Furthermore, the new implementation promotes the mixing of entropy between different fluid phases, also within cosmological simulations. Finally, we study the performance of the hydrodynamical solver in the context of radiative galaxy formation and non-radiative galaxy cluster formation. We find galactic discs to be colder and more extended and galaxy clusters showing entropy cores instead of steadily declining entropy profiles. In summary, we demonstrate that our improved SPH implementation overcomes most of the undesirable limitations of standard GADGET-SPH, thus becoming the core of an efficient code for large cosmological simulations.

  11. High order WENO scheme for computational cosmology

    NASA Astrophysics Data System (ADS)

    Roy, Ishani

    2010-11-01

    This doctoral dissertation is concerned with the formulation and application of a high order accurate numerical algorithm suitable in solving complex multi dimensional equations and the application of this algorithm to a problem in Astrophysics. The algorithm is designed with the aim of resolving solutions of partial differential equations with sharp fronts propagating with time. This high order accurate class of numerical technique is called a Weighted Essentially Non Oscillatory (WENO) method and is well suited for shock capturing in solving conservation laws. The numerical approximation method, in the algorithm, is coupled with high order time marching as well as integration techniques designed to reduce computational cost. This numerical algorithm is used in several applications in computational cosmology to help understand questions about certain physical phenomena which occurred during the formation and evolution of first generation stars. The thesis is divided broadly in terms of the algorithm and its application to the different galactic processes. The first chapter deals with the astrophysical problem and offers an introduction to the numerical algorithm. In chapter 2 we outline the mathematical model and the various functions and parameters associated with the model. We also give a brief description of the relevant physical phenomena and the conservation laws associated with them. In chapter 3, we give a detailed description of the higher order algorithm and its formulation. We also highlight the special techniques incorporated in the algorithm in order to make it more suitable for handling cases which are computationally intensive. In the later chapters, 4-7, we explore in detail the physical processes and the different applications of our numerical scheme. We calculate different results such as the time scale of a temperature coupling mechanism, radiation and intensity changes etc. Different tests are also performed to illustrate the stability and

  12. On schemes of combinatorial transcription logic

    NASA Astrophysics Data System (ADS)

    Buchler, Nicolas E.; Gerland, Ulrich; Hwa, Terence

    2003-04-01

    Cells receive a wide variety of cellular and environmental signals, which are often processed combinatorially to generate specific genetic responses. Here we explore theoretically the potentials and limitations of combinatorial signal integration at the level of cis-regulatory transcription control. Our analysis suggests that many complex transcription-control functions of the type encountered in higher eukaryotes are already implementable within the much simpler bacterial transcription system. Using a quantitative model of bacterial transcription and invoking only specific protein-DNA interaction and weak glue-like interaction between regulatory proteins, we show explicit schemes to implement regulatory logic functions of increasing complexity by appropriately selecting the strengths and arranging the relative positions of the relevant protein-binding DNA sequences in the cis-regulatory region. The architectures that emerge are naturally modular and evolvable. Our results suggest that the transcription regulatory apparatus is a "programmable" computing machine, belonging formally to the class of Boltzmann machines. Crucial to our results is the ability to regulate gene expression at a distance. In bacteria, this can be achieved for isolated genes via DNA looping controlled by the dimerization of DNA-bound proteins. However, if adopted extensively in the genome, long-distance interaction can cause unintentional intergenic cross talk, a detrimental side effect difficult to overcome by the known bacterial transcription-regulation systems. This may be a key factor limiting the genome-wide adoption of complex transcription control in bacteria. Implications of our findings for combinatorial transcription control in eukaryotes are discussed. Abbreviations: TF, transcription factor RNAP, RNA polymerase DNF, disjunctive normal form CNF, conjunctive normal form

  13. The Impact of Hospital Payment Schemes on Healthcare and Mortality: Evidence from Hospital Payment Reforms in OECD Countries.

    PubMed

    Wubulihasimu, Parida; Brouwer, Werner; van Baal, Pieter

    2016-08-01

    In this study, aggregate-level panel data from 20 Organization for Economic Cooperation and Development countries over three decades (1980-2009) were used to investigate the impact of hospital payment reforms on healthcare output and mortality. Hospital payment schemes were classified as fixed-budget (i.e. not directly based on activities), fee-for-service (FFS) or patient-based payment (PBP) schemes. The data were analysed using a difference-in-difference model that allows for a structural change in outcomes due to payment reform. The results suggest that FFS schemes increase the growth rate of healthcare output, whereas PBP schemes positively affect life expectancy at age 65 years. However, these results should be interpreted with caution, as results are sensitive to model specification. Copyright © 2015 John Wiley & Sons, Ltd. PMID:26080792

  14. Resolution-optimised nonlinear scheme for secondary derivatives

    NASA Astrophysics Data System (ADS)

    Li, Li; Yu, Changping; Chen, Zhe; Li, Xinliang

    2016-02-01

    A 5-point-stencil optimised nonlinear scheme with spectral-like resolution within the whole wave number range for secondary derivatives is devised. The proposed scheme can compensate for the dissipation deficiency of traditional linear schemes and suppress the spurious energy accumulation that occurs at high wave numbers, both of which are frequently encountered in large eddy simulation. The new scheme is composed of a linear fourth-order central scheme term and an artificial viscosity term. These two terms are connected by a nonlinear weight. The proposed nonlinear weight is designed based on Fourier analysis, rather than Taylor analysis, to guarantee a spectral-like resolution. Moreover, the accuracy is not affected by the optimisation, and the new scheme reaches fourth-order accuracy. The new scheme is tested numerically using the one-dimensional diffusion problem, one-dimensional steady viscous Burger's shock, two-dimensional vortex decaying, three-dimensional isotropic decaying turbulence and fully developed turbulent channel flow. All the tests confirm that the new scheme has spectral-like resolution and can improve the accuracy of the energy spectrum, dissipation rate and high-order statistics of turbulent flows.

  15. 7 CFR 625.20 - Scheme and device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme and device. 625.20 Section 625.20 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.20 Scheme and device. (a) If it...

  16. Second-order accurate nonoscillatory schemes for scalar conservation laws

    NASA Technical Reports Server (NTRS)

    Huynh, Hung T.

    1989-01-01

    Explicit finite difference schemes for the computation of weak solutions of nonlinear scalar conservation laws is presented and analyzed. These schemes are uniformly second-order accurate and nonoscillatory in the sense that the number of extrema of the discrete solution is not increasing in time.

  17. Increasing Employability: An Evaluation of the Fullemploy Training Scheme.

    ERIC Educational Resources Information Center

    Pearn, M. A.; Munene, J.

    The Fullemploy Training Scheme is an experiment designed to overcome problems encountered by disadvantaged youth in Britain's Manpower Services Commission's job training program. The aim of the scheme is to bring minority disadvantaged young people into a special office skills training course which would combine vocational training with…

  18. Quantum secret sharing schemes and reversibility of quantum operations

    SciTech Connect

    Ogawa, Tomohiro; Sasaki, Akira; Iwamoto, Mitsugu; Yamamoto, Hirosuke

    2005-09-15

    Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

  19. LDPC-PPM Coding Scheme for Optical Communication

    NASA Technical Reports Server (NTRS)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  20. Evaluating an Earlybird Scheme: Encouraging Early Assignment Writing and Revising

    ERIC Educational Resources Information Center

    Unsworth, Kerrie; Kauter, Katherine

    2008-01-01

    It is widely suggested that feedback on assignments is useful to students' learning, however, little research has examined how this feedback may be provided in large classes or the actual effects of such a scheme. We designed and implemented a voluntary "earlybird scheme" that provided detailed feedback to undergraduate Business students on a…

  1. A high-speed distortionless predictive image-compression scheme

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.; Smyth, P.; Wang, H.

    1990-01-01

    A high-speed distortionless predictive image-compression scheme that is based on differential pulse code modulation output modeling combined with efficient source-code design is introduced. Experimental results show that this scheme achieves compression that is very close to the difference entropy of the source.

  2. FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is wide spread. eal porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. uch a scheme based on the properties ...

  3. Convergence Acceleration for Multistage Time-Stepping Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.

    2006-01-01

    The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.

  4. Stable Difference Schemes for the Neutron Transport Equation

    SciTech Connect

    Ashyralyev, Allaberen; Taskin, Abdulgafur

    2011-09-22

    The initial boundary value problem for the neutron transport equation is considered. The first and second orders of accuracy difference schemes for the approximate solution of this problem are presented. In applications, the stability estimates for solutions of difference schemes for the approximate solution of the neutron transport equation are obtained. Numerical techniques are developed and algorithms are tested on an example in MATLAB.

  5. 7 CFR 623.21 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it...

  6. 7 CFR 625.19 - Scheme and device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it...

  7. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    EPA Science Inventory

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  8. New User Support in the University Network with DACS Scheme

    ERIC Educational Resources Information Center

    Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro

    2007-01-01

    Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…

  9. New Concepts in Instrumentation Development to Measure the Perry Scheme.

    ERIC Educational Resources Information Center

    Taylor, Marcia

    The Perry scheme of intellectual and ethical development has become widely used in a range of academic disciplines and such areas as career training and faculty consultation. However, current measurement techniques for the scheme, whether interview format or paper and pencil measures, do not adequately address issues related to assessing cognitive…

  10. Performance improvement of robots using a learning control scheme

    NASA Technical Reports Server (NTRS)

    Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.

    1987-01-01

    Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.

  11. Ranking Schemes in Hybrid Boolean Systems: A New Approach.

    ERIC Educational Resources Information Center

    Savoy, Jacques

    1997-01-01

    Suggests a new ranking scheme especially adapted for hypertext environments in order to produce more effective retrieval results and still use Boolean search strategies. Topics include Boolean ranking schemes; single-term indexing and term weighting; fuzzy set theory extension; and citation indexing. (64 references) (Author/LRW)

  12. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  13. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  14. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  15. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  16. 7 CFR 1415.20 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device....

  17. Three-dimensional incompressible flow calculations with alternative discretization schemes

    NASA Astrophysics Data System (ADS)

    Tamamidis, Panos; Assanis, Dennis N.

    1993-08-01

    A finite-volume calculation procedure for steady, incompressible, elliptic flows in complex geometries is presented. The methodology uses generalized body-fitted coordinates to model the shape of the boundary accurately. All variables are stored at the centroids of the elements, thus achieving simplicity and low cost of computations. Turbulence is modeled by using the standard two-equation k-epsilon model. The purpose of this work is to evaluate the performance and accuracy of flow calculations under different discretization schemes in the light of experimental results. The discretization schemes that are incorporated in the code include the classical hybrid scheme, the third-order QUICK scheme, and a fifth-order upwind scheme. Benchmark tests are performed for laminar and turbulent flows in 90 deg curved ducts of square and circular cross sections. Flaw solutions obtained using the classical hybrid scheme are compared with solutions obtained with the higher-order schemes. The results show that accurate solutions can be efficiently obtained on grids of moderate size by using high-order-accuracy schemes. Overall, the potential of the methodology for calculating real-life engineering flows is demonstrated.

  18. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...

  19. 7 CFR 1467.19 - Scheme and device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme and device. 1467.19 Section 1467.19 Agriculture Regulations of the Department of Agriculture (Continued) COMMODITY CREDIT CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme...

  20. 7 CFR 12.10 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture Office of the Secretary of Agriculture HIGHLY ERODIBLE LAND AND WETLAND CONSERVATION General Provisions § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person...